Infosecurity News

#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
Katie Moussouris explains why simply having a bug bounty program isn't enough to fix security problems

#BHUSA: Failure to Challenge is a Social Engineering Risk
The UK Ministry of Defence is actively training staff to confront individuals that are engaged in risky behaviours

#BHUSA: What has Changed in the Post-Stuxnet Era?
Investigative journalist Kim Zetter explains that Stuxnet continues to serves as a precedent for attacks happening now

US Unmasks Suspected Conti Ransomware Actor
State Department offers $10m reward for info on notorious group

Zeppelin Ransomware Victims May Need Multiple Decryption Keys
CISA issues new alert about RaaS variant

Recovery From NHS Ransomware Attack May Take a Month
Managed service provider Advanced publishes update on recent cyber incident

CISA Unveils Cybersecurity Toolkit to Shield US Elections From Hackers
The toolkit protects election infrastructure targeted by phishing, ransomware and DDoS attacks

Zimbra RCE Vulnerability Exploited Without Admin Privileges
Over 1,000 ZCS instances around the world were reportedly backdoored and compromised

Android Banking Trojan SOVA Comes Back With New Features Including Ransomware
SOVA v4 features new capabilities and is reportedly targeting more than 200 mobile applications

#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
The CSRB concluded that the initial disclosure on Log4j was done right, but there is still much to improve

#BHUSA: Russia's Wiper Attacks Against Ukraine Detailed
According to researchers, Russia is rolling out a growing list of wiper attacks against Ukraine

#BHUSA: Chris Krebs Explains How Cybersecurity Can Improve
Former US CISA Director Chris Krebs opens Black Hat USA detailing the state of cybersecurity today

#BHUSA: New Open Source Group Set to Streamline Threat Detection
New open source project set to reduce operational pain for SecOps analysts

Ransomware Data Theft Epidemic Fuelling BEC Attacks
Accenture warns that stolen data is flooding the cybercrime underground

Suspected $3m Romance Scammer Extradited to Japan
Interpol warns of growing role of money mules

DeathStalker's VileRAT Continues to Target Foreign and Crypto Exchanges
The campaign is not only ongoing, the threat actors increased its efforts to compromise targets using VileRAT

Cyber-criminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Reports
The report shows an 11% rise in archive files containing malware, including LNK files

Emotet Tops List of July's Most Widely Used Malware
The Emotet botnet continues to evolve and now includes a credit card stealer module

Predator Pleads Guilty After Targeting Thousands of Girls Online
West Sussex man blackmailed his victims

Exploit Activity Surges 150% in Q2 Thanks to Log4Shell
Malware and botnet detections also soar



