Security News Bundle

"New Windows 10 22H2 beta fixes many leaks and crashes."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 24 August 2024, 0328 UTC.

Contents and Source:  Email subscription via https://feedly.com.   https://feedly.com/i/collection/content/user/f401222a-bca6-4c45-9cc1-183f239e8d86/category/7737d3c9-5fe2-4b34-8708-85e57085f895

Please check the link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

Security News Bundle

63

Most popular

The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. The attack, detected in July

Today

Sophos researchers investigated a Qilin ransomware breach attack that led to the theft of credentials stored in Google Chrome browsers. Sophos researchers investigated a Qilin ransomware attack where operators stole credentials stored in Google Chrome browsers of a limited number of compromised endpoints. The experts pointed out that the credential harvesting activity is usually not associated wi
Meta security teams blocked “a small cluster” of WhatsApp accounts associated with APT42, an Iranian government-backed group accused by U.S. officials of hacking into the Trump campaign’s email accounts , the company said Friday. According to a blog post from Meta , the Iranian-linked accounts were “likely” for social engineering purposes, with the actors posing as tech support for companies like
Deadbeat parents across America are responsible for more than $113 billion in unpaid child support payments, according to the Department of Health and Human Services. Few of those offenders likely spent as much effort to get out their obligations as Kentucky resident Jesse Kipf. According to the Department of Justice and court documents, Kipf starting in January 2023 began using stolen online cre
A former Verizon employee pleaded guilty Friday to conspiring to serve as an agent of the People’s Republic of China, namely by using his job to send information about Chinese enemies to a spy agency there, as well as details related to cyber incidents. Ping Li faces up to five years in prison for his contacts with the Ministry of State Security. He provided information on Chinese dissidents, pro
Cybercriminals use progressive web applications (PWA) to impersonate banking apps and steal credentials from mobile users. ESET researchers detailed a phishing campaign against mobile users that uses Progressive Web Applications (PWAs). The threat actors used fake apps almost indistinguishable from real banking apps on both iOS and Android. The technique was first disclosed in Poland in July 2023
Federal prosecutors this week charged a Latvian national who was living in Russia for his alleged role in extorting companies targeted by the Karakurt ransomware operation. Deniss Zolotarjovs, 33, was arrested in the country of Georgia in December and extradited to the U.S. in August, the U.S. Attorney’s Office in the Southern District of Ohio said in a statement Tuesday . Zolotarjovs is facing c
The Russian national Deniss Zolotarjovs has been charged in a U.S. court for his role in the Karakurt cybercrime gang. Deniss Zolotarjovs (33), a Russian cybercriminal, has been charged in a U.S. court for his role in the Russian Karakurt cybercrime gang. The man has been charged with money laundering, wire fraud, and extortion. The man was arrested in Georgia in December 2023 and recently extrad
Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems with information stealers and loaders. "This memory-only dropper decrypts and executes a PowerShell-based downloader," Google-owned Mandiant said. "This PowerShell-based downloader is being tracked as PEAKLIGHT." Some of
The U.S. is facing a critical shortage of cybersecurity professionals, a challenge that is not only growing but also poses a significant threat to national security. CyberSeek, a joint initiative of NIST’s NICE program, CompTIA, and Lightcast, reports in its dashboard over 469,930 job openings in cybersecurity. (CyberSeek, 2024) Despite the escalating cyber threats, the talent pool to combat thes
U.S. energy services titan Halliburton proactively took certain systems offline “to help protect them” after a cyberattack this week, the company said Friday in a filing with federal regulators. The company learned Wednesday that “an unauthorized third party gained access to certain parts of its systems” and that it was working with external advisers to assess and remediate the situation, the com
Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It's exhausting, isn’t it? But what if there was a better way? Imagine having every essential cybersecurity tool at your fingertips, all within a single, intuitive platform, backed by expert support 24/7. This is
Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s on-demand webinar. To learn more about reducing your attack surface, reach out to their team today. Attack surface management vs exposure management Attack surface management (ASM) is the ongoing

Comments

Popular posts from this blog

The Cyberwire Daily Briefing

Cyber War News Today.

SecurityWeek Briefing