Category: News

PowerPoint Files Abused to Take Over Computers

Attackers are using socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines.

KP Snacks Left with Crumbs After Ransomware Attack

The Conti gang strikes again, disrupting the nom-merchant’s supply chain and threatening empty supermarket shelves lasting for weeks.

Supply-Chain Security Is Not a Problem…It’s a Predicament

Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne CISO Sounil Yu. We can only manage them.

Thousands of Malicious npm Packages Threaten Web Apps

Attackers increasingly are using malicious JavaScript packages to steal data, engage in cryptojacking and unleash botnets, offering a wide supply-chain attack surface for threat actors.

Charming Kitten Sharpens Its Claws with PowerShell Backdoor

The notorious Iranian APT is fortifying its arsenal with new malicious tools and evasion tactics and may even be behind the Memento ransomware.

FBI: Use a Burner Phone at the Olympics

The warning follows a Citizen Lab report that found the official, mandatory app has an encryption flaw that “can be trivially sidestepped.” Besides burners, here are more tips on staying…
Read more

Unpatched Security Bugs in Medical Wearables Allow Patient Tracking, Data Theft

Rising critical unpatched vulnerabilities and a lack of encryption leave medical device data defenseless, researcher warn.

The Account Takeover Cat-and-Mouse Game

ATO attacks are evolving. Jason Kent, hacker-in-residence at Cequence Security, discusses what new-style cyberattacks look like in the wild.

Samba ‘Fruit’ Bug Allows RCE, Full Root User Access

The issue in the file-sharing and interop platform also affects Red Hat, SUSE Linux and Ubuntu packages.

Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities

LOLBins help attackers become invisible to security platforms. Uptycs provides a rundown of the most commonly abused native utilities for Windows, Linux and macOS – and advice for protection.