Infosecurity News
KeyBank's Customer Information Stolen By Hackers Via Third-party Provider
Overby-Seawell, a firm providing multiple clients with insurance services is alleged to have been the source of the breach
SharkBot Malware Resurfaces on Google Play to Steal Users' Credentials
It reportedly targets the banking credentials of Android users via apps with 60,000 installations
EvilProxy Phishing Toolkit Spotted on Dark Web Forums
The tool highlights the growth in attacks against online services and MFA authorization mechanisms
New Rules for Crypto Exchanges to Stop Sanctions Evaders
UK Treasury demands exchanges report suspected breaches
Samsung Reveals New US Data Breach
Personal info of "certain customers" was affected
IRS Leaks 120,000 Taxpayers' Personal Details
US government still working out what went wrong
US Police Deployed Obscure Smartphone Tracking Tool With No Warrants
It would allow police to search billions of mobile device-based records, including GPS data
Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard Contents
The bug was discovered by developer Jeff Johnson, who detailed his findings in a blog post
JuiceLedger Hacker Linked to First Phishing Campaign Targeting PyPI Users
JuiceLedger started poisoning open-source packages as a way to target a wider audience in August
New Ransomware Group BianLian Activity Exploding
The threat actor using the common Go programming language and a custom toolkit claims twenty victims
CISA, NSA and npm Release Software Supply Chain Guidance
Best practices are designed to help developers bolster security
UK Government Releases New AI Security Guidance
New principles set to take on adversarial machine learning
Chile and Montenegro Floored by Ransomware
Governments reveal system compromise in separate incidents
Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials
Roughly 50% of all the apps analyzed were seen using the same AWS tokens found in other apps
Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests
The malware can also check if specific products are installed, particularly security software
Apple Releases Update for iOS 12 to Patch Exploited Vulnerability
The flaw would allow the processing of maliciously crafted web content and arbitrary code execution
Standards Body Publishes Guidelines for IoT Security Testing
Document will help testers create benchmarks for security products
Detected Cyber-Threats Surge 52% in 1H 2022
Trend Micro warns of Linux-based ransomware
Microsoft Finds Account Takeover Bug in TikTok
Vulnerability impacted social media firm’s Android app
Golang-based Malware Campaign Relies on James Webb Telescope's Image
Initial infection begins with a phishing email containing a Microsoft Office attachment