Infosecurity News

Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration

LockBit Dominates Ransomware World, New Report Finds
LockBit becomes one of the first major ransomware operations to specifically target macOS

VPN and RDP Exploitation the Most Common Attack Technique
Initial access brokers still play a key role in threat supply chain

Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry

US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases
Nearly 80 individuals accused of participating in multiple schemes

Manifest Confusion Threat Undermines Trust in Entire Npm Registry
Former manager takes registry to task for slow response

Suncor Energy Responds to Cybersecurity Incident
Over 1500 Petro-Canada gas stations are unable to accept credit card payments

ThirdEye Infostealer Poses New Threat to Windows Users
FortiGuard explained that ThirdEye can harvest BIOS and hardware data

Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign
Kaspersky analyzes the group’s tactics and reveals the emergence of a new threat called EarlyRat

Mobile Malware and Phishing Surge in 2022
Zimperium records large increase in share of compromised devices

EncroChat Bust Leads to 6500 Arrests in Three Years
Encrypted comms platform was used by organized criminals

Experts Unconvinced by Upskill in UK Cyber Program
Its 3600 applicants will barely make a dent in overall skills shortages

Anatsa Banking Trojan Targets Banks in US, UK and DACH Region
ThreatFabric said the ongoing campaign started in March and has witnessed over 30,000 installations

Third-Party Vendor Hack Exposes Data at American, Southwest Airlines
American Airlines reported 5745 pilots and applicants affected, Southwest Airlines reported 3009

Study Reveals Alarming Gap in SIEM Detection of Adversary Techniques
CardinalOps examined 4000 detection rules, one million log sources and many unique log source types

Submarine Cables at Growing Risk of Cyber-Attacks
A report from Recorded Future highlights how digital cable management systems are vulnerable to nation-state attacks

Over Half of UK Banks Are Exposing Customers to Email Fraud
Recommended DMARC policy only implemented by a minority

NCSC Launches Cyber Risk Management Toolbox
Security agency’s latest guidance refresh makes best practices more accessible

Payments Lobby: Anti-APP Fraud Policies Could Increase Scams
Payments Association wants social media firms to play role in crackdown

Are GPT-Based Models the Right Fit for AI-Powered Cybersecurity?
Many cybersecurity vendors are integrating general-purpose large language models into their solutions. However, some experts argue that these are not the best AI algorithms for security



