-
Russian cyberattacks against Ukraine, other targets expected to rise
PRIVACY PRIVACY Hacking groups closely linked to the Russian government have made nearly 40 destructive attacks against hundreds of Ukrainian targets since the start of the invasion, according to a report issued by Microsoft. The attacks have been largely, but not exclusively, targeted at Ukrainian government institutions, and Microsoft’s report noted that these attacks have…
-
Europol: Deepfakes Set to Be Used Extensively in Organized Crime
PRIVACY PRIVACY Europol warns law enforcement agencies to enhance skills and tech at officers’ disposal to keep pace with criminal use of deepfakes Read More
-
Uber ‘Cough Girl’ Accused of Identity Theft
PRIVACY PRIVACY Woman shown coughing on Uber driver in viral video allegedly stole nurse’s identity Read More
-
Chickens Baked Alive Due to Computer Glitch
PRIVACY PRIVACY English farm fined $55K after more than 27,000 birds die in overheating disaster Read More
-
Crypto Trading Fund Partners Accused of Fraud
PRIVACY PRIVACY Block Bits Fund investors allegedly conned out of $960K by defendants’ tech misrepresentations Read More
-
Microsoft Issues Report of Russian Cyberattacks against Ukraine
PRIVACY PRIVACY Microsoft has a comprehensive report on the dozens of cyberattacks — and even more espionage operations — Russia has conducted against Ukraine as part of this war: At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack…
-
Researchers break Azure PostgreSQL database-as-a-service isolation with cross-tenant attack
PRIVACY PRIVACY A team of researchers found two vulnerabilities in Microsoft’s Azure PostgreSQL Flexible Server that when chained together allowed them to access the PostgreSQL databases of other cloud tenants. The attack, dubbed ExtraReplica because it abused functionality related to database replication, combines a privilege escalation vulnerability that gave them the ability to execute code…
-
Jamf beefs up enterprise security software for Mac
PRIVACY PRIVACY A maker of enterprise software for Apple’s ecosystem announced a half-dozen new products and enhancements at an online event Tuesday. Jamf maintained the new offerings would help organizations create an enterprise-secure, consumer-simple environment that protects personal privacy. Three new features were added to the company’s endpoint and network security platform, Jamf Protect. They…
-
15 most exploited vulnerabilities of 2021
PRIVACY PRIVACY Global cybersecurity authorities have published a joint advisory on the 15 Common Vulnerabilities and Exposures (CVEs) most routinely exploited by malicious cyber actors in 2021. The advisory is co-authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), U.S. National Security Agency (NSA), U.S. Federal Bureau of Investigation (FBI), Australian Cyber Security Centre…
-
New malware loader Bumblebee adopted by known ransomware access brokers
PRIVACY PRIVACY Several threat groups believed to be initial access facilitators for some ransomware gangs are transitioning to a new first-stage malware downloader dubbed Bumblebee. The groups previously used other downloaders like BazaLoader and IcedID. According to researchers from security firm Proofpoint, Bumblebee email-based distribution campaigns started in March and were linked back to at…