Security News > 2022 > July

Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default
2022-07-29 06:08

With Microsoft taking steps to block Excel 4.0 and Visual Basic for Applications macros by default across Office apps, malicious actors are responding by refining their new tactics, techniques, and procedures. In its place, adversaries are increasingly pivoting away from macro-enabled documents to other alternatives, including container files such as ISO and RAR as well as Windows Shortcut files in campaigns to distribute malware.

US court system suffered 'incredibly significant attack' – sealed files at risk
2022-07-29 04:29

The United States' federal court system "Faced an incredibly significant and sophisticated cyber security breach, one which has since had lingering impacts on the department and other agencies." That quote comes from congressional representative Jerrold Lewis Nadler, who uttered them on Thursday in his introductory remarks to a House Committee on the Judiciary hearing conducting oversight of the Department of Justice National Security Division.

Why there is no quick fix for cyber attacks
2022-07-29 04:00

Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations attempt to identify ways to lower their risk, there is no one-size-fits-all way to avoid the next attack - and for good reason.

Researchers create key tech for quantum cryptography commercialization
2022-07-29 03:30

They use quantum keys that guarantee security based on quantum physics rather than computational complexity, thus they are secure even against quantum computers. Quantum key distribution is the most important technology for realizing quantum cryptosystems.

Latest Critical Atlassian Confluence Vulnerability Under Active Exploitation
2022-07-29 03:22

A week after Atlassian rolled out patches to contain a critical flaw in its Questions For Confluence app for Confluence Server and Confluence Data Center, the shortcoming has now come under active exploitation in the wild.The bug in question is CVE-2022-26138, which concerns the use of a hard-coded password in the app that could be exploited by a remote, unauthenticated attacker to gain unrestricted access to all pages in Confluence.

Using real customer data in testing environments creates unnecessary risk
2022-07-29 03:00

A new study polling 1,000 software developers and startup employees found 29% of companies use unprotected production data in testing environments when testing and troubleshooting their company's software - increasing the risk of exposure in the event of a data breach. The study found 45% of respondents said their companies have faced a major data breach within the past five years due in part to the use of data in insecure environments.

U.S. Offers $10 Million Reward for Information on North Korean Hackers
2022-07-29 02:58

The U.S. State Department has announced rewards of up to $10 million for any information that could help disrupt North Korea's cryptocurrency theft, cyber-espionage, and other illicit state-backed activities. "If you have information on any individuals associated with the North Korean government-linked malicious cyber groups and who are involved in targeting U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act, you may be eligible for a reward," the department said in a tweet.

Microsoft Uncovers Austrian Company Exploiting Windows and Adobe Zero-Day Exploits
2022-07-29 02:58

A cyber mercenary that "Ostensibly sells general security and information analysis services to commercial customers" used several Windows and Adobe zero-day exploits in limited and highly-targeted attacks against European and Central American entities. The company, which Microsoft describes as a private-sector offensive actor, is an Austria-based outfit called DSIRF that's linked to the development and attempted sale of a piece of cyberweapon referred to as Subzero, which can be used to hack targets' phones, computers, and internet-connected devices.

The Total Economic Impact™ of Cisco Secure Firewall
2022-07-29 00:00

Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ study and examine the potential return on investment enterprises may realize by deploying Secure Firewall. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Secure Firewall on their organizations.

Cisco Secure Workload and Secure Firewall: Strong Alone, Stronger Together
2022-07-29 00:00

Traditional security architecture focused on a hardened perimeter with a vulnerable interior. Modern security practices focus instead on multiple key control points, such as the network, endpoints, applications, and identities.