November 7, 2022

QUICK TEST

Map pin concept with person using a laptop computer ” data-medium-file=”https://securityledger.com/wp-content/uploads/2022/11/AdobeStock_388388207-GPS-Identity-300×178.jpeg” data-large-file=”https://securityledger.com/wp-content/uploads/2022/11/AdobeStock_388388207-GPS-Identity-1024×607.jpeg”> Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Donec id elit non mi porta gravida at eget metus. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean lacinia bibendum nulla sed consectetur. Nulla vitae elit libero, a …

QUICK TEST Read More »

Holiday Season Cyber Threat Trends for Retail, Hospitality Industries

Every holiday season, malicious threat actors ramp up their activities as consumers spend their days at home cuddled up on the couch, surfing for gifts for their loved ones. This holiday season figures to be no different. The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) released its 2022 Holiday Season Cyber Threat Trends report, …

Holiday Season Cyber Threat Trends for Retail, Hospitality Industries Read More »

The last of its kind: Analysis of a Raccoon Stealer v1 infection (Part 1)

Introduction Towards the end of March 2022, the operators of Raccoon Stealer announced the closure of the Raccoon Stealer project [1]. In May 2022, Raccoon Stealer v2 was unleashed onto the world, with huge numbers of cases being detected across Darktrace’s client base. In this series of blog posts, we will follow the development of …

The last of its kind: Analysis of a Raccoon Stealer v1 infection (Part 1) Read More »

The Power of Manual Penetration Testing in Securing Your Attack Surface

When it comes to protecting software, don’t count on automated testing to find all the vulnerabilities in your code. Here’s why manual penetration testing is more essential (and more accessible) than one might think.  Humans find vulnerable vectors automation can’t.   While it’s not breaking news that any mature DevSecOps programs should include automating application analysis …

The Power of Manual Penetration Testing in Securing Your Attack Surface Read More »

Aveanna Healthcare Data Breach Could Cost Firm More Than $1M

Fraud Management & Cybercrime , HIPAA/HITECH , Social Engineering Phishing Onslaught Caused Breach Affecting 166,000 Individuals Nationwide Marianne Kolbasuk McGee (HealthInfoSec) • November 7, 2022     A Georgia-based home healthcare and hospice provider will pay nearly $500,000 to the state of Massachusetts to end state litigation tied to a data breach affecting nearly 170,000 …

Aveanna Healthcare Data Breach Could Cost Firm More Than $1M Read More »

How Does DNS Telemetry Help Detect and Stop Threats?

Question: How can administrators use DNS telemetry to complement NetFlow data in detecting and stopping threats? David Ratner, CEO, Hyas: For many years, DevSecOps teams relied heavily on flow data (the information collected by NetFlow and similar technology) to glean insight into events occurring within their networks. However, flow data’s usefulness has waned with the …

How Does DNS Telemetry Help Detect and Stop Threats? Read More »

Alcatraz AI delivers autonomous access control to Europe and Middle Eastern markets

Alcatraz AI has expanded in the European and Middle Eastern markets. As demand for biometric access solutions that boost security while also simplifying the administrator and end user experience increases, the new offices provide the company’s network of partners and prospective end user customers with experienced sales professionals on the ground to enable more rapid …

Alcatraz AI delivers autonomous access control to Europe and Middle Eastern markets Read More »

Warren Slams Wells Fargo, Zelle Replies To Fraud Inquiry

By Dave Simpson (November 7, 2022, 10:40 PM EST) — Sen. Elizabeth Warren, D-Mass., sent letters to executives at Wells Fargo and Zelle’s parent company Monday, slamming as “evasive” and “inaccurate” their responses to her requests for information about alleged rampant fraud on the payment platform…. Read more

Cloud and Conversational AI: The Twin Pillars of Success for Today’s Contact Centers

Contact centers are evolving rapidly. The days of single-channel, telephony-based call centers are long gone. This old model has given way to the omnichannel customer experience center. In legacy call centers, the customer’s pathway through sales or service was relatively linear. Call in, speak to an agent, and (hopefully) resolve the issue. In this system, …

Cloud and Conversational AI: The Twin Pillars of Success for Today’s Contact Centers Read More »

APT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations

Summary APT-36 (also known as Transparent Tribe) is an advanced persistent threat group attributed to Pakistan that primarily targets users working at Indian government organizations. Zscaler ThreatLabz has been closely monitoring the activities of this group throughout 2022. Our tracking efforts have yielded new intelligence about this APT group that has not previously been documented. …

APT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations Read More »

Z-Library biggest collection of 12 million pirated e-books shutdown by FBI & DOJ

The primary domain names under Z-ownership Library’s were lost. An updated seizure banner supports the hypothesis that the U.S. Department of Justice and the FBI are behind the action, which is corroborated by all evidence. New information reveals that more than a hundred domains, including the “GLOBAL Electronic library,” were impacted by the move, even …

Z-Library biggest collection of 12 million pirated e-books shutdown by FBI & DOJ Read More »

Microsoft’s Certificate-Based Authentication Enables Phishing-Resistant MFA

Microsoft has removed a key obstacle facing organizations seeking to deploy phishing-resistant multifactor authentication (MFA) by enabling certificate-based authentication (CBA) in Azure Active Directory. The release of CBA in Azure AD, announced during last month’s Microsoft Ignite conference, promises to pave the way for large enterprises to migrate their on-premises AD implementations to the cloud. …

Microsoft’s Certificate-Based Authentication Enables Phishing-Resistant MFA Read More »

Former CISA Head Calls for Renewed Action to Combat Election Lies

Republican lawmakers need to forcefully condemn election-related lies, as new opportunities emerge for bad actors to undermine confidence in the electoral process, the former director of the Cybersecurity and Infrastructure Security Agency said during a Washington Post Live event on Monday.  “We need leaders to step up and speak truth to the American people about …

Former CISA Head Calls for Renewed Action to Combat Election Lies Read More »

Open Source Forensics Tool for Siemens PLCs – Microsoft Community Hub

The tool can be found here: https://github.com/microsoft/ics-forensics-tools Attacks on PLCs have become more common and complex from the Stuxnet worm in 2010, Triton in 2017, to Incontroller in 2022, with varying capabilities including manipulating PLC behavior, injecting function blocks into ladder logic, and hiding changes in project files. These attacks can disrupt supply chains and …

Open Source Forensics Tool for Siemens PLCs – Microsoft Community Hub Read More »

California Privacy Protection Agency Issues Notice of Modifications to Proposed CPRA Regulations

On November 3, 2022, the California Privacy Protection Agency (“CPPA”) issued a notice of modifications to the Proposed Regulations implementing the California Privacy Rights Act (“CPRA”). These proposed modifications come in response to public comments on, and are meant to clarify, previously issued modifications. The modifications, which are largely based on the Modified Proposed Regulations …

California Privacy Protection Agency Issues Notice of Modifications to Proposed CPRA Regulations Read More »

SolarWinds Faces Potential SEC Enforcement Act Over Orion Breach

The US Securities and Exchange Commission (SEC) appears poised to take enforcement action against SolarWinds for the enterprise software company’s alleged violation of federal securities laws when making statements and disclosures about the 2019 data breach at the company. If the SEC were to move forward, SolarWinds could face civil monetary penalties and be required …

SolarWinds Faces Potential SEC Enforcement Act Over Orion Breach Read More »

Don’t open emails from Microsoft Dynamics 365. Threat actors are exploiting its flaws to send phishing emails with legitimate Microsoft links

Microsoft’s Dynamics 365 Customer Voice is a software that is primarily used to collect customer feedback.It may be utilized to gather data into actionable insights, track consumer feedback, and conduct polls of client satisfaction. To communicate with victims, hackers are exploiting the Static Expressway. In a nutshell, it’s a method for evading security scanners that …

Don’t open emails from Microsoft Dynamics 365. Threat actors are exploiting its flaws to send phishing emails with legitimate Microsoft links Read More »

More Than a Dozen States Have Activated the National Guard to Secure Midterm Elections

At least 14 states have spun up their National Guard units to ward off cyber attacks on the national election that concludes tomorrow, but others have not. North Carolina is one of the states that has.  “This year, we’re in place to ensure that if there’s any assistance that’s needed, we’re working proactively with our …

More Than a Dozen States Have Activated the National Guard to Secure Midterm Elections Read More »