Building Trust in the Digital Era: ENISA boosts the uptake of the eIDAS regulation

The European Union Agency for Cybersecurity issues technical guidance and recommendations on Electronic Identification and Trust Services helping Member States to implement the eIDAS regulation. The European Union Agency for Cybersecurity (ENISA) completed a package of five reports in order to boost the implementation of the eIDAS regulation and promote the uptake of Electronic Identification and Trust Services. This work falls under …

Fight phishing with these latest web scraping techniques

Organisations understand the power of data, and my job is to help them overcome challenges so they can achieve their data acquisition goals.  Working with data involves more than just collection, however. Ensuring that it is secure is also a fundamental part of the equation, and part of that effort involves teaching clients how to protect their operation from cybersecurity …

New Side-Channel Attack Targets the CPU Ring Bus for the First Time

In a paper published today, a team of academics from the University of Illinois at Urbana-Champaign have published details about a new side-channel attack against the internal architecture of modern CPUs. Side-channel attacks take place when attackers are able to observe how a system operates —in this case, a computer processor—, and then infer what data the system is processing …

At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software

At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the past few days been hacked by an unusually aggressive Chinese cyber espionage unit that’s focused on stealing email from victim organizations, multiple sources tell KrebsOnSecurity. The espionage group is exploiting four newly-discovered flaws in Microsoft Exchange …

Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits

This week, Microsoft reported a rare cybersecurity event: an ongoing mass exploitation of Microsoft Exchange servers by an alleged state-sponsored adversary, driven through a variety of zero-day exploits. This kind of attack — a previously unknown threat from a highly sophisticated adversary — presents one of the most challenging situations a security team will encounter. Just another routine day for …

Gootloader Hackers Poison Websites Globally in Order to Infect Business Professionals with Ransomware, Intrusion Tools and Bank Trojans, Warns eSentire

eSentire, a global provider of Managed Detection and Response (MDR) cybersecurity solutions, reported today that the hackers behind the malicious downloader, Gootloader, have poisoned websites across the globe to infect business professionals’ IT systems with ransomware, intrusion tools and bank trojans. eSentire has been tracking the Gootloader campaign since December 2020 and has prevented numerous related malware infections. eSentire’s security …

Hackers share methods to bypass 3D Secure for payment cards

Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions.    

Brand(ed) Lures and GuLoader – The New Face of Email-based Attacks

After analyzing millions of emails, Cofense researchers have summarized some key patterns used during the attacks in the past year. According to them, cybercriminals are relying on both brand-specific lures as well as weaponized emails to target their victims.

Hackers Using Tricky SEO Technique to Deliver Malware Payloads

Cyberattackers are now using a novel attack technique in which they are using Google SEO to deploy malware payloads. This technique takes advantage of human psychology and SEO tricks to improve compromised websites’ ranking in Google search results.

New nation-state cyberattacks

Today, we’re sharing information about a state-sponsored threat actor identified by the Microsoft Threat Intelligence Center (MSTIC) that we are calling Hafnium. Hafnium operates from China, and this is the first time we’re discussing its activity. It is a highly skilled and sophisticated actor. Historically, Hafnium primarily targets entities in the United States for the purpose of exfiltrating information from a number of industry …

ENISA and CERT-EU sign Agreement to start their Structured Cooperation

The European Union Agency for Cybersecurity (ENISA) and the Computer Emergency Response Team for the EU Institutions, Bodies and Agencies (CERT-EU) are pleased to announce the signature of a Memorandum of Understanding. The Memorandum of Understanding (MoU), signed by ENISA and CERT-EU on 15th February, was announced on the occasion of the 13th CSIRTs Network meeting. The agreement is the successful outcome …

Firewall Vendor Patches Critical Auth Bypass Flaw

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users. According to Genua. GenuGate is classified as “NATO Restricted.“ Genua has not responded to a request for comment. Mit dem Laden des Tweets akzeptieren Sie die Datenschutzerklärung von Twitter.Mehr erfahren Inhalt laden Twitter Tweets immer entsperren  

Hackers release a new jailbreak tool for almost every iPhone

An iPhone hacking team has released a new jailbreak tool for almost every iPhone, including the most recent models, by using the same vulnerability that Apple last month said was under active attack by hackers.    

Far-Right Platform Gab Has Been Hacked – Including Private Data

The transparency group DDoSecrets says it will make the 70GB of passwords, private posts, and more available to researchers, journalists, and social scientists.

China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions

This report details a campaign conducted by a China-linked threat activity group, RedEcho, targeting the Indian power sector. The activity was identified through a combination of large-scale automated network traffic analytics and expert analysis. Data sources include the Recorded Future Platform, SecurityTrails, Spur, Farsight, and common open-source tools and techniques. The report will be of most interest to individuals engaged …