RSA Conference 2024 – Announcements Summary (Day 2)

Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.

The post RSA Conference 2024 – Announcements Summary (Day 2) appeared first on SecurityWeek.

SecurityWeek – ​Read More

Brandywine Realty Trust Hit by Ransomware 

Philadelphia-based real estate company Brandywine Realty Trust shuts down systems following a ransomware attack.

The post Brandywine Realty Trust Hit by Ransomware  appeared first on SecurityWeek.

SecurityWeek – ​Read More

BetterHelp to Pay $7.8 Million to 800,000 in Health Data Sharing Settlement

Following an investigation into BetterHelp’s handling of customer data, the FTC revealed in March 2023 that the service collected data without consent from its app users or website visitors, even from people who had not signed up for counseling.

Cyware News – Latest Cyber News – ​Read More

Android Update Patches Critical Vulnerability

Android’s May 2024 security update patches 38 vulnerabilities, including a critical bug in the System component.

The post Android Update Patches Critical Vulnerability appeared first on SecurityWeek.

SecurityWeek – ​Read More

The Fundamentals of Cloud Security Stress Testing

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them.
The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as possible, starting with the most critical.

The Hacker News – ​Read More

Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar.
“These enhancements aim to increase the malware’s stealthiness, thereby remaining undetected for longer periods of time,” Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report.
“Hijack

The Hacker News – ​Read More

Report: Log4J Still Among Top Exploited Vulnerabilities

In a new report, Cato observed that the Log4J exploit represented 30% of the outbound vulnerability exploitations and 18% of the inbound vulnerability exploitations detected in the first quarter of 2024.

Cyware News – Latest Cyber News – ​Read More

Combatting Deepfakes in Australia: Content Credentials is the Start

The production of deepfakes is accelerating at more than 1,500% in Australia, forcing organisations to create and adopt standards like Content Credentials.

Security | TechRepublic – ​Read More

Update: MITRE Attributes the Recent Attack to China-linked UNC5221

The attackers exploited two zero-day vulnerabilities in Ivanti Connect Secure to gain initial access to MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE) in late December 2023.

Cyware News – Latest Cyber News – ​Read More

Scattered Spider Group a Unique Challenge for Cyber Cops, FBI Leader Says

Identified by analysts in 2022, the hackers use social engineering to lure users into giving up their login credentials or one-time password codes to bypass multifactor authentication.

Cyware News – Latest Cyber News – ​Read More