SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms

07/03/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies, and other sectors. “The threat actors behind the campaign are targeting Facebook business

NIST’s National Cybersecurity Center of Excellence Renews Partnerships With State, County

07/03/2023 0 Comments 0 tags

Also launched: the NIST Small Business Cybersecurity Community of Interest.

LastPass Hack: Engineer’s Failure to Update Plex Software Led to Massive Data Breach

07/03/2023 0 Comments 0 tags

The massive breach at LastPass was the result of one of its engineers failing to update Plex on their home computer, in what’s a sobering reminder of the dangers of

Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers

07/03/2023 0 Comments 0 tags

An older version of Shein’s Android application suffered from a bug that periodically captured and transmitted clipboard contents to a remote server. The Microsoft 365 Defender Research Team said it discovered the problem in version

Experts Reveal Google Cloud Platform’s Blind Spot for Data Exfiltration Attacks

06/03/2023 0 Comments 0 tags

Malicious actors can take advantage of “insufficient” forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new research has found. “Unfortunately, GCP does not provide the level

Core Members of DoppelPaymer Ransomware Gang Targeted in Germany and Ukraine

06/03/2023 0 Comments 0 tags

Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind large-scale attacks using DoppelPaymer ransomware. The operation, which took place

From Disinformation to Deep Fakes: How Threat Actors Manipulate Reality

06/03/2023 0 Comments 0 tags

Deep fakes are expected to become a more prominent attack vector. Here’s how to identify them. What are Deep Fakes? A deep fake is the act of maliciously replacing real

New HiatusRAT Malware Targets Business-Grade Routers to Covertly Spy on Victims

06/03/2023 0 Comments 0 tags

A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America at least since July 2022. The elusive campaign, dubbed Hiatus by Lumen

Announcement of Proposal to Update NIST SP 800-38E, Using the XTS-AES Mode for Confidentiality on Storage Devices

06/03/2023 0 Comments 0 tags

In August 2021, NIST’s Crypto Publication Review Board announced the review of NIST Special Publication (SP) 800-38E, Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on

NIST Cloud Computing Forensic Reference Architecture: NIST Requests Public Comments on SP 800-201

06/03/2023 0 Comments 0 tags

The initial public draft of NIST Special Publication (SP) 800-201, NIST Cloud Computing Forensic Reference Architecture, is now available for public comment. This document addresses the need to support a