Security News > 2020 > March

A phishing campaign was recently discovered leveraging OneNote, Microsoft's digital notebook that automatically saves and syncs notes, to bypass detection tools and download malware onto victims' systems. The attacker was utilizing OneNote as a way to easily experiment with various lures that either delivered the credential-stealing Agent Tesla keylogger or linked to a phishing page - or both.

MoleRATs, a politically-motivated threat actor apparently linked to the Palestinian terrorist organization Hamas, has expanded its target list to include insurance and retail industries, Palo Alto Networks' security researchers report. Spear-phishing emails were leveraged to deliver malicious documents - mostly Word documents, but also one PDF - which in turn attempted to trick the intended victim into enabling content to run a macro, or force them into clicking a link to download a malicious payload. The Spark backdoor was used in most of these assaults, allowing the attackers to open applications and run command line commands on the compromised system.

What do the numbers and trends mean? Pandemic expert Regina Phelps analyzes the latest developments. Phelps, the founder of Emergency Management & Safety Solutions, is warning organizations to be prepared for "The long haul" - a sustained health crisis that could extend for as long as 12 months, she believes, with impacts on everything from global supply chains and regional economies to individual organizations' work-at-home practices.


Software development benefits from security checks being brought to bear early and often, but the blending of in-house and open source code has historically complicated that process, says Patrick Carey, senior director of product marketing at Synopsys. How "AppSec" is shifting left to find and eliminate defects earlier in the software development lifecycle;.

Garrison is using ARM processor chips to create a hardware defense against data breaches and malware. Instead of relying on endpoint protection or user training to improve security, the UK-based security company Garrison wants to use hardware to prevent malware infections and data breaches.

If your desktop of choice is Linux, you don't have to be without a 2FA tool, thanks to OTPClient.

The Council of the District of Columbia on Tuesday unanimously passed a bill whose goal is to expand data breach notification requirements and improve the way organizations protect personal information. Introduced in March 2019 by the Office of the Attorney General for the District of Columbia, the Security Breach Protection Amendment Act of 2019 expands the types of information for which companies are held accountable.

Data stolen from Tesco clubcards could be resold for just £2.70 a pop, reckons a price-comparison website that appears to have strayed into the dark web. "Our internal systems picked this up quickly and we immediately took steps to protect our customers and restrict access to their accounts. At no point was any customer's financial data accessed," Tesco said.

U.K. supermarket giant Tesco is warning on a credential-stuffing attack that potentially affects 600,000 members of its Clubcard loyalty program. "We are aware of some fraudulent activity around the redemption of a small proportion of our customers' Clubcard vouchers," a Tesco spokesperson told the BBC. "Our internal systems picked this up quickly and we immediately took steps to protect our customers and restrict access to their accounts."