All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of June 20, 2022. I’ve also included some comments on these stories.Over a Dozen Flaws Found in Siemens’ Industrial Network Manag
Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
A new Brave Search Goggle modifies Brave Search results to only show reputable cybersecurity sites, making it easier to search for and find security information.This week, Brave announced a new Goggles feature that lets anyone create their own rules and filters that override Brave Search's algorithms when displaying search results.This feature allo
TB Kawashima, part of the Japanese automotive component manufacturer Toyota Boshoku of the Toyota Group of companies, announced that one of its subsidiaries has been hit by a cyberattack.The company did not confirm but there is reason to suspect that it is dealing with an attack from the LockBit ransomware group.TB Kawashima is a manufacturer of interior fab
Publish At:
2022-06-25 13:45 |
Read:287 | Comments:0 |
Tags:
Security cyber
Fast Shop, one of Brazil's largest retailers, has suffered an 'extortion' cyberattack that led to network disruption and the temporary closure of its online store.Fast Shop is an online retailer selling a wide range of products, including computers, smartphones, gaming consoles, furniture, beauty products, and home appliances. The retailer has been active in
Publish At:
2022-06-24 13:45 |
Read:190 | Comments:0 |
Tags:
Security cyber
Microsoft’s PowerShell is a useful, flexible tool that is as popular with criminals as it is with admins. Cybercrooks like it becasue PowerShell is powerful, available almost everywhere, and doesn’t look out of place running on a company network.
In most places it isn’t practical to block PowerShell completely, which raises the question:
Members of the Cybersecurity Advisory Committee of CISA (Cybersecurity and Infrastructure Security Agency) have proposed an emergency cybersecurity call line for small and medium-sized businesses (SMBs). Should the proposition be approved, SMBs would be able to call 311 in the event of a cybersecurity incident.
CISA’s cyberhygiene subcommittee head,
Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers?
Difficulties and Positive Changes
The recent ISACA State of Cybersecurity 2022 survey provides some key markers:
Unfilled positions are on the rise (not good)
Existing teams are understaffed (not good)
Budgets are (finall
Acquisition allows Johnson Controls to bring zero trust security to connected buildings Smart building infrastructure and technology giant Johnson Controls (NYSE: JCI) announced on Thursday that it has acquired zero trust cybersecurity provider Tempered Networks for an undisclosed sum.Technology from Seattle, Washington-based Tempered will allow custome
A China-linked state-sponsored hacking group named Bronze Starlight was observed deploying various ransomware families to hide the true intent of its attacks.In attacks observed as early as mid-2021, the threat group started using the HUI Loader to drop ransomware such as AtomSilo, LockFile, Night Sky, Pandora, and Rook.The short lifespan of each ransomware
Two bipartisan cybersecurity bills were signed into law on Tuesday, June 21, 2022, by US President Joe Biden: the Federal Rotational Cyber Workforce Program Act of 2021, and the State and Local Government Cybersecurity Act of 2021.The Federal Rotational Cyber Workforce Program Act, which has been around since 2018, proposes a program under which certain fede
Two Chinese hacking groups conducting cyber espionage and stealing intellectual property from Japanese and western companies are deploying ransomware as a decoy to cover up their malicious activities.Threat analysts from Secureworks say that the use of ransomware in espionage operations is done to obscure their tracks, make attribution harder, and create a p
Cyber Spetsnaz is targeting government resources and critical infrastructure in Lithuania after the ban of Russian railway goods
Cyber Spetsnaz is targeting Lithuanian government resources and critical infrastructure – the recent ban on Russian railway goods has caused a new spike of hacktivist activity on the Dark Web. Today the group has announced mult
Coinciding with unrelenting cyberattacks against Ukraine, state-backed Russian hackers have engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv, Microsoft said in a report Wednesday.“Since the start of the war, the Russian targeting (of Ukraine’s allies) has been successful 29 percent o
Microsoft said today that Russian intelligence agencies have stepped up cyberattacks against governments of countries that have allied themselves with Ukraine after Russia's invasion.Since the start of the war, threat actors linked to several Russian intelligence services (including the GRU, SVR, and FSB) have attempted to breach entities in dozens of countr
Announce
Share high-quality web security related articles with you:)