Infosecurity News

Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium
APT group focused on classic data theft via email accounts

Water Company Says Supply Safe After Ransom Group Claims
South Staffordshire Water admits it was compromised

Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels
After deploying the initial attack, the researcher was able to escape the macOS sandbox

Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux Systems
The news comes from two different security reports published by SEKOIA and Trend Micro

Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm
The Financial Advanced Cyber Team of the FIOD started the criminal investigation in June

#DEFCON: How Sanctions Impact Internet Operators
Following government sanctions against Russia, Internet providers have had to learn how to implement actions

#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
Jen Easterly discusses the progress and challenges at CISA

Three Extradited from UK to US on $5m BEC Charges
Nigerian nationals accused of targeting US universities

New Study Reveals Serious Cyber Insurance Shortfalls
Most companies do not have enough coverage to recover from ransomware

Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
Researchers find many deployments have authentication disabled

Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger
Meta is also introducing an encrypted backup feature called Secure Storage

Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
The devices were powered by MediaTek chips and susceptible to two kinds of attacks

SolidBit Ransomware Group Recruiting New Affiliates on Dark Web
20% of the earned profit from the distribution of the ransomware will be paid to the affiliates

#BHUSA: Failure to Challenge is a Social Engineering Risk
The UK Ministry of Defence is actively training staff to confront individuals that are engaged in risky behaviours

#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
Katie Moussouris explains why simply having a bug bounty program isn't enough to fix security problems

#BHUSA: What has Changed in the Post-Stuxnet Era?
Investigative journalist Kim Zetter explains that Stuxnet continues to serves as a precedent for attacks happening now

US Unmasks Suspected Conti Ransomware Actor
State Department offers $10m reward for info on notorious group

Zeppelin Ransomware Victims May Need Multiple Decryption Keys
CISA issues new alert about RaaS variant

Recovery From NHS Ransomware Attack May Take a Month
Managed service provider Advanced publishes update on recent cyber incident

CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers
The toolkit protects election infrastructure targeted by phishing, ransomware and DDoS attacks



