New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

February 21, 2024 at 12:27PM Cybersecurity researchers have discovered authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, could deceive users into malicious networks or allow attackers to join trusted networks without a password. Fixes are available for some systems but pending for … Read more

Library Cyber-Defenses Are Falling Down

February 21, 2024 at 08:38AM Cultural institutions like libraries and museums face increasing vulnerability to cyberattacks, as demonstrated by the recent ransomware attack on the British Library. Perpetrators seek to not only gain financially but also control and manipulate historical and cultural narratives. These institutions lack the resources needed for effective defense, requiring improved cybersecurity … Read more

Control Systems Firm PSI Struggles to Recover From Ransomware Attack

February 21, 2024 at 06:45AM German control systems provider PSI Software announced that its systems remain down after a ransomware attack in February. The company disconnected its systems from the internet to prevent data exfiltration and is still working to restore its IT infrastructure. PSI’s security team is investigating the incident, and no evidence suggests … Read more

A common goal for European cyber security

February 21, 2024 at 03:30AM The European Union introduced the original Network and Information Security (NIS) Directive in 2016 in response to growing cybersecurity threats. The upcoming NIS2 directive, effective in October 2024, expands security requirements for over 160,000 companies, with non-compliance fines reaching €10 million. Organizations are urged to prepare for increased obligations and … Read more

SaaS Compliance through the NIST Cybersecurity Framework

February 20, 2024 at 06:27AM The NIST cybersecurity framework is crucial for securing SaaS applications. Challenges arise due to varied settings in each application. Universal configurations, RBAC, limited redundancy, elimination of external admins, Admin MFA, and preventing data leaks are important. Strengthen passwords, prevent password spray attacks, and ensure proper configurations to align SaaS security … Read more

LockBit ransomware gang disrupted by global operation

February 19, 2024 at 08:25PM LockBit’s website has been seized by UK’s National Crime Agency, claiming they’ve disrupted the ransomware gang’s operations. The NCA worked with international law enforcement including the FBI in Operation Cronos. Europol takes credit, hinting the gang’s disruption. LockBit was infamous for attacks and ransomware-as-a-service, with millions in ransom payments and … Read more

Cactus ransomware claim to steal 1.5TB of Schneider Electric data

February 19, 2024 at 02:36PM The Cactus ransomware gang breached Schneider Electric’s network, claiming to have stolen 1.5TB of data and leaked 25MB as proof on the dark web. They are now extorting the company and threatening to release all the data unless a ransom is paid. Schneider Electric’s Sustainability Business division, which provides renewable … Read more

Name That Toon: Keys to the Kingdom

February 19, 2024 at 10:22AM Submit your clever cybersecurity-related caption for the chance to win a $25 Amazon gift card. Email [email protected] with the subject line “Dark Reading February Toon” or share your ideas on Twitter, Facebook, or LinkedIn. Last month’s winner, Michael L. Mustin, shared the winning caption “Your computer hasn’t been patched yet, … Read more

Russian APT ‘Winter Vivern’ Targets European Government, Military

February 17, 2024 at 03:07AM Winter Vivern, a Russia-aligned threat group, exploited cross-site scripting vulnerabilities in Roundcube webmail servers across Europe, primarily targeting government, military, and national infrastructure in Georgia, Poland, and Ukraine. Using social engineering techniques and a zero-day exploit, they gained unauthorized access to mail servers, potentially for cyber-espionage serving the interests of … Read more

Google Open Sources Magika: AI-Powered File Identification Tool

February 17, 2024 at 02:45AM Google has open-sourced Magika, an advanced AI tool to identify file types, boasting a 30% accuracy boost and up to 95% higher precision on hard-to-identify content. Amid concerns about AI misuse, Google emphasizes the need for balanced regulatory AI usage and adoption. The U.K. Information Commissioner’s Office also raises concerns … Read more