FISSEA Summer Forum: August 23, 2023

02/05/2023 0 Comments 0 tags

The FISSEA Forums are quarterly meetings to provide opportunities for policy and programmatic updates, the exchange of best practices, and discussion and engagement among members of the Federal Information Security

Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software

02/05/2023 0 Comments 0 tags

Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The

Why Telecoms Struggle with SaaS Security

02/05/2023 0 Comments 0 tags

The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive information allows cybercriminals to inflict maximum damage through minimal effort.

BouldSpy Android Spyware: Iranian Government’s Alleged Tool for Spying on Minority Groups

02/05/2023 0 Comments 0 tags

A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups. The malware, dubbed BouldSpy, has been attributed with

Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected

02/05/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The security vulnerabilities are as follows –

North Korea’s ScarCruft Deploys RokRAT Malware via LNK File Infection Chains

02/05/2023 0 Comments 0 tags

The North Korean threat actor known as ScarCruft began experimenting with oversized LNK files as a delivery route for RokRAT malware as early as July 2022, the same month Microsoft began blocking macros across

LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

02/05/2023 0 Comments 0 tags

In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor has been observed leveraging the technique to deliver a new Windows-based financial

Wanted Dead or Alive: Real-Time Protection Against Lateral Movement

01/05/2023 0 Comments 0 tags

Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations and nation-state operators. Today, however, it has become a commoditized tool, well within

New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks

01/05/2023 0 Comments 0 tags

An analysis of over 70 billion DNS records has led to the discovery of a new sophisticated malware toolkit dubbed Decoy Dog targeting enterprise networks. Decoy Dog, as the name implies, is

Vietnamese Threat Actor Infects 500,000 Devices Using ‘Malverposting’ Tactics

01/05/2023 0 Comments 0 tags

A Vietnamese threat actor has been attributed as behind a “malverposting” campaign on social media platforms to infect over 500,000 devices worldwide over the past three months to deliver variants