• Suspicious Minds: Insider Threats in The SaaS World

    Suspicious Minds: Insider Threats in The SaaS World

    Everyone loves the double-agent plot twist in a spy movie, but it’s a different story when it comes to securing company data. Whether intentional or unintentional, insider threats are a legitimate concern. According to CSA research, 26% of companies who reported a SaaS security incident were struck by an insider.  The challenge for many is…

    Read More

  • North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry

    North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry

    The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the JavaScript package registry with the aim of infecting Windows systems, underscoring the persistent nature of their campaigns. The packages in question, harthat-api and harthat-hash, were published on July 7, 2024, according to Datadog Security Labs. Both the…

    Read More

  • New Android Spyware LianSpy Evades Detection Using Yandex Cloud

    New Android Spyware LianSpy Evades Detection Using Yandex Cloud

    Users in Russia have been the target of a previously undocumented Android post-compromise spyware called LianSpy since at least 2021. Cybersecurity vendor Kaspersky, which discovered the malware in March 2024, noted its use of Yandex Cloud, a Russian cloud service, for command-and-control (C2) communications as a way to avoid having a dedicated infrastructure and evade…

    Read More

  • Google Patches New Android Kernel Vulnerability Exploited in the Wild

    Google Patches New Android Kernel Vulnerability Exploited in the Wild

    Google has addressed a high-severity security flaw impacting the Android kernel that it said has been actively exploited in the wild. The vulnerability, tracked as CVE-2024-36971, has been described as a case of remote code execution impacting the kernel. “There are indications that CVE-2024-36971 may be under limited, targeted exploitation,” the tech giant noted in…

    Read More

  • Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

    Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

    Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and SmartScreen that could enable threat actors to gain initial access to target environments without raising any warnings. Smart App Control (SAC) is a cloud-powered security feature introduced by Microsoft in Windows 11 to block malicious, untrusted, and potentially unwanted apps from being…

    Read More

  • Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks

    Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks

    Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called STRRAT (aka Strigoi Master). “The program selling for as little as $80 on underground resources allows the adversaries to take control of corporate computers and hijack restricted data,” cybersecurity vendor BI.ZONE said in a new…

    Read More

  • The Loper Bright Decision: How it Impacts Cybersecurity Law

    The Loper Bright Decision: How it Impacts Cybersecurity Law

    The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to potential litigation over the interpretation of ambiguous laws previously decided by federal agencies. This article explores key questions for cybersecurity professionals and leaders as we enter a more contentious period of cybersecurity law. Background What…

    Read More

  • Enhancing Incident Response Readiness with Wazuh

    Enhancing Incident Response Readiness with Wazuh

    Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to enhance readiness. Improving these areas ensures a swift and effective response, minimizing damage and restoring normal operations quickly. Challenges in incident

    Read More

  • Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

    Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

    A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw, which is assigned the CVE identifier CVE-2024-6242, carries a CVSS v3.1 score of 8.4. “A vulnerability exists in the affected products that allows a threat…

    Read More

  • DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

    DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

    The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform TikTok for “flagrantly violating” children’s privacy laws in the country. The agencies claimed the company knowingly permitted children to create TikTok accounts and to view and share short-form videos and messages with adults and others…

    Read More