Infosecurity News

OT Assets High Priority for Security Leaders as Industrial Threats Loom
A study by the SANS Institute and Trend Micro found major discrepancies between IT and OT asset visibility within organizations

Thirty-three US Hospitals Hit By Ransomware This Year
Most had data stolen, according to Emsisoft

Four Men Face 20 Years For Money Laundering Charges
They allegedly helped to clean money stolen from the elderly and vulnerable

Microsoft Denies Major 30 Million Customer-Breach
Russian-linked Anonymous Sudan claims to have stolen credentials

USPTO’s API Flaw Leads to Years-Long Data Leak
Around 61,000 addresses, accounting for 3% of total applications, were impacted during that period

Chinese Threat Actors Target Europe in SmugX Campaign
The attacks rely on novel delivery methods to deploy a variant of PlugX

Meduza Stealer Targets Windows Users With Advanced Tactics
Uptycs discovered the new threat while monitoring dark web forums and Telegram channels

TSMC Targeted by LockBit via Supplier Breach
The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment

Croydon Council Hit With Enforcement Notice For FOI Fail
ICO continues policy of not fining public sector organizations

International Police Operation Dismantles Phone Scam Network
Elderly victims suffer losses in the millions of dollars

Musk Losing Battle of Bad Bots as Rate Limits Begin
Growing number of Twitter users voice disquiet

Switzerland’s Security Report: Impact of Russia–Ukraine Conflict
The increasing rivalry between significant powers heavily influences the country's security

Critical Flaw Exposes ArcServe Backup to Remote Code Execution
MDSec ActiveBreach said the flaw affects versions 7.0 to 9.0 of the software

8Base Ransomware Group Emerges as Major Threat
VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics

LockBit Claims TSMC Hack, Demands $70m Ransom
If confirmed, it could be the fourth-largest ransom demand of all time

MITRE Announces Most Dangerous Software Weaknesses
CWE Top 25 list is calculated from two years of vulnerability data

GCHQ Reveals Details of State-Backed Breach
Cyber-espionage incident occurred 20 years ago, says NCSC

Amazon Issues Lawsuits Targeting Fake Review Brokers
E-commerce giant looks to improve customer trust in its marketplace

NSA and CISA Release Guidelines to Secure CI/CD Environments
The guidelines highlight three key threat scenarios and recommends mitigations for each

MIT Publishes Framework to Evaluate Cybersecurity Methods
It assesses information hackers could get from a victim program protected by an obfuscation scheme



