Security News > 2022

iOS malware can fake iPhone shut downs to snoop on camera, microphone
2022-01-05 14:54

Historically, when malware infects an iOS device, it can be removed simply by restarting the device, which clears the malware from memory. When an iPhone is shut off, its screen naturally goes dark, the camera is turned off, 3D touch feedback does not respond to long presses, sounds from calls and notifications are muted, and all vibrations are absent.

‘Malsmoke’ Exploits Microsoft’s E-Signature Verification
2022-01-05 13:00

Threat actors are exploiting Microsoft's digital signature verification to steal user credentials and other sensitive information by delivering the ZLoader malware, which previously has been used to distribute Ryuk and Conti ransomware, researchers have found. Researchers at Check Point Research discovered the cybercriminal group Malsmoke delivering the campaign, which they traced back to November 2021, according to a report posted online Wednesday.

‘Elephant Beetle’ spends months in victim networks to divert transactions
2022-01-05 13:00

The actors inject fraudulent transactions into the network and steal small amounts over long periods, leading to an overall theft of millions of dollars. The actors need to conduct long-term surveillance and research, so the next primary goal is to remain undetected for several months.

More Russian Cyber Operations against Ukraine
2022-01-05 12:12

Both Russia and Ukraine are preparing for military operations in cyberspace.

Windows giant seeks Pluton-ic relationship with chipmaker: AMD first out of the gates with Microsoft's security processor
2022-01-05 12:11

The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. In terms of quality at the point of release, Halo Infinite has stepped out as the clear winner.

Microsoft code-sign check bypassed to drop Zloader malware
2022-01-05 11:00

A new Zloader campaign exploits Microsoft's digital signature verification to deploy malware payloads and steal user credentials from thousands of victims from 111 countries. Zloader is a banking malware first spotted back in 2015 that can steal account credentials and various types of sensitive private information from infiltrated systems.

How can SMBs extend their SecOps capabilities without adding headcount?
2022-01-05 09:01

There is an alternative way for procuring security expertise: by retaining the services of managed security service providers and managed detection and response providers. MSSPs usually assist organizations' IT departments in managing the IT infrastructure and keeping it secure by managing security equipment/systems, monitoring security logs, supervising patch management, and similar preventative security measures.

How ransomware gangs went pro
2022-01-05 08:30

Cybercriminal groups started deploying post-intrusion ransomware in 2015, which involved human attackers gaining initial access to the system and moving laterally through the organization until it found the appropriate target. Attack groups have repeatedly upped the ante, evolving with JavaScript-based ransomware and fileless attacks.

SMBs should consider new approaches for increasing their cybersecurity posture
2022-01-05 06:30

SMBs can obtain advice about cybersecurity quite easily from a plethora of resources. Extreme risks shouldn't be left unaddressed, because cyberattacks against SMBs are too common and attackers still successfully exploit human weaknesses, primarily via email.

API security: Understanding the next top attack vector
2022-01-05 06:00

While traditional application security controls remain necessary, they are not quite up to the API security challenge. There are certain basic API security practices organizations can implement to create a more resilient API security posture.