Infosecurity News
Time Taken to Deploy Ransomware Drops 94%
Extortion found to be most common impact from cyber-attacks in 2022
Call of Duty Developer Confirms Phishing Attempt but Not Breach
Security researchers say hackers successfully exfiltrated content
New Privilege Escalation Bug Class Found on macOS and iOS
The new class of privilege escalation bugs is based on the ForcedEntry attack
Hackers Exploit Privilege Escalation Flaw on Windows Backup Service
The flaw is triggered using the Race Condition between temporary file creation and deletion
Researchers Uncover New Information Stealer 'Stealc'
Stealc is a fully featured stealer, whose development relied on Vidar, Raccoon, Mars and Redline
City Fund Managers Jailed for $8m Fraud
Trio get 12 years behind bars
Ransomware Gang Seeks to Exploit Victims' Insurance Coverage
Ransomware group tries to demonize carriers in negotiations
Fifth of Brits Have Fallen Victim to Online Scammers
Many don’t have any security controls in place, says F-Secure
Samsung Launches Message Guard to Protect Users From Cyber-Threats
The feature provides a sandbox layer isolating some image files from the rest of the device
GoDaddy Announces Source Code Stolen and Malware Installed in Breach
An unauthorized party caused the intermittent redirection of customer websites
Frebniis Malware Exploits Microsoft IIS Feature
The malware was used by a previously unknown threat actor against targets in Taiwan
FBI "Contains" Cyber-Incident on its Network
Question marks remain over what happened at New York field office
Norway Seizes Millions in North Korean Crypto
Funds were taken in attack on Ronin Network
Police Bust $41m Email Scam Gang
Criminal network comprises French and Israeli gangsters
Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos
The threat actor initiated infection chains by targeting employees through WhatsApp messages
EU Cybersecurity Agency Warns Against Chinese APTs
The document directly mentions APT27, APT30, APT31, Ke3chang, Gallium and Mustang Panda
Google Report Reveals Russia's Elaborate Cyber Strategy in Ukraine
One year after the invasion of Ukraine, Google and Mandiant analyzed the cyber strategy of Russia-backed threat actors
Armenia and Azerbaijan Hackers Use OxtaRAT to Monitor Conflict
The newest version of OxtaRAT is a polyglot file combining a compiled AutoIT script and an image
UK NCSC Launches Recommendations on Supply Chain Mapping
The UK National Cybersecurity Centre’s new guidance breaks down the essentials of a good supply chain mapping (SCM) list
Firm Fined £200K For "Exploitative" Call Campaign
It's OK Ltd made over 1.7 million nuisance calls