Going Beyond Secure by Demand

November 22, 2024 at 12:39PM In June 2017, A.P. Møller – Maersk suffered a severe software attack, attributed to the NotPetya malware from a Ukraine-Russia conflict, causing $10 billion in damages. CISA’s recent Secure by Demand guidance urges buyers to ensure software safety through independent validation and comprehensive analysis, beyond just questionnaires and SBOMs. ### … Read more

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

November 22, 2024 at 12:17PM The Mysterious Elephant threat actor, also known as APT-K-47, is using advanced malware called Asynshell in recent attacks, targeting Pakistani entities. Utilizing Hajj-themed lures, they employ phishing tactics to deliver malicious files. The group has improved their methods and tools, showcasing a focus on evolving their malware since 2023. **Meeting … Read more

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

November 22, 2024 at 12:17PM A China-linked group, TAG-112, compromised Tibetan media and university websites, delivering the Cobalt Strike toolkit via malicious JavaScript. Visitors were tricked into downloading disguised malware, highlighting ongoing cyber-espionage targeting Tibet. Although linked to a more advanced group (TAG-102), TAG-112 exhibits less sophistication in its attacks. ### Meeting Takeaways – Nov … Read more

Leaky Cybersecurity Holes Put Water Systems at Risk

November 22, 2024 at 11:53AM Nearly 100 large community water systems in the U.S. possess serious cybersecurity vulnerabilities, risking water supply for 27 million Americans. Despite regulations, financial and resource constraints hinder proper security measures. Cyberattacks from various groups have targeted water systems, emphasizing a critical need for improved investment and security practices in this … Read more

Cyberattack Disrupts Systems of Gambling Giant IGT

November 22, 2024 at 11:05AM International Game Technology (IGT) experienced a cyberattack on November 17, leading to disruptions in its internal IT systems. The company has taken certain systems offline for protection, activated its incident response plan, and is investigating the matter. IGT is working to restore operations while communicating with stakeholders. ### Meeting Takeaways: … Read more

China’s Cyber Offensives Built in Lockstep With Private Firms, Academia

November 22, 2024 at 09:51AM Research reveals that numerous private cybersecurity firms and universities are aiding China in developing offensive cyber capabilities to support military and economic ambitions. This collaboration enhances cyberattacks, particularly against U.S. infrastructure, raising concerns about China’s persistent cyber threats and the complex ecosystem involving state and non-state actors. ### Meeting Takeaways … Read more

Microsoft Highlights Security Exposure Management at Ignite

November 22, 2024 at 08:43AM Microsoft has launched its Security Exposure Management offering, adding continuous threat exposure management (CTEM) to its security portfolio. This proactive approach aims to reduce breaches and improve vulnerability detection. It integrates with Microsoft 365 licenses, supports third-party tools, and provides a comprehensive view of organizational security postures. ### Meeting Takeaways … Read more

In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit 

November 22, 2024 at 08:33AM SecurityWeek summarizes key cybersecurity developments, highlighting Microsoft’s influence on U.S. government security, vulnerabilities in Bing and Android VPNs, Mozilla’s research on data risks, NSO spyware revelations, and more. Additionally, it covers AI-driven vulnerability detection, increased DocuSign attacks, and recent patches from Google, Atlassian, Nvidia, and Adobe. ### Meeting Notes Summary … Read more

US Takes Down Stolen Credit Card Marketplace PopeyeTools

November 22, 2024 at 08:04AM The US Department of Justice seized PopeyeTools, a marketplace for trading stolen credit card information, and charged three administrators. The site, operational since 2016, had over 227,000 stolen identities and generated $1.7 million. Additionally, $283,000 in cryptocurrency was seized from one administrator’s account. **Meeting Takeaways:** 1. **Seizure of PopeyeTools**: The … Read more

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

November 22, 2024 at 07:12AM Russian-linked threat group TAG-110 has been conducting a cyber espionage campaign targeting Central Asia, East Asia, and Europe, utilizing custom malware HATVIBE and CHERRYSPY. The campaign, focused on government and educational institutions, aims to gather intelligence to support Russia’s geopolitical interests, particularly in post-Soviet states. **Meeting Takeaways – Cyber Espionage … Read more