Skip to main content

Microsoft Catches Austrian Company Exploiting Zero-Days

IBM Security: Cost of Data Breach Hitting All-Time Highs | AWS Announces Enhancements to Cloud Security, Privacy, Compliance:
  Your SecurityWeek Briefing Webcasts
RSS Feed
07.27.22


Wednesday, July 27, 2022


ICS Cyber Security Conference


Applied ICS Security Training Lab

This full-day lab course gives participants hands-on experience attacking and hardening a simulated power plant network to learn about common ICS vulnerabilities and defenses.

October 24, 2022

Learn More



What the Titanic Can Teach Us About Fraud?
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Read the Full Column
by Joshua Goldfarb




The Pendulum Effect and Security Automation
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Read the Full Column
by Marc Solomon





As Cybercriminals Recycle Ransomware, They're Getting Faster
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees' cyber hygiene training up to date.
Read the Full Column
by Derek Manky



Is an Infrastructure War on the Horizon?
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Read the Full Column
by Gordon Lawson






ICS Cyber Security Conference


SecurityWeek's ICS Cyber Security Conference

Join ICS users, ICS vendors, system security providers and government representatives to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

October 25-27, 2022

Register Now




See All Recent Articles at SecurityWeek.Com

Netography Atomized Network

Microsoft Catches Austrian Company Exploiting Windows, Adobe Zero-Days: Redmond's security research teams intercept multiple zero-day attacks attributed to DSIRF, a private cyber mercenary firm operating out of Austria. Read More

HUMAN Security and PerimeterX Merge on Mission to Combat Bots: Bot and fraud protection firms HUMAN Security (formerly White Ops) and PerimeterX, today announced that the two companies would merge under the HUMAN company name. Read More

Mailing List Provider WordFly Scrambling to Recover Following Ransomware Attack: WordFly has been offline for more than two weeks after ransomware encrypted data on some of its systems. Read More

IBM Security: Cost of Data Breach Hitting All-Time Highs: A global study of 550 organizations finds the average cost of a data breach reaching all-time high of $4.35 million as businesses struggle with ransomware and lack of zero trust principles. Read More

US Offers $10 Million for Information on North Korean Hackers: The US government is offering a reward of up to $10 million for information on individuals associated with North Korean state-sponsored hacking groups. Read More

Dozens of 'Luca Stealer' Malware Samples Emerge After Source Code Made Public: The source code of Rust-based Luca Stealer has been used to create over 25 samples since the beginning of July. Read More

AWS Announces Enhancements to Cloud Security, Privacy, Compliance: At its re:Inforce 2022 conference, AWS announced several enhancements to its cloud security, privacy and compliance offerings, and the launch of a new Customer Incident Response Team (CIRT). Read More

Wawa Agrees to Payment, Security Changes for '19 Data Breach: A Pennsylvania-based convenience store chain will pay $8 million to several states over a 2019 data breach that involved some 34 million payment cards. Read More

European Lawmaker Targeted With Cytrox Predator Surveillance Spyware: Reports say a Greek lawmaker in the European Parliament was targeted with malicious links trying to plant the Predator spyware program. Read More

Data Security Firm Sotero Raises $8 Million in Seed Funding: Data-focused security platform provider Sotero has raised $8 million in an extended seed funding round led by OurCrowd. Read More

New Ducktail Infostealer Targets Facebook Business Accounts via LinkedIn: Marketing and HR professionals have been targeted with Ducktail malware through LinkedIn spear phishing campaigns to hijack Facebook business accounts. Read More

Data Stolen in Breach at Security Company Entrust: Entrust suffered a data breach last month and the security company has confirmed that the attackers have stolen some files. Read More

Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards: The CosmicStrand rootkit is located in the firmware images of motherboards using the H81 chipset. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...