article thumbnail

North Korea-linked Konni APT uses Russian-language weaponized documents

Security Affairs

North Korea-linked Konni APT group used Russian-language Microsoft Word documents to deliver malware. FortiGuard Labs researchers observed the North Korea-linked Konni APT group using a weaponized Russian-language Word document in an ongoing phishing campaign. The Word document seems to be in the Russian language.

article thumbnail

GUEST ESSAY: A primer on content management systems (CMS) — and how to secure them

The Last Watchdog

Chances are strong that your corporate website uses a CMS, and perhaps you have a separate CMS for documents and other files shared by your employees, partners, and suppliers. Security is essential for a CMS. The newer “headless” CMS, running in the cloud, contains everything but the presentation system. Best security practices.

CMS 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

These 2 attacks allow to alter certified PDF Documents

Security Affairs

Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. The attacks are documented in CVE-2020-35931 , CVE-2021-28545 , and CVE-2021-28546. ed document by inserting annotations that include malicious code.

Privacy 102
article thumbnail

Empower and Secure your Hybrid Workplace

AIIM

With this massive transition underway, many organizations struggle to maximize productivity and resilience while building a seamless and secure digital workplace. And with multiple collaboration tools deployed, organizations lack a consolidated platform causing content management overhead, security gaps, and siloed assets.

Security 173
article thumbnail

Identity Thieves Bypassed Experian Security to View Credit Reports

Krebs on Security

Identity thieves have been exploiting a glaring security weakness in the website of Experian , one of the big three consumer credit reporting bureaus. All that was needed was the person’s name, address, birthday and Social Security number. It wouldn’t even show me the four multiple-guess questions.

Security 324
article thumbnail

GUEST ESSAY: Addressing data leaks and other privacy, security exposures attendant to M&As

The Last Watchdog

Such consolidation across markets is good news for customers and vendors alike in terms of market growth and maximizing security investments. Underlying all of this optimism, however, is the ever-present threat of cyberattack. Lack of documented evidence. They can be divided into two categories: Pre-Close Risks.

Privacy 233
article thumbnail

Microsoft: Attackers Exploiting Windows Zero-Day Flaw

Krebs on Security

warns that attackers are exploiting a previously unknown vulnerability in Windows 10 and many Windows Server versions to seize control over PCs when users open a malicious document or visit a booby-trapped website. “The attacker would then have to convince the user to open the malicious document. Microsoft Corp.

Security 316