Skip to main content

Calls Mount for US Gov Clampdown on Mercenary Spyware Merchants

Cybersecurity Growth Investment Flat, M&A Activity Strong for 2022
  Your SecurityWeek Briefing Webcasts
RSS Feed
07.28.22


Thursday, July 28, 2022


Netography Atomized Network


Security for the Atomized Network

Need to discover and secure your Atomized Network? Netography has pioneered an approach to help you do just that. It's all in our latest paper.

Read Now



Securing Smart Cities from the Ground Up
For Smart Cities to truly live up to their promise, we shouldn't forget that – like all infrastructure – safety and security are a top priority.
Read the Full Column
by Marie Hattar





What the Titanic Can Teach Us About Fraud?
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Read the Full Column
by Joshua Goldfarb




The Pendulum Effect and Security Automation
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Read the Full Column
by Marc Solomon





As Cybercriminals Recycle Ransomware, They're Getting Faster
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees' cyber hygiene training up to date.
Read the Full Column
by Derek Manky



Is an Infrastructure War on the Horizon?
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Read the Full Column
by Gordon Lawson







Netography Atomized Network


Security for the Atomized Network

Need to discover and secure your Atomized Network? Netography has pioneered an approach to help you do just that. It's all in our latest paper.

Read Now




See All Recent Articles at SecurityWeek.Com

Netography Atomized Network

Calls Mount for US Gov Clampdown on Mercenary Spyware Merchants: Cybersecurity professionals from Google's threat hunting unit and the University of Toronto's Citizen Lab are upping the pressure on mercenary hacking firms selling high-end surveillance spyware with fresh calls for the U.S. government to urgently clamp down on these businesses. Read More

Cybersecurity Growth Investment Flat, M&A Activity Strong for 2022: Global markets have suffered following the first Covid-19 pandemic and the Russian invasion of Ukraine – but sales of cybersecurity software have remained strong. VC investment in cybersecurity has adapted to the world economy rather than stalled. Read More

Crackdown on BEC Schemes: 100 Arrested in Europe, Man Charged in US: Authorities in Europe have arrested close to a hundred individuals for invoice fraud as the US indicts a Florida man for role in BEC scheme. Read More

House Passes Cybersecurity Bills Focusing on Energy Sector, Information Sharing: The House has passed two cybersecurity bills: the Energy Cybersecurity University Leadership Act and the RANSOMWARE Act. Read More

Exploitation of Recent Confluence Vulnerability Underway: Security researchers are already seeing the recent Questions for Confluence hardcoded password vulnerability being exploited in attacks. Read More

Moxa NPort Device Flaws Can Expose Critical Infrastructure to Disruptive Attacks: Vulnerabilities found in Moxa's NPort devices could allow attackers to cause significant disruption, including in critical infrastructure organizations. Read More

France Closes 'Cookies' Case Against Facebook: French privacy regulators on Thursday closed a case against Facebook after determining the US tech giant had changed the way it collected user data to comply with the law. Read More

Microsoft: Attackers Increasingly Using IIS Extensions as Server Backdoors: Microsoft warns organizations of an uptick in malicious IIS extensions deployed as covert backdoors on Exchange servers. Read More

Victim of Private Spyware Warns It Can be Used Against US: Months after her father was lured back to Rwanda under false pretenses and jailed, Carine Kanimba discovered her own phone had been hacked using private spyware. Read More

Nuki Smart Lock Vulnerabilities Allow Hackers to Open Doors: NCC Group security researchers have identified 11 vulnerabilities impacting Nuki smart lock products, including some that allow attackers to open doors. Read More

Microsoft Catches Austrian Company Exploiting Windows, Adobe Zero-Days: Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. Read More

HUMAN Security and PerimeterX Merge on Mission to Combat Bots: Bot and fraud protection firms HUMAN Security (formerly White Ops) and PerimeterX, today announced that the two companies would merge under the HUMAN company name. Read More

Mailing List Provider WordFly Scrambling to Recover Following Ransomware Attack: WordFly has been offline for more than two weeks after ransomware encrypted data on some of its systems. Read More

IBM Security: Cost of Data Breach Hitting All-Time Highs: A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. Read More

US Offers $10 Million for Information on North Korean Hackers: The US government is offering a reward of up to $10 million for information on individuals associated with North Korean state-sponsored hacking groups. Read More

Dozens of 'Luca Stealer' Malware Samples Emerge After Source Code Made Public: The source code of Rust-based Luca Stealer has been used to create over 25 samples since the beginning of July. Read More

Netography Atomized Network





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...

Euler Hermes Group recherche un/e Economic Research + 8 nouvelles offres de "Work Home Online"

Postulez aux offres publiĆ©es par Euler Hermes Group, Focus Home Interactive et CyberGhost  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌   ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌  ‌ ‌ ‌ ...

Microsoft Confirms Exploitation of 'Follina' Zero-Day Vulnerability

Surefire Cyber Tackles Incident Response With $10M Series A Funding Visit SecurityWeek.Com  | Advertise  | Contact   Webcasts RSS Feed 05.31.22 Tuesday, May 31, 2022 94% of Orgs Had an Insider Security Breach See 5 tips on reducing internal security risks. See How Learn to Use This First: Four Fundamental Tactics to Protect Email Ecosystems As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start. Read the Full Column by Keith Ibarguen Defending t...