Infosecurity News

Chinese Threat Actors Target Europe in SmugX Campaign
The attacks rely on novel delivery methods to deploy a variant of PlugX

Meduza Stealer Targets Windows Users With Advanced Tactics
Uptycs discovered the new threat while monitoring dark web forums and Telegram channels

TSMC Targeted by LockBit via Supplier Breach
The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment

Croydon Council Hit With Enforcement Notice For FOI Fail
ICO continues policy of not fining public sector organizations

International Police Operation Dismantles Phone Scam Network
Elderly victims suffer losses in the millions of dollars

Musk Losing Battle of Bad Bots as Rate Limits Begin
Growing number of Twitter users voice disquiet

Switzerland’s Security Report: Impact of Russia–Ukraine Conflict
The increasing rivalry between significant powers heavily influences the country's security

Critical Flaw Exposes ArcServe Backup to Remote Code Execution
MDSec ActiveBreach said the flaw affects versions 7.0 to 9.0 of the software

8Base Ransomware Group Emerges as Major Threat
VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics

LockBit Claims TSMC Hack, Demands $70m Ransom
If confirmed, it could be the fourth-largest ransom demand of all time

MITRE Announces Most Dangerous Software Weaknesses
CWE Top 25 list is calculated from two years of vulnerability data

GCHQ Reveals Details of State-Backed Breach
Cyber-espionage incident occurred 20 years ago, says NCSC

Amazon Issues Lawsuits Targeting Fake Review Brokers
E-commerce giant looks to improve customer trust in its marketplace

NSA and CISA Release Guidelines to Secure CI/CD Environments
The guidelines highlight three key threat scenarios and recommends mitigations for each

MIT Publishes Framework to Evaluate Cybersecurity Methods
It assesses information hackers could get from a victim program protected by an obfuscation scheme

Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques
Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration

LockBit Dominates Ransomware World, New Report Finds
LockBit becomes one of the first major ransomware operations to specifically target macOS

VPN and RDP Exploitation the Most Common Attack Technique
Initial access brokers still play a key role in threat supply chain

Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds
Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry

US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases
Nearly 80 individuals accused of participating in multiple schemes



