Security News

Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networks
2023-07-26 13:13

A deeper analysis of a recently discovered malware called Decoy Dog has revealed that it's a significant upgrade over the Pupy RAT, an open-source remote access trojan it's modeled on. Other new features allow the malware to execute arbitrary Java code on the client and connect to emergency controllers using a mechanism that's similar to a traditional DNS domain generation algorithm, with the Decoy Dog domains engineered to respond to replayed DNS queries from breached clients.

The Alarming Rise of Infostealers: How to Detect this Silent Threat
2023-07-26 10:53

According to the new Uptycs' whitepaper, Stealers are Organization Killers, a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems. A stealer is a type of malware that targets its victim by stealing sensitive information that can include passwords, login credentials, and other personal data.

macOS Under Attack: Examining the Growing Threat and User Perspectives
2023-07-25 11:24

Inventive attackers are specifically targeting Mac systems, as seen with the "Geacon" Cobalt Strike tool attack. To understand the state of cybersecurity on the Mac, the Moonlock team, a dedicated group of MacPaw's researchers and engineers focused on the cybersecurity needs of Mac users, conducted a survey.

How to Create a Custom Security & Threat Dashboard in Power BI
2023-07-25 11:17

Want a custom security dashboard to bring together data from multiple places? Microsoft Power BI can do that and help you spot what's changing. If the security tools you use don't have the right dashboards and reports to help you see at a glance what's going on with your systems, you can build them yourself in Power BI - and you don't need to be an expert in analytics to create something useful.

S3 Ep144: When threat hunting goes down a rabbit hole
2023-07-20 20:58

Listeners will probably know that Virus Total is a very popular service where, if you've got a file that either you know it's malware and you want to know what lots of different products call it, or if you think, "Maybe I want to get the sample securely to as many vendors as possible, as quickly as possible". The file is meant to be made available to dozens of cybersecurity companies almost immediately.

Threat Actors are Targeting Your Web Applications – Here’s How To Protect Them
2023-07-20 14:02

Below we explore the motivations behind these threats, the most prevalent attack strategies, and the steps you can take to protect your web applications. That's not to say that web applications without payment or personal data processing capabilities are immune to attacks.

Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats
2023-07-20 05:06

Microsoft on Wednesday announced that it's expanding cloud logging capabilities to help organizations investigate cybersecurity incidents and gain more visibility after facing criticism in the wake of a recent espionage attack campaign aimed at its email infrastructure. "Over the coming months, we will include access to wider cloud security logs for our worldwide customers at no additional cost," Vasu Jakkal, corporate vice president of security, compliance, identity, and management at Microsoft, said.

CISA and NSA Issue New Guidance to Strengthen 5G Network Slicing Against Threats
2023-07-19 11:50

U.S. cybersecurity and intelligence agencies have released a set of recommendations to address security concerns with 5G standalone network slicing and harden them against possible threats. "The threat landscape in 5G is dynamic; due to this, advanced monitoring, auditing, and other analytical capabilities are required to meet certain levels of network slicing service level requirements over time," the U.S. Cybersecurity and Infrastructure Security Agency and the National Security Agency said.

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns
2023-07-14 22:03

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat. Sysdig, a cloud and container security company, has released a new report on the Scarleteel threat that targets specific AWS environments for data theft and additional malicious activities.

Defend Against Insider Threats: Join this Webinar on SaaS Security Posture Management
2023-07-14 11:08

As security practices continue to evolve, one primary concern persists in the minds of security professionals-the risk of employees unintentionally or deliberately exposing vital information. While access controls, encryption, and monitoring systems are crucial for identifying and mitigating unauthorized access and suspicious activities, the increasing prevalence of cloud-based environments and the surge in SaaS application usage demand a fresh perspective on Insider Risk Management from a SaaS security standpoint.