latestnews

Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise

On March 29, 2023 CrowdStrike detected malicious activity, originating from a legitimate, signed binary called 3CXDesktopApp. The binary is part of a softphone system developed by 3CX.The observed malicious activity consisted of beaconing to infrastructure controlled by the actors, leading to the deployment of second-stage payloads and in a few cases direct on-keyboard activity from …

Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise Read More »

NHS IT systems under disruption threat due to cyber attack on Capita

Capita, an internationally acclaimed business processing & outsourcing firm, is experiencing a sudden halt in the operations of its IT services and suspects a cyber attack behind the disruption. However, the company is yet to reveal it on an official note and assured that it will definitely do so after a detailed investigation gets completed. …

NHS IT systems under disruption threat due to cyber attack on Capita Read More »

Can a White House initiative compel tech companies to write safer code?

Can a White House initiative compel tech companies to write safer code? | CyberScoop Skip to main content Advertisement Advertisement Close Technology Software liability reform is a centerpiece of the Biden’s recent national cybersecurity strategy. Implementing it will be a challenge. The Microsoft logo is visible through a grid of its French headquarters on Jan. …

Can a White House initiative compel tech companies to write safer code? Read More »

New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks

A new vulnerability has been discovered in Microsoft’s Azure Service Fabric Explorer (SFX) that would enable unauthenticated, remote threat actors to execute code on a container hosted on a Service Fabric node. Dubbed Super FabriXss by the Orca Security team, the cross-site scripting (XSS) flaw (CVE-2023-23383) has a CVSS score of 8.2 and affects SFX version 9.1.1436.9590 or …

New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks Read More »

Vulkan Playbook Leak Exposes Russia’s Plans for Worldwide Cyberwar

The release of thousands of pages of confidential documents has exposed Russian military and intelligence agencies’ grand plans for using their cyberwar capabilities in disinformation campaigns, hacking operations, critical infrastructure disruption, and control of the Internet. The papers were leaked from the Russian contractor NTC Vulkan and show how Russian intelligence agencies use private companies …

Vulkan Playbook Leak Exposes Russia’s Plans for Worldwide Cyberwar Read More »

TCS gives Blackhawk Network an edge with Microsoft Cloud

Blackhawk Network is shaping the future of global branded payments — from QR code payment solutions and retail gift card programs to tailored incentives and reward programs.  The Silicon Valley-based company has been expanding its global footprint through numerous creative acquisitions. While each brought a wealth of benefits, the acquired companies’ existing processes and platforms …

TCS gives Blackhawk Network an edge with Microsoft Cloud Read More »

How TCS pioneered the ‘borderless workspace’ with Microsoft 365

Tata Consultancy Services (TCS) has always been a digital-first organization. Continuous transformation of the workplace has been a cornerstone of the company’s business model for several decades.   This approach proved its value during the COVID-19 crisis, when TCS pioneered location-independent “borderless workspaces” aided by Microsoft 365 and Microsoft Teams. The modern workplace solution suite was …

How TCS pioneered the ‘borderless workspace’ with Microsoft 365 Read More »

Malicious supply chain attack hits 3CX Desktop App

EXECUTIVE SUMMARY: On Wednesday, cyber security threat intelligence analysts uncovered a supply chain attack targeting the communications software provider 3CX and the company’s customers. 3CX is a VoIP IPBX software development firm whose 3CX phone system is used by more than 600,000 enterprises around the world, with 12 million daily users. The company’s client list …

Malicious supply chain attack hits 3CX Desktop App Read More »

Supply chain decarbonization: The missing link to net zero

Over the last seven decades, global carbon emissions have increased almost eightfold. Meanwhile, since 1980, the planet’s average temperature has risen significantly, with nine out of 10 warmest years on record having been in the last nine years. For sustainable development, it is now widely agreed that we must achieve a shared global goal of cutting carbon …

Supply chain decarbonization: The missing link to net zero Read More »

Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem

Several commercial spyware vendors developed and used zero-day exploits against iOS and Android users last year. However, their exploit chains also relied on known vulnerabilities to work, highlighting the importance of both users and device manufacturers to speed up the adoption of security patches. “The zero-day exploits were used alongside n-day exploits and took advantage …

Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem Read More »

Iowa Becomes the Sixth U.S. State to Pass a Comprehensive Consumer Privacy Law

On March 29, 2023, Iowa became the sixth U.S. state to pass comprehensive consumer privacy legislation. The new law will go into effect on January 1, 2025. Iowa’s privacy law bears substantial similarity to the Virginia, Colorado, Connecticut and Utah privacy laws, which should facilitate compliance for businesses subject to those laws. Likewise, businesses familiar …

Iowa Becomes the Sixth U.S. State to Pass a Comprehensive Consumer Privacy Law Read More »

Why 5G and edge computing are key to retail success on Microsoft Cloud

The retail industry is transforming rapidly. Modern retailers rely heavily on automation for managing inventory, shelf design, customer service, and logistics. Video cameras and sensors that allow for unique store design help to enhance the customer experience. Technology is truly powering retail transformation, setting modern stores apart from traditional brick-and-mortar ones. It is no easy …

Why 5G and edge computing are key to retail success on Microsoft Cloud Read More »

NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern

Winter Vivern (aka TA473), a Russian hacking group, has been exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra instances to access the emails of NATO officials, governments, military people, and diplomats. The CVE-2022-27926 flaw affects versions 9.0.0 of Zimbra Collaboration, which is used to host webmail portals with public access. The attackers can also exploit compromised accounts …

NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern Read More »

Tackling observability in financial services: Panel recap with Société Générale & Microsoft

Getting visibility across data silos is problematic for most financial institutions. The vast array of legacy systems, enormous data volumes, shifting regulatory requirements, and new technologies has made the practice of observability increasingly harder for organizations. So how should technology leaders think about prioritizing their investments to improve team productivity, lower costs, and drive greater …

Tackling observability in financial services: Panel recap with Société Générale & Microsoft Read More »

How a computer scientist talks to her daughter about TikTok 

How a computer scientist talks to her daughter about TikTok  | CyberScoop Skip to main content Advertisement Advertisement Close Commentary The debate over TikTok’s national security risk is lost on many young users, except if your mom is a technologist focused on global threats. Photo illustration by Kirill Kudryavtsev/AFP via Getty Images Nadya Bliss and …

How a computer scientist talks to her daughter about TikTok  Read More »

Sintesi riepilogativa delle campagne malevole nella settimana del 25 – 31 marzo 2023

31/03/2023 In questa settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento, un totale di 36 campagne malevole con obiettivi italiani mettendo a disposizione dei suoi enti accreditati i relativi 849 indicatori di compromissione (IOC) individuati. Riportiamo in seguito il dettaglio delle tipologie illustrate nei grafici, risultanti dai dati estratti dalle piattaforme del CERT-AgID e consultabili tramite la pagina delle …

Sintesi riepilogativa delle campagne malevole nella settimana del 25 – 31 marzo 2023 Read More »

CISA Warns of Vulnerabilities in Propump and Controls’ Osprey Pump Controller

The critical set of vulnerabilities allowed attackers to cause significant problems, such as taking control of the device and disrupting the water supply, among other nefarious activities. Propump and Controls, a US-based company specializing in pumping systems and automated controls, has been found to have vulnerabilities in its Osprey Pump Controller, according to a report …

CISA Warns of Vulnerabilities in Propump and Controls’ Osprey Pump Controller Read More »

The Cybersecurity Threats to Email: Explained | Nettitude

  Despite the numerous messaging apps available, email remains the most used method of formal communication. This is because email is still associated with professionalism. However, as emails are preferred among businesses, this also makes them an ideal target for cybercriminals.  Most data breaches occur for an economic reason—the attacker hopes to profit from the …

The Cybersecurity Threats to Email: Explained | Nettitude Read More »

What are the Issues Facing CISOs Trying to Secure Their APIs?

In 2023, it has never been more critical for CISOs to secure API ecosystems. There are many advantages to APIs. The main benefit is the interconnectivity of separate services and the exchange of critical data with employees, partners, and customers. But the modern company has thousands of APIs. They’re changing very quickly too. APIs are …

What are the Issues Facing CISOs Trying to Secure Their APIs? Read More »

US Space Force Requests $700M for Cybersecurity Blast Off

US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian invasion of Ukraine and ongoing war has laid bare the national interest in defending critical networks, explained Gen. B. Chance Saltzman, chief of space operations, at a recent House …

US Space Force Requests $700M for Cybersecurity Blast Off Read More »

Asset Visibility: A Critical Component of Security Hygiene

As the world becomes increasingly digitized, cybercrime has become one of the most significant threats that organizations face. Environments are expanding at a rapid pace and cybercriminals are always looking for new ways to exploit vulnerabilities in computer systems and networks, making security hygiene a high priority for preventing attacks. In this blog post, we …

Asset Visibility: A Critical Component of Security Hygiene Read More »

BingBang – A New Bing Vulnerability that Can be Exploited Without Executing a code

Azure Active Directory (AAD) has a new attack vector that affected Microsoft’s Bing.com, according to Wiz Research. A widespread AAD misconfiguration is the attack vector, making misconfigured apps vulnerable to intrusion. Microsoft’s AAD, a cloud-based identity and access management (IAM) service, is the standard authentication method for Azure App Services and Azure Functions applications. “The …

BingBang – A New Bing Vulnerability that Can be Exploited Without Executing a code Read More »

Baking AppSec into your cybersecurity budget: A recipe for efficient risk reduction

When organizations approach cybersecurity without sufficient forethought, financial support, reliable tools, and a strong strategy, they might actually increase their overall security risk by failing to protect and shrink their entire attack surface. With a more proactive approach backed by a robust budget, getting ahead of costly breaches and sensitive information leaks is a much …

Baking AppSec into your cybersecurity budget: A recipe for efficient risk reduction Read More »