Malware

CISA funding to top $3 billion under Biden’s FY 2024 budget

President Biden released his FY 2024 budget proposal that seeks a bigger budget for the Cybersecurity and Infrastructure Security Agency (CISA) and greater cyber investigative capabilities for the FBI. The budget also calls for increasing the federal government’s IT modernization efforts, exploring cybersecurity efforts surrounding gender-based cybercrimes, expanding efforts to counter China’s problematic behaviors, and helping Ukraine better defend itself on the digital front. “The Budget continues to invest in cybersecurity programs recognizing that cybersecurity…

Read More

Attacks on SonicWall appliances linked to Chinese campaign: Mandiant

A persistent malware targeting unpatched SonicWall Secure Mobile Access (SMA) appliances has been linked to a Chinese campaign dating back to 2021, according to a Mandiant research done in partnership with SonicWall’s in-house research team. The responsible malware, dubbed UNC4540, has been found to be stealing user credentials, providing shell access, and persisting through firmware upgrades. “This is not a new vulnerability, so a patch was not published,” a Mandiant spokesperson said. “The findings are…

Read More

Stolen credentials increasingly empower the cybercrime underground

The cybercrime underground has long functioned as an open market where sellers of products and services are paired with buyers and contractors. One of the most valuable commodities on this market are stolen credentials since they can provide attackers with access into networks, databases, and other assets owned by organizations. It’s no surprise to see cybercriminals focused on this valuable commodity. “Last year, 4,518 data breaches were reported,” researchers from Flashpoint said in a new…

Read More

New Chinese regulatory body expected to streamline data governance rules

A new data regulation body that China is reportedly set to create is expected to clarify and establish new data sovereigny rules for multinational companies and accelerate tech-based initatives such as public administration services built on anonymized citizen data. The new governent body will streamline data governance policies in the country, amid increasing confusion from businesses that deal with multiple bodies presiding over different aspects of data governance within the country’s borders, according to a…

Read More

Congressional health insurance service hit by data breach

A health insurance marketplace that provides coverage for members of the US Congress and congressional staffers was found to be compromised on Wednesday, according to a letter apparently sent from House Chief Administrative Officer Catherine L. Szpindor to members of that chamber. Szpindor’s office would not directly confirm or deny the authenticity of the letter, which was first published on Twitter by a reporter for the right-wing Daily Caller news site. However, a spokesperson for…

Read More

New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic

It is highly recommended to make sure all systems are fully up-to-date on patching, particularly systems that are externally facing. It appears that the threat actors are exploiting an Oracle WebLogic vulnerability from 2017, dubbed CVE-2017-10271, to establish an initial foothold in the environment. Newer versions of Oracle WebLogic are no longer vulnerable to this, so upgrading to the latest version is recommended to help prevent this attack. Likewise, implementing and maintaining endpoint security controls,…

Read More

Fortinet Warns about Critical Vulnerability in FortiOS and FortiProxy Could

Security patches are available in the following versions: • FortiOS v.6.2.13, v.6.4.12, v.7.0.10, v.7.2.4, v.7.4.0• FortiOS-6K7K v.6.2.13, v.6.4.12, v.7.0.10• FortiProxy v.2.0.12, 7.0.9, v.7.0.9 Fortinet also advises customers to disable the HTTP/HTTPS administration interface or restrict the IP addresses that can access it as workarounds. It is recommended for organizations to implement these changes to secure administration interfaces, regardless of their vulnerability management cycle and patch deployment. https://thehackernews.com/2023/03/new-critical-flaw-in-fortios-and.html

Read More

Qilin Claims Ransomware Attack on Elderly Care Facility

These attacks can have severe consequences for both the affected organization and its clients or customers, as sensitive information can be leaked or lost, and operations can be disrupted.To prevent these attacks, organizations must take measures to secure their networks and train employees on how to spot and avoid phishing emails and other types of social engineering attacks. It is also essential to have a robust backup system in place so that data can be…

Read More

GitHub begins 2FA rollout for code contributors

GitHub has begun its official rollout of two-factor authentication (2FA) for developers who contribute code to the platform to enhance the security of accounts and the software supply chain. GitHub first announced its intention to mandate 2FA for all code contributors in May 2022, and will begin the first group’s enrolment on Monday, March 13. GitHub is allowing users to choose their preferred 2FA method – SMS, TOTP, security keys, or GitHub mobile. The rollout…

Read More

Lazarus group infiltrated South Korean finance firm twice last year

Lazarus group was spotted exploiting flaws in unnamed software to gain access to a South Korean finance firm twice last year.  The North Korea-linked group had infiltrated the affected company in May 2022 and again in October through the same software’s zero-day vulnerability, according to a research by AhnLab Security Emergency Response Center (ASEC).  ASEC reported the software in question to the Korean Internet and Security Agency since the vulnerability has not been fully verified…

Read More