Recent Security News
-
Spyware Caught Masquerading as Israeli Rocket Alert Applications
October 16, 2023 at 06:24AM Israeli rocket alerting applications have been targeted by threat actors following the Israel-Gaza conflict. AnonGhost, a pro-Palestinian hacktivist group, successfully compromised at least one application, sending fake alerts including nuclear bomb messages. Another threat actor created a malicious version of the ‘RedAlert – Rocket Alerts’ app to infect users with…
-
EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits
October 16, 2023 at 06:24AM The US Environmental Protection Agency (EPA) has withdrawn cybersecurity rules for public water systems due to lawsuits filed by states and non-profit water associations. The attorney generals of Missouri, Arkansas, and Iowa challenged the requirements, arguing they would burden small towns financially. The American Water Works Association (AWWA) and the…
-
Beware: Lumma Stealer Distributed via Discord CDN
October 16, 2023 at 04:37AM Discord’s content delivery network (CDN) is being exploited by threat actors to distribute the Lumma Stealer malware, which steals user credentials. The malware is spread through direct messages, offering victims Discord Nitro boost in exchange for assistance and prompting them to download a file. Lumma Stealer can steal cryptocurrency wallets…
-
Why Zero Trust Is the Cloud Security Imperative
October 16, 2023 at 03:07AM Zero trust, a security concept, is crucial for protecting cloud environments due to the increasing prevalence of data breaches and cyberattacks. Traditional security models that rely on securing the network perimeter are ineffective in cloud environments where data is dispersed and accessed from anywhere. Zero trust emphasizes continuous verification, least…
-
3 Essential Steps to Strengthen SaaS Security
October 16, 2023 at 03:07AM Summary: SaaS applications have become essential in the business world, but their security is crucial. This article outlines three key steps for implementing SaaS security: discovering SaaS usage within the organization, performing risk assessments on each application, and managing user permissions effectively. These steps are necessary for maintaining a secure…