• U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

    U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

    The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly carrying out ransomware attacks against healthcare facilities in the country and funneling the payments to orchestrate additional intrusions into defense, technology, and government entities across the world. “Rim Jong Hyok and his co-conspirators deployed

    Read More

  • Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

    Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

    Cybersecurity researchers are sounding the alarm over an ongoing campaign that’s leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining. Cloud security firm Wiz is tracking the activity under the name SeleniumGreed. The campaign, which is targeting older versions of Selenium (3.141.59 and prior), is believed to be underway since at least April 2023. “Unbeknownst…

    Read More

  • CrowdStrike Warns of New Phishing Scam Targeting German Customers

    CrowdStrike Warns of New Phishing Scam Targeting German Customers

    CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on the Falcon Sensor update fiasco to distribute dubious installers targeting German customers as part of a highly targeted campaign. The cybersecurity company said it identified what it described as an unattributed spear-phishing attempt on July 24, 2024, distributing an inauthentic CrowdStrike Crash Reporter

    Read More

  • Recount in Wasco County District Attorney race shows no change

    Recount in Wasco County District Attorney race shows no change

    WASCO CO. — Wasco County Clerk’s Office concluded the demand recount of the district attorney race late in the afternoon on July 21, reported Lisa Gambee, Wasco County clerk, via email.

    Read More

  • North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

    North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

    A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel…

    Read More

  • 6 Types of Applications Security Testing You Must Know About

    6 Types of Applications Security Testing You Must Know About

    Application security testing is a critical component of modern software development, ensuring that applications are robust and resilient against malicious attacks. As cyber threats continue to evolve in complexity and frequency, the need to integrate comprehensive security measures throughout the SDLC has never been more essential. Traditional pentesting provides a crucial snapshot of an

    Read More

  • Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

    Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

    Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals,” the company said. “They targeted primarily…

    Read More

  • Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

    Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

    The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers…

    Read More

  • Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized manner. Tenable has given the vulnerability the name ConfusedFunction. “An attacker could escalate their privileges to the Default Cloud Build Service Account and

    Read More

  • How a Trust Center Solves Your Security Questionnaire Problem

    How a Trust Center Solves Your Security Questionnaire Problem

    Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work. But what if there were a way to reduce or even altogether eliminate security questionnaires? The root problem isn’t a lack of great questionnaire products…

    Read More