Security News > 2023 > January

Microsoft Edge is getting split screen mode - here's how to enable it
2023-01-31 16:29

We and our store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning.

Exploit released for critical VMware vRealize RCE vulnerability
2023-01-31 16:14

Horizon3 security researchers have released proof-of-concept code for a VMware vRealize Log Insight vulnerability chain that allows attackers to gain remote code execution on unpatched appliances. Earlier today, Horizon3 published the PoC exploit and explained that the RCE exploit "Abuses the various Thrift RPC endpoints to achieve an arbitrary file write."

Microsoft disables verified partner accounts used for OAuth phishing
2023-01-31 15:13

Microsoft has disabled multiple fraudulent, verified Microsoft Partner Network accounts for creating malicious OAuth applications that breached organizations' cloud environments to steal email. In a joint announcement between Microsoft and Proofpoint, Microsoft says the threat actors posed as legitimate companies to enroll and successfully be verified as that company in the MCPP. The threat actors used these accounts to register verified OAuth apps in Azure AD for consent phishing attacks targeting corporate users in the UK and Ireland.

Using the Wazuh SIEM and XDR platform to meet PCI DSS compliance
2023-01-31 15:05

An example of a solution that helps meet PCI DSS compliance requirements is Wazuh. Wazuh helps implement PCI DSS compliance by performing log analysis, file integrity checking, configuration assessment, intrusion detection, real-time alerting, and automated response to threats.

Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts
2023-01-31 13:49

Malicious third-party OAuth apps with an evident "Publisher identity verified" badge have been used by unknown attackers to target organizations in the UK and Ireland, Microsoft has shared. Targets in these organizations who have fallen for the trick effectively allowed these rogue apps to access to their O365 email accounts and infiltrate organizations' cloud environments.

New year, new storage challenge
2023-01-31 13:01

Webinar If your IT team is making new year resolutions, one of them might be to ramp up safeguarding measures for the increasing amount of unstructured data being captured by businesses and organizations. According to Forbes Magazine, unstructured data volumes are increasing by 65 percent a year and present a growing security risk.

You Don't Know Where Your Secrets Are
2023-01-31 12:46

Do you know where your secrets are? If not, I can tell you: you are not alone. The fundamental point addressed by this model is that secrets management goes well beyond how the organization stores and distributes secrets.

Ransomware Payments Are Down
2023-01-31 12:03

Ransomware attackers extorted at least $456.8 million from victims in 2022, down from $765.6 million the year before. As always, we have to caveat these findings by noting that the true totals are much higher, as there are cryptocurrency addresses controlled by ransomware attackers that have yet to be identified on the blockchain and incorporated into our data.

New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
2023-01-31 11:08

The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place in October 2022 targeting an energy sector company in Ukraine. The use of SDelete is notable, as it suggests that Sandworm has been experimenting with the utility as a wiper in at least two different instances to cause irrevocable damage to the targeted organizations in Ukraine.

Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
2023-01-31 10:39

A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of malware such as TrickBot, Emotet, AZORult, Agent Tesla, FormBook, Cerber, Maze, and REvil over the years. "TrickGate managed to stay under the radar for years because it is transformative - it undergoes changes periodically," Check Point Research's Arie Olshtein said, calling it a "Master of disguises."