Skip to main content

Calls Mount for US Gov Clampdown on Mercenary Spyware Merchants

Cybersecurity Growth Investment Flat, M&A Activity Strong for 2022
  Your SecurityWeek Briefing Webcasts
RSS Feed
07.28.22


Thursday, July 28, 2022


Netography Atomized Network


Security for the Atomized Network

Need to discover and secure your Atomized Network? Netography has pioneered an approach to help you do just that. It's all in our latest paper.

Read Now



Securing Smart Cities from the Ground Up
For Smart Cities to truly live up to their promise, we shouldn't forget that – like all infrastructure – safety and security are a top priority.
Read the Full Column
by Marie Hattar





What the Titanic Can Teach Us About Fraud?
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Read the Full Column
by Joshua Goldfarb




The Pendulum Effect and Security Automation
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Read the Full Column
by Marc Solomon





As Cybercriminals Recycle Ransomware, They're Getting Faster
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees' cyber hygiene training up to date.
Read the Full Column
by Derek Manky



Is an Infrastructure War on the Horizon?
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Read the Full Column
by Gordon Lawson







Netography Atomized Network


Security for the Atomized Network

Need to discover and secure your Atomized Network? Netography has pioneered an approach to help you do just that. It's all in our latest paper.

Read Now




See All Recent Articles at SecurityWeek.Com

Netography Atomized Network

Calls Mount for US Gov Clampdown on Mercenary Spyware Merchants: Cybersecurity professionals from Google's threat hunting unit and the University of Toronto's Citizen Lab are upping the pressure on mercenary hacking firms selling high-end surveillance spyware with fresh calls for the U.S. government to urgently clamp down on these businesses. Read More

Cybersecurity Growth Investment Flat, M&A Activity Strong for 2022: Global markets have suffered following the first Covid-19 pandemic and the Russian invasion of Ukraine – but sales of cybersecurity software have remained strong. VC investment in cybersecurity has adapted to the world economy rather than stalled. Read More

Crackdown on BEC Schemes: 100 Arrested in Europe, Man Charged in US: Authorities in Europe have arrested close to a hundred individuals for invoice fraud as the US indicts a Florida man for role in BEC scheme. Read More

House Passes Cybersecurity Bills Focusing on Energy Sector, Information Sharing: The House has passed two cybersecurity bills: the Energy Cybersecurity University Leadership Act and the RANSOMWARE Act. Read More

Exploitation of Recent Confluence Vulnerability Underway: Security researchers are already seeing the recent Questions for Confluence hardcoded password vulnerability being exploited in attacks. Read More

Moxa NPort Device Flaws Can Expose Critical Infrastructure to Disruptive Attacks: Vulnerabilities found in Moxa's NPort devices could allow attackers to cause significant disruption, including in critical infrastructure organizations. Read More

France Closes 'Cookies' Case Against Facebook: French privacy regulators on Thursday closed a case against Facebook after determining the US tech giant had changed the way it collected user data to comply with the law. Read More

Microsoft: Attackers Increasingly Using IIS Extensions as Server Backdoors: Microsoft warns organizations of an uptick in malicious IIS extensions deployed as covert backdoors on Exchange servers. Read More

Victim of Private Spyware Warns It Can be Used Against US: Months after her father was lured back to Rwanda under false pretenses and jailed, Carine Kanimba discovered her own phone had been hacked using private spyware. Read More

Nuki Smart Lock Vulnerabilities Allow Hackers to Open Doors: NCC Group security researchers have identified 11 vulnerabilities impacting Nuki smart lock products, including some that allow attackers to open doors. Read More

Microsoft Catches Austrian Company Exploiting Windows, Adobe Zero-Days: Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. Read More

HUMAN Security and PerimeterX Merge on Mission to Combat Bots: Bot and fraud protection firms HUMAN Security (formerly White Ops) and PerimeterX, today announced that the two companies would merge under the HUMAN company name. Read More

Mailing List Provider WordFly Scrambling to Recover Following Ransomware Attack: WordFly has been offline for more than two weeks after ransomware encrypted data on some of its systems. Read More

IBM Security: Cost of Data Breach Hitting All-Time Highs: A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. Read More

US Offers $10 Million for Information on North Korean Hackers: The US government is offering a reward of up to $10 million for information on individuals associated with North Korean state-sponsored hacking groups. Read More

Dozens of 'Luca Stealer' Malware Samples Emerge After Source Code Made Public: The source code of Rust-based Luca Stealer has been used to create over 25 samples since the beginning of July. Read More

Netography Atomized Network





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...