IdentityFake DocuSign docs used to secure corporate credentials in mishing campaignSteve ZurierDecember 20, 2024DocuSign campaign one of many mobile phishing campaigns that aim to steal corporate credentials from top executives.
IoTSuspected Chinese malware operation HiatusRAT menacing IoT devicesShaun NicholsDecember 19, 2024FBI says malware operation is building a botnet out of smart cameras and video boxes.
Application securityCriminals using Google Calendar email invites to steal data from usersSteve ZurierDecember 19, 2024Phony emails include a malicious Calendar file with a link to Google Forms or Google Drawings.
Data SecurityHacker sentenced to 69 months for stealing payment card infoShaun NicholsDecember 18, 2024A 32-year-old was sentenced on criminal hacking charges related to a data-stealing malware operation.
Cloud SecurityCISA orders federal agencies to secure Microsoft 365 cloud appsSteve ZurierDecember 18, 2024CISA’s mandate for cloud apps starts with Microsoft 365 and will continue on with Google Workspace in early 2025.
RansomwareRhode Island public benefits data breached in Brain Cipher ransomware attackLaura FrenchDecember 17, 2024Attackers claimed to have stolen at least 1 TB of data from the Deloitte-maintained RIBridges system.
DevOpsAPIs risk attack mere seconds after deployment, researchers sayShaun NicholsDecember 17, 2024First-of-its-kind “honeypot” study left open to all ports in 14 locations.
Critical Infrastructure SecurityEPA, CISA warn water facilities to disconnect HMIs from internetSteve ZurierDecember 17, 2024Attackers can use tools like Shodan to hone-in on which water facilities are vulnerable, then take control of a facility.
RansomwareCleo vulnerability attacks claimed by Clop ransomware gangLaura FrenchDecember 16, 2024The group behind the 2023 MOVEit attacks says it is deleting previous victims’ data to focus on its Cleo campaign.
Endpoint/Device SecurityGoogle, Amnesty International uncover new surveillance malwareShaun NicholsDecember 16, 2024Cellebrite is one of a number of developers that develop mobile device exploit and surveillance tools marketed as "forensics" software for law enforcement agencies investigating crimes.