Skip to main content

Microsoft Catches Austrian Company Exploiting Zero-Days

IBM Security: Cost of Data Breach Hitting All-Time Highs | AWS Announces Enhancements to Cloud Security, Privacy, Compliance:
  Your SecurityWeek Briefing Webcasts
RSS Feed
07.27.22


Wednesday, July 27, 2022


ICS Cyber Security Conference


Applied ICS Security Training Lab

This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant network to learn about common ICS vulnerabilities and defenses.

October 24, 2022

Learn More



What the Titanic Can Teach Us About Fraud?
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Read the Full Column
by Joshua Goldfarb




The Pendulum Effect and Security Automation
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Read the Full Column
by Marc Solomon





As Cybercriminals Recycle Ransomware, They're Getting Faster
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees' cyber hygiene training up to date.
Read the Full Column
by Derek Manky



Is an Infrastructure War on the Horizon?
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Read the Full Column
by Gordon Lawson






ICS Cyber Security Conference


SecurityWeek's ICS Cyber Security Conference

Join ICS users, ICS vendors, system security providers and government representatives to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

October 25-27, 2022

Register Now




See All Recent Articles at SecurityWeek.Com

Netography Atomized Network

Microsoft Catches Austrian Company Exploiting Windows, Adobe Zero-Days: Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. Read More

HUMAN Security and PerimeterX Merge on Mission to Combat Bots: Bot and fraud protection firms HUMAN Security (formerly White Ops) and PerimeterX, today announced that the two companies would merge under the HUMAN company name. Read More

Mailing List Provider WordFly Scrambling to Recover Following Ransomware Attack: WordFly has been offline for more than two weeks after ransomware encrypted data on some of its systems. Read More

IBM Security: Cost of Data Breach Hitting All-Time Highs: A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. Read More

US Offers $10 Million for Information on North Korean Hackers: The US government is offering a reward of up to $10 million for information on individuals associated with North Korean state-sponsored hacking groups. Read More

Dozens of 'Luca Stealer' Malware Samples Emerge After Source Code Made Public: The source code of Rust-based Luca Stealer has been used to create over 25 samples since the beginning of July. Read More

AWS Announces Enhancements to Cloud Security, Privacy, Compliance: At its re:Inforce 2022 conference, AWS announced several enhancements to its cloud security, privacy and compliance offerings, and the launch of a new Customer Incident Response Team (CIRT). Read More

Wawa Agrees to Payment, Security Changes for '19 Data Breach: A Pennsylvania-based convenience store chain will pay $8 million to several states over a 2019 data breach that involved some 34 million payment cards. Read More

European Lawmaker Targeted With Cytrox Predator Surveillance Spyware: Reports say a Greek lawmaker in the European Parliament was targeted with malicious links trying to plant the Predator spyware program. Read More

Data Security Firm Sotero Raises $8 Million in Seed Funding: Data-focused security platform provider Sotero has raised $8 million in an extended seed funding round led by OurCrowd. Read More

New Ducktail Infostealer Targets Facebook Business Accounts via LinkedIn: Marketing and HR professionals have been targeted with Ducktail malware through LinkedIn spear phishing campaigns to hijack Facebook business accounts. Read More

Data Stolen in Breach at Security Company Entrust: Entrust suffered a data breach last month and the security company has confirmed that the attackers have stolen some files. Read More

Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards: The CosmicStrand rootkit is located in the firmware images of motherboards using the H81 chipset. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...