Skip to main content

Russia vs Ukraine - The War in Cyberspace | "Most Advanced Piece of Malware" From China

Super-Stealthy 'Daxin' Backdoor Linked to Chinese Threat Actor
  Your SecurityWeek Briefing Webcasts
RSS Feed
02.28.22


Monday, February 28, 2022


Kubernetes security content

Kubernetes Triple Play

• How does Kubernetes really work?
• Can you secure Docker Swarm?
• Confused about PCI compliance for containers?

Get our new three-pack of Kubernetes security content to answer these questions and more.

Download Now



3 Steps Security Leaders Can Take Toward Closing the Skills Gap
By scoping job descriptions realistically and incorporating automation and intelligence sharing to enable analyst success and growth, there's a lot that security leaders can do to help close the skills gap in their organizations.
Read the Full Column
by Marc Solomon


Are You Prepared for 2022's More Destructive Ransomware?
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.
Read the Full Column
by Derek Manky





COVID's Silver Lining: The Acceleration of the Extended IoT
Given the range and complexity of XIoT, it's understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Read the Full Column
by Galina Antova


The SASE Conversation in 2022, a Resolution for the Future
SASE is gaining momentum and can ensure that users receive the correct, risk-based level of access to systems at any moment in time.
Read the Full Column
by Laurence Pitt




Protecting Cryptocurrencies and NFTs - What's Old is New
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Read the Full Column
by Joshua Goldfarb




Bridging the Gap Between Training and Behavior"
While employees want to do the right thing when it comes to protecting their organization from cyber threats, we cannot expect them to be perfect.
Read the Full Column
by Gordon Lawson





Think Big, Start Small, Move Fast: Applying Lessons From The Mayo Clinic to Cybersecurity
How the Mayo Clinic's concept of "Think Big, Start Small, Move Fast" has also helped to advance the product development and cybersecurity domains as well.
Read the Full Column
by Keith Ibarguen



The Third Building Block for the SOC of the Future: Balanced Automation
When automation is consciously balanced between humans and machines, we can ensure security teams always have the best tool for the job.
Read the Full Column
by Marc Solomon




In the Hacker's Crosshairs: K-12 Schools
Schools should take measures to identify and secure sensitive data, keep devices up-to-date, and ensure that their endpoint security controls are working.
Read the Full Column
by Torsten George





Combating the Surge in Retail Theft and E-Commerce Fraud With Open Source Intelligence
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Read the Full Column
by Landon Winkelvoss



Seven Ways to Ensure Successful Cross-Team Security Initiatives
While there are many approaches to successfully accomplishing cross-team security initiatives, these seven points are helpful when working to push these efforts across the finish line.
Read the Full Column
by Joshua Goldfarb




Living Off the "Edge" of the Land
Living-off-the-land attacks are effective because they allow attackers to hide their activities in legitimate processes and makes it harder for defenders to detect them. These tools also make attack attribution much harder.
Read the Full Column
by Derek Manky



Kubernetes security content

Kubernetes Triple Play

• How does Kubernetes really work?
• Can you secure Docker Swarm?
• Confused about PCI compliance for containers?

Get our new three-pack of Kubernetes security content to answer these questions and more.

Download Now




See All Recent Articles at SecurityWeek.Com

Kubernetes security content

Russia vs Ukraine - The War in Cyberspace: Russian troops have launched a major assault on Ukraine and while their forces battle in the physical world for control over various cities and regions, a battle is also taking place in cyberspace. Read More

Super-Stealthy 'Daxin' Backdoor Linked to Chinese Threat Actor: Threat hunters at Symantec share notes on Daxin, "the most advanced piece of malware Symantec researchers have seen used by a China-linked actor." Read More

CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks: Two U.S. agencies release IOCs for two malware families used in destructive, data-wiping cyberattacks targeting organizations in Ukraine. Read More

Swedish Security Solutions Provider Axis Hit by Cyberattack: Axis, a Sweden-based Canon subsidiary that specializes in cameras and other physical security solutions, has been hit by a cyberattack that disrupted operations. Read More

Anonymous Hacker Group Targets Russian State Media: Hacker group Anonymous claimed responsibility on Monday for disrupting the work of websites of pro-Kremlin Russian media in protest of the invasion of Ukraine. Read More

CISA Urges Organizations to Patch Actively Exploited Zimbra XSS Vulnerability: The vulnerability was addressed in early February, but exploitation has been ongoing since December 2021. Read More

Conti Chats Leaked After Ransomware Gang Expresses Support for Russia: Tens of thousands of messages exchanged between Conti ransomware operators have been leaked online after the cybercrime group expressed support for Russia as it invaded Ukraine. Read More

Web Application Security Startup Feroot Banks $11 Million in Seed Funding: The company will use the investment to accelerate product development and go-to-market strategies. Read More

Stealthy 'SockDetour' Backdoor Used in Attacks on U.S. Defense Contractors: SockDetour is a custom backdoor that has been deployed when the primary backdoor was removed. Read More

NSO Sues Israeli Paper After Explosive Articles on Police: The Israeli tech company NSO Group filed a libel lawsuit against an Israeli newspaper after it published a series of explosive articles claiming Israeli police unlawfully used its spyware on dozens of public figures. Read More

Attacks From Within Seen as a Growing Threat to Elections: Election officials preparing for this year's midterms have yet another security concern to add to an already long list that includes death threats, disinformation, ransomware and cyberattacks — threats from within. Read More

Email Security and Brand Protection Firm Red Sift Raises $54 Million: Red Sift has raised $54 million in a Series B funding round for its email security and brand protection platform. Read More

US, UK Warn of Iranian Cyberattacks on Government, Commercial Networks: The Iranian government-sponsored APT MuddyWater is targeting organizations across multiple sectors, including government, defense, telecoms, and oil and natural gas. Read More

Ransomware Used as Decoy in Destructive Cyberattacks on Ukraine: Attackers had access to targeted organizations' networks for months before deploying HermeticWiper. Read More

BlueVoyant Raises $250 Million to Boost Technical Capabilities, Global Expansion: With over $500 million in funding and "unicorn" valuation, the company plans to use the investment to accelerate global expansion. Read More

Cyber Attack Risks Poised to Soar as Russia Attacks Ukraine: Russia's military assault against Ukraine is likely to be accompanied by a wave of cyberattacks that could wreak havoc on computer systems far beyond the countries' borders, security experts warn. Read More

GE SCADA Product Vulnerabilities Show Importance of Secure Configurations: GE releases patches and mitigations for high-severity vulnerabilities in Proficy CIMPLICITY HMI/SCADA software. Read More

Nigerian Admits in US Court to Hacking Payroll Company: A Nigerian national pleaded guilty in a U.S. court to his role in a scheme to hack into thousands of user accounts maintained by a payroll processing company. Read More

Cloudflare Plans to Acquire Email Security Startup Area 1: Cloudflare has announced plans to purchase Area 1, a Kleiner-Perkins-backed startup doing business in the competitive email security space. Read More

NSA Informs Cisco of Vulnerability Exposing Nexus Switches to DoS Attacks: Cisco releases patches as part of the February 2022 Semiannual FXOS and NX-OS security updates. Read More

Deadbolt Ransomware Targeting Asustor NAS Devices: Both QNAP and Asustor NAS devices are being targeted in ransomware attacks. Read More

New York Plans Cybersecurity Hub to Coordinate Responses: New York wants to improve its cybersecurity defenses and will open a joint operations center in the coming months to coordinate between government agencies, critical businesses and utilities. Read More

Russia, Ukraine and the Danger of a Global Cyberwar: Just as Russia launched attacks against Ukraine in what was called a "special military operation", SecurityWeek spoke to Marcus Willett to get insight into the role of cyber in aggressive geopolitics. Read More

Belden Sells Tripwire for $350M After Acquiring It for $710M: Belden has sold Tripwire to HelpSystems for $350 million after acquiring it in 2015 for $710 million. Read More

Kubernetes security content





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...

Euler Hermes Group recherche un/e Economic Research + 8 nouvelles offres de "Work Home Online"

Postulez aux offres publiĆ©es par Euler Hermes Group, Focus Home Interactive et CyberGhost  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ...

Microsoft Confirms Exploitation of 'Follina' Zero-Day Vulnerability

Surefire Cyber Tackles Incident Response With $10M Series A Funding Visit SecurityWeek.Com  | Advertise  | Contact   Webcasts RSS Feed 05.31.22 Tuesday, May 31, 2022 94% of Orgs Had an Insider Security Breach See 5 tips on reducing internal security risks. See How Learn to Use This First: Four Fundamental Tactics to Protect Email Ecosystems As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start. Read the Full Column by Keith Ibarguen Defending t...