Search the Portal

Recent Articles

FEB21
U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and the arrest of any individual participating in the operation. "Since January 2020, LockBit actors have executed over 2,000 attacks against victims in the United States, and around the world, causing costly

The Hacker News by info@thehackernews.com (The Hacker News)
FEB21
Cyber Insights 2024: Ransomware

Ransomware insights: When ransomware first appeared, the term became associated with encrypting data. This is a misconception. The post Cyber Insights 2024: Ransomware appeared first on SecurityWeek.

Security Week by Kevin Townsend
FEB21
Researchers Devise ‘VoltSchemer’ Attacks Targeting Wireless Chargers

Researchers document VoltSchemer attacks that manipulate power voltage to take over commercial wireless chargers. The post Researchers Devise ‘VoltSchemer’ Attacks Targeting Wireless Chargers appeared first on SecurityWeek.

Security Week by Ionut Arghire
FEB21
ConnectWise Confirms ScreenConnect Flaw Under Active Exploitation

Security experts describe exploitation of the CVSS 10/10 flaw as “trivial and embarrassingly easy.” The post ConnectWise Confirms ScreenConnect Flaw Under Active Exploitation appeared first on SecurityWeek.

Security Week by Ryan Naraine
FEB21
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following a

The Hacker News by info@thehackernews.com (The Hacker News)
FEB21
Webinar Tomorrow: The Active Threat Landscape in the Cloud

Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them. The post Webinar Tomorrow: The Active Threat Landscape in the Cloud appeared first on SecurityWeek.

Security Week by SecurityWeek News
FEB21
Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes

A new Biden executive order to boost the cybersecurity of US ports highlights the risks associated with the use of Chinese cranes. The post Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes appeared first on SecurityWeek.

Security Week by Eduard Kovacs
FEB21
Apple Adds Post-Quantum Encryption to iMessage

Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks. The post Apple Adds Post-Quantum Encryption to iMessage appeared first on SecurityWeek.

Security Week by Eduard Kovacs
FEB21
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

The China-linked threat actor known as Mustang Panda has targeted various Asian countries using a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS. "The piece of customized PlugX malware is dissimilar to the general type of the PlugX malware that contains a completed backdoor command module, and that the former is only used for downloading the latter," Trend Micro researchers Sunny Lu

The Hacker News by info@thehackernews.com (The Hacker News)
FEB21
Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach

Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware. The post Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach appeared first on SecurityWeek.

Security Week by Joshua Goldfarb
FEB21
Redis Servers Targeted With New ‘Migo’ Malware

Attackers weaken Redis instances to deploy the new Migo malware and install a rootkit and cryptominers. The post Redis Servers Targeted With New ‘Migo’ Malware appeared first on SecurityWeek.

Security Week by Ionut Arghire
FEB21
Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities

Google and Mozilla resolve high-severity memory safety vulnerabilities with the latest Chrome and Firefox updates. The post Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Security Week by Ionut Arghire
FEB21
6 Ways to Simplify SaaS Identity Governance

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to identity governance need to happen across a myriad of individual SaaS apps. This presents a huge challenge for centralized IT teams who are ultimately held responsible for managing and securing app access, but can’t possibly become experts in the nuances of the native

The Hacker News by info@thehackernews.com (The Hacker News)
FEB21
Control Systems Firm PSI Struggles to Recover From Ransomware Attack

German control system solutions provider PSI Software says it is still recovering from a ransomware attack. The post Control Systems Firm PSI Struggles to Recover From Ransomware Attack appeared first on SecurityWeek.

Security Week by Ionut Arghire
FEB21
New 'VietCredCare' Stealer Targeting Facebook Advertisers in Vietnam

Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022. The malware is “notable for its ability to automatically filter out Facebook session cookies and credentials stolen from compromised devices, and assess whether these accounts manage business profiles and if they maintain a positive Meta ad credit

The Hacker News by info@thehackernews.com (The Hacker News)