• CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

    CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

    Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash as part of a widespread outage late last week. “On Friday, July 19, 2024 at 04:09 UTC, as part of regular operations, CrowdStrike released a content configuration update for the Windows sensor to gather telemetry…

    Read More

  • Candidate Q&As: Klickitat County Board of Commissioners Districts 1, 3

    Candidate Q&As: Klickitat County Board of Commissioners Districts 1, 3

    Klickitat County Commissioner District 1, Amanda KitchingsKlickitat County Commissioner District 3, Dan Christopher and Ron Ihrig

    Read More

  • Chinese Hackers Target Taiwan and US NGO with MgBot Malware

    Chinese Hackers Target Taiwan and US NGO with MgBot Malware

    Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools. The campaign is a sign that the group “also engages in internal espionage,” Symantec’s Threat Hunter Team, part of Broadcom, said in a new report…

    Read More

  • New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure

    New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure

    Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it as the first malware strain to directly…

    Read More

  • How to Securely Onboard New Employees Without Sharing Temporary Passwords

    How to Securely Onboard New Employees Without Sharing Temporary Passwords

    The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of sharing temporary first-day passwords, which can expose organizations to security risks. Traditionally, IT departments have been cornered into either sharing passwords in plain text via email or SMS, or arranging in-person meetings to verbally…

    Read More

  • Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

    Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

    Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a Magento e-commerce site’s checkout page, allowed the malware to survive multiple cleanup attempts, the company said. The skimmer is designed to capture all the data…

    Read More

  • Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model

    Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model

    Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its “pay or consent” advertising model or risk-facing enforcement measures, including sanctions. The European Commission said the Consumer Protection Cooperation (CPC) Network has notified the social media giant that the model adopted for Facebook and Instagram…

    Read More

  • Rep. Gluesenkamp Perez announces mobile office hours in Stevenson

    Rep. Gluesenkamp Perez announces mobile office hours in Stevenson

    STEVENSON — Rep. Marie Gluesenkamp Perez (WA-03) announced she will be holding her seventh set of mobile office hours in Skamania County. Residents of Washington’s Third District will be able to walk in to get assistance with federal agencies like…

    Read More

  • Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking

    Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking

    The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced “technology suite” that runs the whole cybercrime supply chain spectrum to spearhead its operations. Infoblox…

    Read More

  • PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

    PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

    A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes. “Serverless architectures are attractive to developers and enterprises for their flexibility, cost effectiveness, and ease of use,” Google

    Read More