• New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. “It appears that Cicada3301 ransomware primarily targets small to medium-sized businesses (SMBs), likely through opportunistic attacks that exploit vulnerabilities as the initial access vector,” cybersecurity

    Read More

  • Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

    Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

    Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. “This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks,” Dutch security company ThreatFabric said.…

    Read More

  • Secrets Exposed: Why Your CISO Should Worry About Slack

    Secrets Exposed: Why Your CISO Should Worry About Slack

    In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this: It’s a typical Tuesday in…

    Read More

  • New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system’s permissions-based model, which revolves around the Transparency, Consent, and Control (TCC) framework. “If successful, the adversary could gain any privileges already granted to the affected

    Read More

  • Animal control on the ballot on Skamania County

    Animal control on the ballot on Skamania County

    SKAMANIA CO. — A 0.03% increase in sales tax could get Skamania County’s dogs, horses and other assorted creatures a dedicated animal control officer to answer their emergencies. The public safety tax to fund animal control in Skamania County, proposed…

    Read More

  • News briefs: Aug. 28, 2024

    News briefs: Aug. 28, 2024

    Notice of recount in Klickitat County; Advocacy Lunch Sept. 11

    Read More

  • macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

    macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

    Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT. The artifacts “almost exactly replicate the functionality of the Windows version of the backdoor and differ only in the payload, which is received in the form of shell scripts from the…

    Read More

  • Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

    Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

    The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed high-severity security flaw impacting Versa Director. The attacks targeted four U.S. victims and one non-U.S. victim in the Internet service provider (ISP), managed service provider (MSP) and information technology (IT) sectors as…

    Read More

  • CTEM in the Spotlight: How Gartner’s New Categories Help to Manage Exposures

    CTEM in the Spotlight: How Gartner’s New Categories Help to Manage Exposures

    Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations report takes important steps to organize and mature the domain of Continuous Threat Exposure Management, aka CTEM. Three categories within this domain are included in this year’s report: Threat Exposure Management, Exposure Assessment Platforms (EAP),…

    Read More

  • Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

    Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

    Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. “ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface,” security researcher Johann Rehberger said. “This…

    Read More