Keylogger Malware Campaign Exploits Microsoft Exchange Server Flaws to Hit Over 30 Victims

This campaign, active since at least 2021, has targeted over 30 victims in various countries, primarily in Africa and the Middle East, with government agencies being the main victims.

Cyware News – Latest Cyber News – ​Read More

Consumer-Grade Spyware App Found on US Hotel Check-in Computers

pcTattletale allows remote monitoring of Android or Windows devices and their data. The app claims to run invisibly in the background, undetectable on the target’s workstation.

Cyware News – Latest Cyber News – ​Read More

Persistent Burnout Is Still a Crisis in Cybersecurity

Burnout has been an oft-reported problem among security professionals for years. Are there any new ideas for supporting mental health in the industry?

darkreading – ​Read More

Snowflake’s Anvilogic Investment Signals Changes in SIEM Market

The joint Snowflake and Anvilogic solution would lead to reduced costs — on the order of 50% to 80%, the companies claim — and will eventually replace legacy SIEM platforms, argues Karthik Kannan, CEO of Anvilogic.

Cyware News – Latest Cyber News – ​Read More

Ransomware Fallout: 94% Experience Downtime, 40% Face Work Stoppage

According to Arctic Wolf, 66% of organizations that suffered a data breach in the last year chose to publicly disclose information regarding their incidents, while 30% only disclosed their breaches to impacted parties.

Cyware News – Latest Cyber News – ​Read More

Inside Operation Diplomatic Specter: Chinese APT Group’s Stealthy Tactics Exposed

Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent threat (APT) group as part of an ongoing cyber espionage campaign dubbed Operation Diplomatic Specter since at least late 2022.
“An analysis of this threat actor’s activity reveals long-term espionage operations against at least seven governmental entities,” Palo Alto Networks

The Hacker News – ​Read More

Are Your SaaS Backups as Secure as Your Production Data?

Conversations about data security tend to diverge into three main threads:

How can we protect the data we store on our on-premises or cloud infrastructure?
What strategies and tools or platforms can reliably backup and restore data?
What would losing all this data cost us, and how quickly could we get it back?

All are valid and necessary conversations for technology organizations of all shapes

The Hacker News – ​Read More

Rockwell Automation Urges Disconnection of ICS from the Internet

Rockwell Automation warned customers to disconnect industrial control systems (ICS) from the internet, citing escalating cyber threats and rising global geopolitical tensions.

Cyware News – Latest Cyber News – ​Read More

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

The post Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked appeared first on SecurityWeek.

SecurityWeek – ​Read More

UserPro Plugin Vulnerability Allows Account Takeover

Patchstack discovered the critical flaw in the plugin’s password reset mechanism, specifically within the userpro_process_form function, which allowed unauthenticated users to change the passwords of other users under certain conditions.

Cyware News – Latest Cyber News – ​Read More