Infosecurity News

EvilProxy Phishing Toolkit Spotted on Dark Web Forums
The tool highlights the growth in attacks against online services and MFA authorization mechanisms

New Rules for Crypto Exchanges to Stop Sanctions Evaders
UK Treasury demands exchanges report suspected breaches

Samsung Reveals New US Data Breach
Personal info of "certain customers" was affected

IRS Leaks 120,000 Taxpayers' Personal Details
US government still working out what went wrong

US Police Deployed Obscure Smartphone Tracking Tool With No Warrants
It would allow police to search billions of mobile device-based records, including GPS data

Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard Contents
The bug was discovered by developer Jeff Johnson, who detailed his findings in a blog post

JuiceLedger Hacker Linked to First Phishing Campaign Targeting PyPI Users
JuiceLedger started poisoning open-source packages as a way to target a wider audience in August

New Ransomware Group BianLian Activity Exploding
The threat actor using the common Go programming language and a custom toolkit claims twenty victims

CISA, NSA and npm Release Software Supply Chain Guidance
Best practices are designed to help developers bolster security

UK Government Releases New AI Security Guidance
New principles set to take on adversarial machine learning

Chile and Montenegro Floored by Ransomware
Governments reveal system compromise in separate incidents

Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials
Roughly 50% of all the apps analyzed were seen using the same AWS tokens found in other apps

Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests
The malware can also check if specific products are installed, particularly security software

Apple Releases Update for iOS 12 to Patch Exploited Vulnerability
The flaw would allow the processing of maliciously crafted web content and arbitrary code execution

Standards Body Publishes Guidelines for IoT Security Testing
Document will help testers create benchmarks for security products

Detected Cyber-Threats Surge 52% in 1H 2022
Trend Micro warns of Linux-based ransomware

Microsoft Finds Account Takeover Bug in TikTok
Vulnerability impacted social media firm’s Android app

Golang-based Malware Campaign Relies on James Webb Telescope's Image
Initial infection begins with a phishing email containing a Microsoft Office attachment

Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests
The firm said the tools used to attack Cisco were also deployed to compromise one of its clients

UK Imposes Tough New Cybersecurity Rules for Telecom Providers
Ofcom will be able to issue fines for non-compliance of up to 10% of turnover



