Security News > 2022 > February

CISA urges orgs to patch actively exploited Windows SeriousSAM bug
2022-02-11 13:01

The U.S. Cybersecurity & Infrastructure Security Agency has added to the catalog of vulnerabilities another 15 security issues actively used in cyberattacks.CISA's warning about these vulnerabilities serves as a wake-up call to all system administrators that they need to prioritize installing security updates to protect the organization's network.

Ransomware crew dumps stolen Optionis files online
2022-02-11 12:29

What appears to be stolen data belonging to customers of accounting conglomerate Optionis Group has surfaced on the dark web weeks after the firm confirmed intruders had broken into its systems. The Vice Society ransomware gang dumped what appears to be thousands of files onto their dark web blog as downloadable links, as seen by The Register.

On the Irish Health Services Executive Hack
2022-02-11 12:17

The HSE did not have a Chief Information Security Officer or a "single responsible owner for cybersecurity at either senior executive or management level to provide leadership and direction. Under-resourced Information Security Managers were not performing their business as usual role but were working on evaluating security controls for the COVID-19 vaccination system.

Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)
2022-02-11 11:28

Another month, another zero-day exploited in the wild that has been fixed by Apple. Apple fixed it in iOS 15.3.1 and iPadOS 15.3.1, macOS Monterey 12.2.1, and Safari 15.3.

Log4j exploitation risk is not as high as first thought, cyber MGA says
2022-02-11 09:21

Attackers have been trying to exploit the vulnerability to compromise systems around the world to deliver cryptominers and ransomware or to establish persistent access for a future attack. According to Rotem Iram, co-founder and CEO of cyber managing general agent At-Bay, the Log4j exploitation risk isn't as high as first thought.

How Pure Storage helps customers guard against ransomware
2022-02-11 08:30

We talked to Shawn Rosemarin, global vice president for emerging technology solution sales at Pure Storage, about how the company can help customers protect themselves. It's the amount of time and the amount of data that needs to be restored that is a direct driver of how long and complex it will be for you to get to that point of restoration.

CIA illegally harvested US citizens' data, senators assert
2022-02-11 06:41

Democratic Senators Ron Wyden and Martin Heinrich, of Oregon and New Mexico respectively, on Thursday announced that in April 2021 they sent a co-signed letter [PDF] to director of national intelligence Avril Haines and CIA director William Burns, seeking expedited declassification of the Privacy and Civil Liberties Oversight Board's review of two CIA counterterrorism programs - named "Deep Dive I" and "Deep Dive II". The Deep Dives were made possible by Executive Order 12333 - a Reagan-era order that allows widespread data collection, and data-sharing with the CIA, in the name of national security. The senators wanted a review of the documents' status because they felt the CIA had conducted a bulk information collection effort that harvested data on US citizens - probably illegally.

CIA illegally harvested US citizens' data, senators assert
2022-02-11 06:41

Democratic Senators Ron Wyden and Martin Heinrich, of Oregon and New Mexico respectively, on Thursday announced that in April 2021 they sent a co-signed letter [PDF] to director of national intelligence Avril Haines and CIA director William Burns, seeking expedited declassification of the Privacy and Civil Liberties Oversight Board's review of two CIA counterterrorism programs - named "Deep Dive I" and "Deep Dive II". The Deep Dives were made possible by Executive Order 12333 - a Reagan-era order that allows widespread data collection, and data-sharing with the CIA, in the name of national security. The Senators wanted a review of the documents' status because they felt the CIA had conducted a bulk information collection effort that harvested data on US citizens - probably illegally.

Cloud security training is pivotal as demand for cloud services explode
2022-02-11 06:30

According to the Statista Cloud Market Share publication, Amazon Web Services, Microsoft Azure, and Google Cloud Platform are the three largest cloud service providers, having captured over 60% of the market between them. The cloud is no cyber security panacea, and data breaches involving the cloud show no sign of abating.

Why identity and access management strategies need a booster
2022-02-11 06:20

In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening identity strategies. The usual identity-related security issues and challenges organizations face are typically caused by outdated identity and access management solutions or a disjointed approach to identity verification, which can leave cracks and vulnerabilities in an organization's attack surface.