Security News > 2022 > March

Calendly actively abused in Microsoft credentials phishing
2022-03-31 10:00

Phishing actors are actively abusing Calendly to kick off a clever sequence to trick targets into entering their email account credentials on the phishing page. The phishing attack begins with phishing emails generated on the Calendly platform that inform the recipient they received new Fax documents.

Expect 'long tail of cyber retaliation' from Russia for sanctions, says ExtraHop CEO
2022-03-31 09:32

The US and its NATO allies should expect a "Long tail of retaliation," in the form of cyberattacks, for the sanctions imposed on Russia, says cloud security shop ExtraHop's CEO Patrick Dennis. CISA's Shields Up alert about the Russian invasion of Ukraine potentially spilling over into cyber-offensives against the US should have served as a wake-up call to organizations to improve their security posture, Dennis said in an interview with The Register.

Hackers Increasingly Using 'Browser-in-the-Browser' Technique in Ukraine Related Attacks
2022-03-31 08:27

A Belarusian threat actor known as Ghostwriter has been spotted leveraging the recently disclosed browser-in-the-browser technique as part of their credential phishing campaigns exploiting the ongoing Russo-Ukrainian conflict. The method, which masquerades as a legitimate domain by simulating a browser window within the browser, makes it possible to mount convincing social engineering campaigns.

Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security
2022-03-31 08:27

A zero-day remote code execution vulnerability has come to light in the Spring framework shortly after a Chinese security researcher briefly leaked a proof-of-concept exploit on GitHub before deleting their account. According to cybersecurity firm Praetorian, the unpatched flaw impacts Spring Core on Java Development Kit versions 9 and later and is a bypass for another vulnerability tracked as CVE-2010-1622, enabling an unauthenticated attacker to execute arbitrary code on the target system.

Most companies don’t have a mature CLM program in place
2022-03-31 08:15

It's been more than a year since the SolarWinds attack occurred, but still many organizations are unable to secure and govern the volume of machine and application identities in the form of digital certificates, an AppViewX and Ponemon Institute report reveals. More than half of organizations have experienced an incident or data breach due to digital-certificate related compromise.

Cyber resiliency is top proactive priority for organizations
2022-03-31 08:00

In the face of increasing cyberattacks and cyber warfare, organizations are moving toward strengthening their cyber resiliency. An OpenText report provides predictions on what lies ahead. A rapid shift to remote and hybrid work, and many challenging events worldwide, have brought new security risks and expanded the attack surface.

Cryptomining groups fight fiercely for cloud resources
2022-03-31 06:27

Cryptocurrency mining groups that typically have targeted on-premises servers are now competing fiercely for servers in the cloud. "Some groups avoid the competition altogether by focusing on different aspects of the system, which results in less crossover between rival groups," the researchers observed.

The current state of enterprise backup and recovery
2022-03-31 05:55

In this video fro Help Net Security, Anthony Cusimano, Solutions Evangelist at Veritas, talks about the current state of enterprise backup and recovery. In the wake of the World Backup Day, enterprise backup and recovery has reached new levels of importance.

Where should companies start when it comes to device security?
2022-03-31 05:30

According to a recent survey conducted by the Ponemon Institute, 59% of embedded product security decision-makers say they've lost revenue due to product security concerns. Many device manufacturers struggle to prioritize product security without sacrificing production or incurring large costs.

Lack of CLM maturity is putting organizations at risk
2022-03-31 05:00

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and application identities in the form of digital certificates, the backbone of enterprise security, according to a report from AppViewX and the Ponemon Institute. The report, based on a survey of 1,586 IT and Security professionals on the challenges and strategies in digital identity and access management, found that more than half of respondents say their organizations have experienced one or more security incidents or data breaches due to a digital-certificate related compromise within the last two years.