NSA Appoints Dave Luber as Cybersecurity Director 

April 8, 2024 at 06:30AM Dave Luber has been named the new cybersecurity director of the NSA, succeeding Rob Joyce who retired on March 31. Luber, with over 30 years of experience in various cybersecurity roles, will lead the agency’s efforts to combat cyber threats and work with partners across the community. Key takeaways from … Read more

Head of Israeli cyber spy unit exposed … by his own privacy mistake

April 8, 2024 at 02:36AM A top Israeli spy, Yossi Sariel, was exposed after a basic error, revealing him as the author of a book. Meanwhile, multiple security vulnerabilities have been reported, including issues in Android Pixel devices, IOSix’s devices, and Ivanti Secure Connect. Additionally, Jackson County, Missouri suffered a ransomware attack, and Kaspersky reported … Read more

US government excoriates Microsoft for ‘avoidable errors’ but keeps paying for its products

April 5, 2024 at 10:37AM Government cybersecurity agencies criticize Microsoft for repeated security breaches that compromised government secrets. Despite demands for stricter action against the tech giant, Microsoft has faced no significant consequences and continues to receive substantial government contracts. Concerns about national security threats and calls for improved cybersecurity measures highlight the ongoing tension … Read more

Ivanti Pledges Security Overhaul the Day After 4 More Vulns Disclosed

April 4, 2024 at 05:51PM This year, Ivanti has revealed 11 flaws, some of which are critical, in its remote access products. Based on the meeting notes, Ivanti has disclosed a total of 11 flaws in its remote access products, with many of them being critical. Full Article

Thousands of Australian Businesses Targeted With ‘Reliable’ Agent Tesla RAT

April 4, 2024 at 02:44PM The latest campaign demonstrates the extensive capabilities and long-lasting presence of a decade-old information-stealing malware. Based on the meeting notes, it seems that the latest campaign highlights the extensive functionality and longevity of a piece of information-stealing malware that is a decade old. Full Article

Feds probe massive alleged classified US govt data theft and leak

April 4, 2024 at 02:29PM The US Department of State is investigating a cyber incident in which a criminal known as IntelBroker claimed to have stolen and leaked classified information from national security agencies. The leaked data includes confidential communications, contact info for government and military officials, and personal details of around 100,000 victims. The … Read more

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

April 4, 2024 at 12:15PM Rhadamanthys, an information-stealing malware, is being used in phishing campaigns targeting the oil and gas sector. The phishing emails use a unique lure, claiming to be from the Federal Bureau of Transportation. This campaign appears to be an evolution of the malware, possibly linked to the LockBit ransomware group. Additionally, … Read more

AI’s Dual Role on SMB Brand Spoofing

April 4, 2024 at 08:47AM Cybercriminals are leveraging AI to mimic small businesses while security architects are utilizing AI to assist small businesses in defending against cyber threats. It appears that cybercriminals are leveraging AI to impersonate small businesses, while security architects are using AI to assist small businesses in defending against such attacks. Full … Read more

Critical Vulnerability in Progress Flowmon Allows Remote Access to Systems

April 4, 2024 at 08:30AM Progress Software has released patches for a critical vulnerability in its widely used network monitoring and security solution, Flowmon, which could allow remote, unauthenticated attackers to gain access to systems. Tracked as CVE-2024-2389 with the highest severity rating, the bug was fixed in versions 11.1.14 and 12.3.5. Users should update … Read more

Considerations for Operational Technology Cybersecurity

April 4, 2024 at 08:03AM OT refers to hardware and software controlling physical devices, with unique cybersecurity needs. The convergence with IT introduces vulnerabilities. Challenges include legacy systems lacking modern security measures and the priority of safety and reliability over data integrity. Securing OT environments requires a tailored approach, considering physical processes and cyber threats. … Read more