Category: News

US Media, Retailers Targeted by New SparklingGoblin APT

The new APT uses an undocumented backdoor to infiltrate the education, retail and government sectors.

California Man Hacked iCloud Accounts to Steal Nude Photos

Hao Kou Chi pleaded guilty to four felonies in a hacker-for-hire scam that used socially engineered emails to trick people out of their credentials.

Poly Network Recoups $610M Stolen from DeFi Platform

The attacker returned the loot after being offered a gig as chief security advisor with Poly Network.

Pegasus Spyware Uses iPhone Zero-Click iMessage Zero-Day

Cybersecurity watchdog CitizenLab saw the new zero-day FORCEDENTRY exploit successfully deployed against iOS versions 14.4 & 14.6, blowing past Apple’s new BlastDoor sandboxing feature to install spyware on the iPhones…
Read more

Custom WhatsApp Build Delivers Triada Malware

Researchers have spotted the latest version of the Triada trojan targeting mobile devices via an advertising SDK.

Effective Threat-Hunting Queries in a Redacted World

Chad Anderson, senior security researcher for DomainTools, demonstrates how seemingly disparate pieces of infrastructure information can form perfect fingerprints for tracking cyberattackers’ infrastructure.

Microsoft Spills 38 Million Sensitive Data Records Via Careless Power App Configs

Data leaked includes COVID-19 vaccination records, social security numbers and email addresses tied to American Airlines, Ford, Indiana Department of Health and New York City public schools.

ProxyShell Attacks Pummel Unpatched Exchange Servers

CISA is warning about a surge of ProxyShell attacks, as Huntress discovered 140 webshells launched against 1,900 unpatched Microsoft Exchange servers.

Windows 10 Admin Rights Gobbled by Razer Devices

So much for Windows 10’s security: a zero-day in the device installer software grants admin rights just by plugging in a mouse or other compatible device.

Managing Privileged Access to Secure the Post-COVID Perimeter

Joseph Carson, chief security scientist & advisory CISO at ThycoticCentrify, discusses how to implement advanced privileged-access practices.