Skip to main content

Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution

Shutterfly Says Ransomware Attack Impacted Manufacturing
  Your SecurityWeek Briefing Webcasts
RSS Feed
12.28.21


Tuesday, December 28, 2021


Security Frameworks Guide

Guide:
Mitigating Evolving Risk with the Right Security Framework

Download the free guide to learn more about the latest risk management strategies and systems securing organizations worldwide

Get Your Free Copy



The Human Connection: A Mindset for the Coming Year
I would like to suggest a New Year's Resolution for my peers in the security industry: Focus on the outcome the other person is seeking, and if you agree with it, help make it happen.
Read the Full Column
by Keith Ibarguen



The Need for Survivable, Trustworthy Secure Systems
Cyber resiliency measures (i.e., architectural design, technologies, operational practices) assume that today's threat actors can achieve a foothold in an organization's infrastructure and in turn post-exploit activities must be contained and eliminated.
Read the Full Column
by Torsten George



5 Ways to Reduce the Risk of Ransomware to Your OT Network
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Read the Full Column
by Galina Antova



Planning for the Future: What's Ahead in 2022
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.
Read the Full Column
by Landon Winkelvoss





Upskilling Cyber Defenders Requires a Readiness Environment
To sharpen and learn cybersecurity skills, security professionals need to 'play' in a safe, yet stimulating place that provides hands-on, interactive upskilling.
Read the Full Column
by Jeff Orloff




Recent Ransomware Trends Reinforce the Need for Cyber Hygiene, Collaboration
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.
Read the Full Column
by Derek Manky



Connect: The Fourth Pillar of Industrial Cybersecurity
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Read the Full Column
by Yaniv Vardi




Cybersecurity is Under Assault, And It's Growing Worse
It is a good idea to assume that your network has already been breached, even if no overtly malicious notifications have surfaced.
Read the Full Column
by Marie Hattar




Work-from-Anywhere Requires "Work-from-Anywhere Security"
Security must be as agile as today's workforce, ensuring consistent protection and optimal user experience regardless of where a user or device operates.
Read the Full Column
by John Maddison



The First Building Block for the SOC of the Future is Data
You risk limiting the value you can derive from your next security investment without first thinking about your top use cases and the capabilities needed to address them.
Read the Full Column
by Marc Solomon



What a Departure Email Can Teach Us About Security
Regardless of how often someone resigns, departure emails do bring to light a common problem in the cybersecurity field. There is, however, another side to departure emails that many of us don't consider.
Read the Full Column
by Joshua Goldfarb




Prediction Season: What's in Store for Cybersecurity in 2022?
While it might be overwhelming to look at the critical threats on the horizon you need to prepare for, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization's risk exposure.
Read the Full Column
by Torsten George



Security Frameworks Guide

Guide:
Mitigating Evolving Risk with the Right Security Framework

Download the free guide to learn more about the latest risk management strategies and systems securing organizations worldwide

Get Your Free Copy




See All Recent Articles at SecurityWeek.Com

Security Frameworks Guide

Researchers Dive Into Equation Group Tool 'DoubleFeature': Check Point security researchers publish findings from a deep-dive into DoubleFeature, a component of the Equation Group's DanderSpritz post-exploitation framework. Read More

Shutterfly Says Ransomware Attack Impacted Manufacturing: The company says credit card data, financial information, and social security numbers were not compromised in the incident. Read More

Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution: Tasks designed to perform build operations have been abused for the execution of malicious code. Read More

State Workers to Be Paid on Time Despite Ransomware Attack: State workers in West Virginia will be paid on time this week despite a ransomware attack that affected a software provider that helps manage the state's payroll system. Read More

DuckDuckGo Signals Entry Into Desktop Browser Market: DuckDuckGo plans to ship a privacy-centric desktop browser built from scratch to compete with Google's Chrome and Microsoft's Edge. Read More

High-Risk Flaw Haunts Apache Server: The Apache HTTP Server 2.4.52 is listed as urgent and CISA is calling on user to "update as soon as possible." Read More

IT Services Firm Inetum Discloses Ransomware Attack: The company says the incident had only a limited impact on its operations. Read More

Jackson Public Schools Ups Cybersecurity After Hacker Attack: The public school district in Mississippi's capital city is implementing new cybersecurity measures after hackers attacked its server last year. Read More

Organizations Targeted With Babuk-Based Rook Ransomware: First spotted at the end of November, the malware appears compiled out of leaked Babuk code. Read More

New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking: Schneider Electric has patched several new vulnerabilities that expose its EVlink electric vehicle charging stations to remote hacking. Read More

Albanian Prime Minister Apologizes Over Database Leak: Albania's prime minister on Thursday apologized for a big leak of personal records from a government database of state and private employees, which he said seems more like an inside job than a cyber attack. Read More

NVIDIA, HPE Products Affected by Log4j Vulnerabilities: The two companies have confirmed that some of their products are using the vulnerable Log4j logging utility. Read More

Several Critical Vulnerabilities Found in myPRO HMI/SCADA Product: A researcher has found several critical vulnerabilities in the myPRO HMI/SCADA product made by mySCADA. Read More

Microsoft Office Patch Bypassed for Malware Distribution in Apparent 'Dry Run': Based on publicly available proof-of-concept code, the attack bypasses the patch for CVE-2021-40444 by enclosing malicious documents in RAR archives. Read More

Five Eyes Nations Issue Joint Guidance on Log4j Vulnerabilities: The US, Canada, Australia, New Zealand and the UK have released a joint cybersecurity advisory with mitigation guidance for the recent Log4j vulnerabilities. Read More

400,000 Individuals Affected by Email Breach at West Virginia Healthcare Company: Patient data and other information potentially compromised during unauthorized access to Monongalia Health System emails. Read More

Research: Simulated Phishing Tests Make Organizations Less Secure: A long-term phishing experiment at a 56,000-employee company ends with a caution around the use of simulated phishing lures in corporate security awareness training exercises. Read More

Microsoft Confirms 'NotLegit' Azure Flaw Exposed Source Code Repositories: Researchers warn that the vulnerability has existed since September 2017 and has likely been exploited in the wild. Read More

Ubisoft Confirms Unauthorized Access to 'Just Dance' User Data: French video game company Ubisoft this week confirmed that 'Just Dance' user data was compromised in a recent cybersecurity incident. Read More

CISA Says No Federal Agencies Compromised in Log4Shell Attacks to Date: CISA says it's currently not aware of any confirmed breaches at federal agencies resulting from Log4Shell attacks. Read More

Virginia Still Working to Fix Issues After Ransomware Attack: The information technology agency that serves Virginia's legislature is still working to fix problems caused by a ransomware attack earlier this month, a state official said Tuesday. Read More

Targeted Links Used to Steal Tens of Millions in Global Scam Campaign: Scammers targeted tens of millions of users in 90 countries, stealing $80 million per month. Read More

Poland Rejects Accusations of 'Political' Spyware Use: Poland on Tuesday rejected accusations that it had used Pegasus spying software for political ends after a top lawyer opposed to the current government said he had been targeted. Read More

Chinese Government Punishes Alibaba for Not Telling It First About Log4Shell Flaw: Report: The Chinese government is punishing Alibaba because the company's cloud security team did not inform the government first about the Log4Shell vulnerability. Read More

Security Frameworks Guide





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2021 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...