Advertisement

malware attack

MoonBounce UEFI implant used by spy group brings firmware security into spotlight

The MoonBounce rootkit implants a malicious driver in the Windows kernel to provide persistence and stealthiness.


cloud security / data protection / encryption / security transition

Attackers use public cloud providers to spread RATs

Cisco discovers malware campaign using Azure and AWS to spread Nanocore, Netwire and AsyncRATs.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

McAfee, FireEye merger yields Trellix, a unified XDR security company

Trellix will build on existing McAfee and Fire Eye applications, machine learning and automation technology to create an XDR platform of interoperable of products for threat prevention, detection and response.


Advertisement

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities
Cybersecurity Snippets

Security hygiene and posture management: A 2022 priority

Disjointed tools and manual processes provide an incomplete and unacceptable picture of cyber-risk.


Conceptual image of a network of executives / silhouettes of executives in motion.

New US CISO appointments, January 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.


USA / United States of America stars + stripes and binary code superimposed over The White House

Biden memo aims to bolster cybersecurity in national security systems

A national security memorandum places new cybersecurity requirements for reporting and preventing security incidents involving sensitive national security systems.


2 man with binoculars data breach research spy

What CISOs can learn about insider threats from Iran's human espionage tactics

Israel's arrest of four women recruited to spy for Iran reveals how an adversary might recruit an insider to act on its behalf.


Malicious USB dongle / memory stick / thumb drive with skull icon

BadUSB explained: How rogue USBs threaten your organization

The FBI has warned of an attack campaign that sends USB drives containing malicious software to employees. Here is what you need to know about BadUSB and mitigating its risks.


Tim Fitzgerald, CISO and SVP, Arm

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.


Cybersecurity  >  Email security threats, such as phishing

INTERPOL and Nigerian Police bust business email compromise ring, arrest 11

Operation Falcon II focused on malware skills and knowledge to track suspects thought to be members of the SilverTerrier BEC network that has harmed thousands of companies globally.


Advertisement

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

Supply chain vulnerability allows attackers to manipulate SAP transport system

The vulnerability permits malicious interference in the SAP change management and software deployment processes. SAP issues patch to protect file system from exploitation.


pharming  >  faudulent website redirect

The Prometheus traffic direction system is a major player in malware distribution

Newly discovered Prometheus uses a network of compromised websites and servers to direct victims to malware or scams.


adding processor to circuit board computer hardware

Microsoft's Pluton security processor tackles hardware, firmware vulnerabilities

Pluton-equipped Windows 11 computers are now available, but the decision to purchase them depends on your threat model.


Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia-linked cyberattacks on Ukraine: A timeline

Cyber incidents are playing a central role in the Russia-Ukraine conflict. Here's how events are unfolding along with unanswered questions.


Russian hammer and sickle / binary code

Russian cyberattacks on Ukraine raise IT security concerns

The destructive attacks follow a U.S. government warning for a "heightened state of awareness" and to follow state-sponsored threat mitigation advice.