Sat.Apr 02, 2022

article thumbnail

Cyber Espionage Actor Deploying Malware Using Excel

Data Breach Today

Threat Actors Luring Ukrainian Phishing Targets to Download Malicious Files Researchers from Malwarebytes have found that cyber espionage actor UAC-0056, also known as SaintBear, UNC2589 and TA471, is now using a macro-embedded Excel document to target several entities in Ukraine, including ICTV, a private TV channel.

Phishing 261
article thumbnail

Critical CVE-2022-1162 flaw in GitLab allowed threat actors to take over accounts

Security Affairs

GitLab has addressed a critical vulnerability, tracked as CVE-2022-1162 (CVSS score of 9.1), that could allow remote attackers to take over user accounts. The CVE-2022-1162 vulnerability is related to the set of hardcoded static passwords during OmniAuth-based registration in GitLab CE/EE. “A hardcoded password was set for accounts registered using an OmniAuth provider (e.g.

Passwords 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake Cops Scammed Apple and Meta to Get User Data

WIRED Threat Level

Plus: Lapsus$ teens hit with charges, Wyze's security screwup, and Russia's cyber rampage.

article thumbnail

Anonymous leaked 15 GB of data allegedly stolen from the Russian Orthodox Church

Security Affairs

Anonymous claims to have hacked the Russian Orthodox Church ‘s charitable wing and leaked 15 GB of alleged stolen data. Anonymous continues to target Russian government entities and private businesses, this week the group claimed to have hacked the private firms Thozis Corp and Marathon Group owned by oligarchs. Now the collective announced the hack of the Russian Orthodox Church’s charitable wing and leaked 15GB of data along with 57,000 emails.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Is the end nigh for end-to-end for encryption? | Alex Hern

The Guardian Data Protection

Europe’s new Digital Markets Act aims to make larger messaging platforms ‘interoperable’ with smaller ones. No wonder the tech titans are running scared The passage of GDPR (general data protection regulation) might seem like ancient history – as does everything before 2020 – but in legislative terms it was a mere blink of an eye ago and now the European Union has moved on to the next big thing.

More Trending

article thumbnail

Tackling Supply Chain Disruption Head-on

RFID Global Solution, Inc.

“Supply chain disruption” – the aggravating phrase that was birthed during the pandemic is continuing as a thorn in the side of the global economy. Market analysts predict that progression of the Russia-Ukraine conflict and its international ramifications could produce the most dramatic and unstable supply chains since World War II. During times of crisis, … Tackling Supply Chain Disruption Head-on Read More ».

article thumbnail

UK Police charges two teenagers for their alleged role in the Lapsus$ extortion group

Security Affairs

The City of London Police charged two of the seven teenagers who were arrested for their alleged role in the LAPSUS$ data extortion gang. The duo has been released on bail after appearing in the Highbury Corner Magistrates Court court on Friday. The City of London Police charged two of the seven teenagers recently arrested by the UK police for their alleged membership in the Lapsus$ extortion gang.

Access 97
article thumbnail

Beastmode Mirai botnet now includes exploits for Totolink routers

Security Affairs

Operators behind the Mirai-based distributed denial-of-service (DDoS) botnet Beastmode (aka B3astmode) added exploits for Totolink routers. The Mirai -based distributed denial-of-service (DDoS) botnet Beastmode (aka B3astmode) now includes exploits for Totolink routers. Like most DDOS botnets, Beastmode attempt to infect other devices by launching brute-forcing attacks or exploiting multiple vulnerabilities.

IoT 96