Security News

API security: Understanding the next top attack vector
2022-01-05 06:00

While traditional application security controls remain necessary, they are not quite up to the API security challenge. There are certain basic API security practices organizations can implement to create a more resilient API security posture.

Microsoft Warns of Continued Attacks Exploiting Apache Log4j Vulnerabilities
2022-01-04 21:13

Microsoft is warning of continuing attempts by nation-state adversaries and commodity attackers to take advantage of security vulnerabilities uncovered in the Log4j open-source logging framework to deploy malware on vulnerable systems. "We have observed many existing attackers adding exploits of these vulnerabilities in their existing malware kits and tactics, from coin miners to hands-on-keyboard attacks."

FTC warns companies to secure consumer data from Log4J attacks
2022-01-04 20:20

The US Federal Trade Commission has warned today that it will go after any US company that fails to protect its customers' data against ongoing Log4J attacks. "The FTC intends to use its full legal authority to pursue companies that fail to take reasonable steps to protect consumer data from exposure as a result of Log4j, or similar known vulnerabilities in the future," the US government agency said.

Portugal Media Giant Impresa Crippled by Ransomware Attack
2022-01-04 13:16

Media giant Impresa, which owns the largest television station and newspaper in Portugal, was crippled by a ransomware attack just hours into 2022. The suspected ransomware gang behind the attack goes by the name Lapsus$.

Should businesses be concerned about APT-style attacks?
2022-01-04 06:00

As we enter 2022, organizations are re-evaluating their cybersecurity strategies to lower risks and best defend against potential threats. Two things to consider in that planning - in addition to the ever-growing threats of ransomware, phishing, and zero-day vulnerabilities - are nation-state and Advanced Persistent Threat-style attacks.

Ongoing Autom Cryptomining Malware Attacks Using Upgraded Evasion Tactics
2022-01-04 02:40

An ongoing crypto mining campaign has upgraded its arsenal while adding new defense evasion tactics that enable the threat actors to conceal the intrusions and fly under the radar, new research published today has revealed. Since first detected in 2019, a total of 84 attacks against its honeypot servers have been recorded to date, four of which transpired in 2021, according to researchers from DevSecOps and cloud security firm Aqua Security, who have been tracking the malware operation for the past three years.

Why the UK’s energy sector is fragile and ripe to cyber attacks
2022-01-03 05:50

One sector that I believe is ripe and particularly susceptible to cyber attacks currently is the UK's energy sector. Impacted by a surge in demand for energy by countries across the northern hemisphere, the supply chain that services the UK's critical need for gas and electricity is currently grappling with a widespread energy crisis as we head into winter.

Ransomware attacks decrease, operators started rebranding
2022-01-03 05:00

There's been an increase in the share of attacks against individuals, and also a rise in attacks involving remote access malware. The researchers believe one key reason for the change is the decrease in ransomware attacks and the fact that some major players have quit the stage.

Are Medical Devices at Risk of Ransomware Attacks?
2022-01-03 03:32

Medical device security will be a key part of hospital cybersecurity as ransomware attacks on healthcare organizations increase. In today's world, medical equipment is linked to all other connected devices in a hospital or medical care institution.

Firmware attack can drop persistent malware in hidden SSD area
2021-12-30 14:55

The attack models are for drives with flex capacity features and target a hidden area on the device called over-provisioning, which is widely used by SSD makers these days for performance optimization on NAND flash-based storage systems. One attack modeled by researchers at Korea University in Seoul targets an invalid data area with non-erased information that sits between the usable SSD space and the over-provisioning area, and whose size depends on the two.