Infosecurity News
Chinese Threat Actors Target Europe in SmugX Campaign
The attacks rely on novel delivery methods to deploy a variant of PlugX
Meduza Stealer Targets Windows Users With Advanced Tactics
Uptycs discovered the new threat while monitoring dark web forums and Telegram channels
TSMC Targeted by LockBit via Supplier Breach
The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment
Croydon Council Hit With Enforcement Notice For FOI Fail
ICO continues policy of not fining public sector organizations
International Police Operation Dismantles Phone Scam Network
Elderly victims suffer losses in the millions of dollars
Musk Losing Battle of Bad Bots as Rate Limits Begin
Growing number of Twitter users voice disquiet
Switzerland’s Security Report: Impact of Russia–Ukraine Conflict
The increasing rivalry between significant powers heavily influences the country's security
Critical Flaw Exposes ArcServe Backup to Remote Code Execution
MDSec ActiveBreach said the flaw affects versions 7.0 to 9.0 of the software
8Base Ransomware Group Emerges as Major Threat
VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics
LockBit Claims TSMC Hack, Demands $70m Ransom
If confirmed, it could be the fourth-largest ransom demand of all time
MITRE Announces Most Dangerous Software Weaknesses
CWE Top 25 list is calculated from two years of vulnerability data
GCHQ Reveals Details of State-Backed Breach
Cyber-espionage incident occurred 20 years ago, says NCSC
Amazon Issues Lawsuits Targeting Fake Review Brokers
E-commerce giant looks to improve customer trust in its marketplace
NSA and CISA Release Guidelines to Secure CI/CD Environments
The guidelines highlight three key threat scenarios and recommends mitigations for each
MIT Publishes Framework to Evaluate Cybersecurity Methods
It assesses information hackers could get from a victim program protected by an obfuscation scheme
Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration
LockBit Dominates Ransomware World, New Report Finds
LockBit becomes one of the first major ransomware operations to specifically target macOS
VPN and RDP Exploitation the Most Common Attack Technique
Initial access brokers still play a key role in threat supply chain
US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases
Nearly 80 individuals accused of participating in multiple schemes
Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry