article thumbnail

Security Affairs newsletter Round 462 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp Cybercrime BlackCat Ransomware Affiliate TTPs American Express credit cards EXPOSED in third-party vendor data breach – account numbers and names among details accessed in hack LockBit 3.0’S

Security 103
article thumbnail

Nobelium APT uses new Post-Compromise malware MagicWeb

Security Affairs

NOBELIUM focuses on government organizations, non-government organizations (NGOs), think tanks, military, IT service providers, health technology and research, and telecommunications providers. “Like domain controllers, AD FS servers can authenticate users and should therefore be treated with the same high level of security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia

Security Affairs

The announcement marks the first time that a government admitted to having used hacking as part of its military strategy during a conflict. As of March 2022, Russia had about 820 foreign-made civilian aircraft. ” concludes the report.

Military 126
article thumbnail

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The Last Watchdog

military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. In this case, one can surmise that military personnel, or perhaps a contractor, accessed the documents in question via an off-premise device connected to a home or other open WiFi network. The discovery of sensitive U.S.

Military 145
article thumbnail

Security Affairs newsletter Round 435 by Pierluigi Paganini – International edition

Security Affairs

ransomware builder used by multiple threat actors Cisco fixes 3 high-severity DoS flaws in NX-OS and FXOS software Cybercrime Unpacking the MOVEit Breach: Statistics and Analysis Cl0p Ups The Ante With Massive MOVEit Transfer Supply-Chain Exploit FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown U.S.

Security 115
article thumbnail

APT28 targets key networks in Europe with HeadLace malware

Security Affairs

The credential harvesting pages created by the group can defeat two-factor authentication and CAPTCHA challenges by relaying requests between legitimate services and compromised Ubiquiti routers. Insikt Group speculates the operation is aimed at influencing regional and military dynamics.

Military 107
article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

Remember: Culture eats strategy for breakfast and is always top-down. Blog post with links: [link] [E-Book] Comprehensive Anti-Phishing Guide Spear phishing emails remain a top attack vector for bad actors, yet most organizations still don't have an effective strategy to stop them. Don't get caught in a phishing net!