Security News > 2022 > September

Five Steps to Mitigate the Risk of Credential Exposure
2022-09-29 11:45

To effectively mitigate their exposure, given current threat intelligence, organizations need to focus on what is exploitable from the adversary's perspective. Validating matches between leaked credential data and the organization's identity management tools, such as Active Directory.

Differences in App Security/Privacy Based on Country
2022-09-29 11:14

The apps we downloaded from Google Play also showed differences based on country in their security and privacy capabilities. One hundred and three apps have differences based on country in their privacy policies.

Swachh City Platform Suffers Data Breach Leaking 16 Million User Records
2022-09-29 10:12

A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an Indian complaint redressal platform. Leaked details include usernames, email addresses, password hashes, mobile numbers, one-time passwords, last logged-in times, and IP addresses, among others, according to a report shared by security firm CloudSEK with The Hacker News.

Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks
2022-09-29 09:56

Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in the country following the death of Mahsa Amini in custody. The company said it has also witnessed sharing of proxies and open VPN servers to get around censorship and reports on the internet status in the country, with one group helping the anti-government demonstrators access social media sites.

Phishing activity exploded in Q2 2022
2022-09-29 08:46

The APWG's Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks - the worst quarter for phishing that APWG has ever observed. This Help Net Security video uncovers how the number of phishing attacks reported has quadrupled since early 2020.

Upgraded Prilex Point-of-Sale malware bypasses credit card security
2022-09-29 07:05

Security analysts have observed three new versions of Prilex PoS-targeting malware this year, indicating that its authors and operators are back in action. Prilex started as ATM-focused malware in 2014 and it pivoted to PoS devices in 2016.

Embedded IoT security threats and challenges
2022-09-29 05:30

IoT embedded systems combine hardware, firmware, and internet connectivity to carry out particular functions. These devices transfer real-time data via the internet for various purposes, including tracking, monitoring, and analysis.

Office exploits continue to spread more than any other category of malware
2022-09-29 05:15

The latest Internet Security Report from the WatchGuard Threat Lab shows a reduction in overall malware detections from the peaks seen in the first half of 2021, along with an increase in threats for Chrome and Microsoft Office and the ongoing Emotet botnet resurgence. "While overall malware attacks in Q2 fell off from the all-time highs seen in previous quarters, over 81% of detections came via TLS encrypted connections, continuing a worrisome upward trend," said Corey Nachreiner, CSO at WatchGuard.

Cloud security trends: What makes cloud infrastructure vulnerable to threats?
2022-09-29 04:30

The X-Force report pulls data from IBM's threat visibility, including X-Force Threat Intelligence data, hundreds of penetration tests, incident response engagements, and data provided by report contributor Intezer between July 2021 and June 2022. Cloud vulnerabilities are on the rise - Amid a sixfold increase in new cloud vulnerabilities over the past six years, 26% of cloud compromises that X-Force responded to were caused by attackers exploiting unpatched vulnerabilities, becoming the most common entry point observed.

65% of companies are considering adopting VPN alternatives
2022-09-29 04:00

Despite high awareness of VPN risks, remote work forced many companies to rely more heavily on legacy access methods during the pandemic. At the same time, cybercriminals continue to take advantage of long-standing security vulnerabilities and increased attacks on VPNs, according to Zscaler's VPN Risk Report.