Infosecurity News

Putin Speech Interrupted by DDoS Attack
Outage impacts Russian state media websites

Time Taken to Deploy Ransomware Drops 94%
Extortion found to be most common impact from cyber-attacks in 2022

Call of Duty Developer Confirms Phishing Attempt but Not Breach
Security researchers say hackers successfully exfiltrated content

New Privilege Escalation Bug Class Found on macOS and iOS
The new class of privilege escalation bugs is based on the ForcedEntry attack

Hackers Exploit Privilege Escalation Flaw on Windows Backup Service
The flaw is triggered using the Race Condition between temporary file creation and deletion

Researchers Uncover New Information Stealer 'Stealc'
Stealc is a fully featured stealer, whose development relied on Vidar, Raccoon, Mars and Redline

City Fund Managers Jailed for $8m Fraud
Trio get 12 years behind bars

Ransomware Gang Seeks to Exploit Victims' Insurance Coverage
Ransomware group tries to demonize carriers in negotiations

Fifth of Brits Have Fallen Victim to Online Scammers
Many don’t have any security controls in place, says F-Secure

Samsung Launches Message Guard to Protect Users From Cyber-Threats
The feature provides a sandbox layer isolating some image files from the rest of the device

GoDaddy Announces Source Code Stolen and Malware Installed in Breach
An unauthorized party caused the intermittent redirection of customer websites

Frebniis Malware Exploits Microsoft IIS Feature
The malware was used by a previously unknown threat actor against targets in Taiwan

FBI "Contains" Cyber-Incident on its Network
Question marks remain over what happened at New York field office

Norway Seizes Millions in North Korean Crypto
Funds were taken in attack on Ronin Network

Police Bust $41m Email Scam Gang
Criminal network comprises French and Israeli gangsters

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos
The threat actor initiated infection chains by targeting employees through WhatsApp messages

EU Cybersecurity Agency Warns Against Chinese APTs
The document directly mentions APT27, APT30, APT31, Ke3chang, Gallium and Mustang Panda

Google Report Reveals Russia's Elaborate Cyber Strategy in Ukraine
One year after the invasion of Ukraine, Google and Mandiant analyzed the cyber strategy of Russia-backed threat actors

Armenia and Azerbaijan Hackers Use OxtaRAT to Monitor Conflict
The newest version of OxtaRAT is a polyglot file combining a compiled AutoIT script and an image

UK NCSC Launches Recommendations on Supply Chain Mapping
The UK National Cybersecurity Centre’s new guidance breaks down the essentials of a good supply chain mapping (SCM) list



