Malwarebytes detected a credit card skimmer belonging to a potent Magecart attack threat actor on Segway's online store embedded within a favicon.ico image file.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Qualys researchers said the 12-year-old memory corruption local privilege escalation vulnerability on polkit's Set User ID program pkexec is easily exploitable by novice attackers and affects every major Linux distribution.
In the last few years Apple and other browsers have essentially demanded that all certificate authorities gradually reduce the lifecycle of digital certificates. To be able to replace tens of, or even hundreds of thousands, of certificates in a compressed time frame, on a regular basis, is going to be nearly impossible without automation solutions.
German fuel suppliers have been hit by a cyber attack threatens fuel supply. Nature of attack has yet to be identified, but the extent of the disruption would indicate ransomware or a malicious malware attack that wiped files.
Just one month into the new year, the Wormhole network breach is already the second major incident involving a DeFi project following the attack on the Qubit Finance network.
European oil terminals are reporting recent cyber attacks that have disrupted operations, collectively impacting port operations throughout Europe and Africa. Timing of cyber attacks in Europe raises questions about coordinated campaign.
The purpose of the cyber attack on WSJ appeared to be espionage, with information exfiltrated from email and Google Drive accounts since at least February 2020. Mandiant believes government-backed Chinese hackers conducted the operation.
Apple has introduced their Business Essentials offering which brings together device management, 24/7 support and cloud storage. But the move is garnering mixed responses within the community, with stakeholders involved expressing optimism and legitimate concern.
KP Snacks notified its partners to expect supply chain problems after a ransomware attack encrypted its IT systems, preventing order placement and shipment of deliveries.
Over 95,000 United States consumers lost money to social media scams in 2021. The most common type of scam involves online shopping, but the largest individual losses were caused by investment scams.