Fri.Jul 16, 2021

How 'Mespinoza' Ransomware Group Hits Targets

Data Breach Today

Palo Alto Networks Report Describes Tactics of Group Leveraging Open-Source Tools The gang behind the ransomware strain known as Mespinoza, aka PYSA, is targeting manufacturers, schools and others, mainly in the U.S. and U.K., demanding ransom payments as high as $1.6

Hackers Got Past Windows Hello by Tricking a Webcam

WIRED Threat Level

The security researchers used an infrared photos and third-party hardware to best Microsoft's facial recognition tech. Security Security / Security News


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

DOD and DHS Need More Collaboration on Cybersecurity Issues

Data Breach Today

Report: Cooperation Is Required to Protect US Critical Infrastructure A greater level of cooperation is needed between the DOD and DHS to ensure that U.S. critical infrastructure is protected against various cyberthreats, according to an inspector general's report.

New enhanced Joker Malware samples appear in the threat landscape

Security Affairs

The Joker malware is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android apps on the official Google Play store laced with the Joker mobile trojan.

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

Google to Patch 8 Chrome Flaws, Including a Zero-Day

Data Breach Today

Company Also Plans to Upgrade All Page Loads to HTTPS Google will soon release a security update to address eight vulnerabilities in its Chrome browser, including a high-severity zero-day flaw that's being exploited in the wild. It also plans to upgrade all Chrome page loads to HTTPS

IT 159

More Trending

ISMG Editors’ Panel: Challenges for New CISA Leader

Data Breach Today

Discussion Also Tackles Vendor Security Issues In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the challenges ahead for the new director of the U.S.

Microsoft: New Unpatched Bug in Windows Print Spooler           


Another vulnerability separate from PrintNightmare allows for local elevation of privilege and system takeover. Vulnerabilities


Israeli Firm Candiru's Spyware Used to Target Dissidents

Data Breach Today

Researchers: Spyware Targets 100 Victims in 10 Countries Cyberattackers used spyware from the Israeli firm Candiru to target at least 100 human rights defenders, dissidents, journalists and others across 10 countries, according to researchers at the University of Toronto’s Citizen Lab, which tracks illegal hacking and surveillance.


Google Chrome 91.0.4472.164 fixes a new zero-day exploited in the wild

Security Affairs

Google Chrome 91.0.4472.164 addresses seven security vulnerabilities, including a high severity zero-day flaw exploited in the wild.

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Is Cryptocurrency-Mining Malware Due for a Comeback?

Data Breach Today

If Ransomware Should Decline as a Viable Criminal Business Model, What Comes Next? The world is now focused on ransomware, perhaps more so than any previous cybersecurity threat in history.

Mining 153

Critical Juniper Bug Allows DoS, RCE Against Carrier Networks


Telecom providers, including wireless carriers, are at risk of disruption of network service if the bug in SBR Carrier is exploited. Vulnerabilities Web Security

Risk 103

What's Next Step for REvil Ransomware Victims?

Data Breach Today

If Backups Unavailable, Victims Should Retain Encrypted Files in Case Decryptor Released Now that the REvil ransomware gang has apparently shut down, victims are in a precarious situation.

Recent Attacks Lead to Renewed Calls for Banning Ransom Payments

Dark Reading

While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Overcoming Cyberthreat Intelligence-Sharing Hurdles

Data Breach Today

While some organizations are improving their ability to share threat intelligence with other entities within the same sector, cross-sector cyber info collaboration is still often a hurdle.


Microsoft alerts about a new Windows Print Spooler vulnerability

Security Affairs

Microsoft published guidance to mitigate the impact of a new Windows Print Spooler vulnerability tracked as CVE-2021-34481 that was disclosed today. Microsoft published a security advisory for a new Windows Print Spooler vulnerability, tracked as CVE-2021-34481 , that was disclosed on Thursday.

IT 63

Analysis: Changing Nature of Ransomware Attacks

Data Breach Today

This edition of the ISMG Security Report features an analysis of comments from the former head of Britain's GCHQ intelligence agency, Robert Hannigan, on the changing nature of ransomware attacks.

REvil is Off-Line

Schneier on Security

This is an interesting development : Just days after President Biden demanded that President Vladimir V. Putin of Russia shut down ransomware groups attacking American targets, the most aggressive of the groups suddenly went off-line early Tuesday. […].

IT 62

9 Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

How to Attract More Computer Science Grads to the Cybersecurity Field

Dark Reading

With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate offers his take

3 million smiles during the pandemic - the retrospective


Retrospective of my attempt to make people smile during the COVID pandemic by performing magic tricks online for 32 weeks in a row. Blog post


Best Incident Response Tools and Services for 2021

eSecurity Planet

With major cybersecurity incidents an almost daily occurrence, organizations need an incident response plan for the likelihood that they will someday be breached. And more than ever, they also need an incident response service that can step in to help clean up those messes.

Top CVEs Trending with Cybercriminals


An analysis of criminal forums reveal what publicly known vulnerabilities attackers are most interested in. Hacks Vulnerabilities


The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

Researchers Create New Approach to Detect Brand Impersonation

Dark Reading

A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks


The Evolving Role of the CISO


Curtis Simpson, CISO at Armis, discusses the top qualities that all CISOs need to possess to excel. Cloud Security Critical Infrastructure InfoSec Insider IoT Malware Mobile Security Vulnerabilities Web Security

IoT 80

Top XDR Solutions for 2021

eSecurity Planet

Extended detection and response (XDR) has emerged in the last few years as a new approach by cybersecurity vendors to unify their products into a comprehensive security offering.

4 Future Integrated Circuit Threats to Watch

Dark Reading

Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations


4 AI Hacks to Make Sales Teams More Efficient

Over the last two years, there’s been a 76 percent increase in AI adoption across sales organizations. For sales teams, AI opens up a world of new possibilities, including automating outreach, identifying best-fit buyers, and keeping CRMs flush with fresh data. Read on to learn the four AI hacks sales teams need to improve their performance. Download the eBook today!

Connecticut enacts cybersecurity breach safe harbor

Data Protection Report

On July 6, 2021, Connecticut enacted a new law (Public Act 21-119) that creates a safe harbor for companies that followed certain cybersecurity protocols in the event there’s a security breach. The new Connecticut law is similar to the one Ohio enacted in 2018.

Windows 0-Days Used Against Dissidents in Israeli Broker’s Spyware


Candiru, aka Sourgum, allegedly sells the DevilsTongue surveillance malware to governments around the world. Government Malware Mobile Security Vulnerabilities

First National Cyber Director Formally Sworn In

Hunton Privacy

On July 12, 2021, Chris Inglis was formally sworn in as the first White House National Cyber Director. The newly established position, as well as the Office of the National Cyber Director, was created as part of the 2021 National Defense Authorization Act.