Security News > 2022 > March

Phishing actors are actively abusing Calendly to kick off a clever sequence to trick targets into entering their email account credentials on the phishing page. The phishing attack begins with phishing emails generated on the Calendly platform that inform the recipient they received new Fax documents.

The US and its NATO allies should expect a "Long tail of retaliation," in the form of cyberattacks, for the sanctions imposed on Russia, says cloud security shop ExtraHop's CEO Patrick Dennis. CISA's Shields Up alert about the Russian invasion of Ukraine potentially spilling over into cyber-offensives against the US should have served as a wake-up call to organizations to improve their security posture, Dennis said in an interview with The Register.

A Belarusian threat actor known as Ghostwriter has been spotted leveraging the recently disclosed browser-in-the-browser technique as part of their credential phishing campaigns exploiting the ongoing Russo-Ukrainian conflict. The method, which masquerades as a legitimate domain by simulating a browser window within the browser, makes it possible to mount convincing social engineering campaigns.

A zero-day remote code execution vulnerability has come to light in the Spring framework shortly after a Chinese security researcher briefly leaked a proof-of-concept exploit on GitHub before deleting their account. According to cybersecurity firm Praetorian, the unpatched flaw impacts Spring Core on Java Development Kit versions 9 and later and is a bypass for another vulnerability tracked as CVE-2010-1622, enabling an unauthenticated attacker to execute arbitrary code on the target system.

It's been more than a year since the SolarWinds attack occurred, but still many organizations are unable to secure and govern the volume of machine and application identities in the form of digital certificates, an AppViewX and Ponemon Institute report reveals. More than half of organizations have experienced an incident or data breach due to digital-certificate related compromise.

In the face of increasing cyberattacks and cyber warfare, organizations are moving toward strengthening their cyber resiliency. An OpenText report provides predictions on what lies ahead. A rapid shift to remote and hybrid work, and many challenging events worldwide, have brought new security risks and expanded the attack surface.

Cryptocurrency mining groups that typically have targeted on-premises servers are now competing fiercely for servers in the cloud. "Some groups avoid the competition altogether by focusing on different aspects of the system, which results in less crossover between rival groups," the researchers observed.

In this video fro Help Net Security, Anthony Cusimano, Solutions Evangelist at Veritas, talks about the current state of enterprise backup and recovery. In the wake of the World Backup Day, enterprise backup and recovery has reached new levels of importance.

According to a recent survey conducted by the Ponemon Institute, 59% of embedded product security decision-makers say they've lost revenue due to product security concerns. Many device manufacturers struggle to prioritize product security without sacrificing production or incurring large costs.

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and application identities in the form of digital certificates, the backbone of enterprise security, according to a report from AppViewX and the Ponemon Institute. The report, based on a survey of 1,586 IT and Security professionals on the challenges and strategies in digital identity and access management, found that more than half of respondents say their organizations have experienced one or more security incidents or data breaches due to a digital-certificate related compromise within the last two years.