Infosec News

InfoSec News 20220519

  • Publicado: Qui, 19/05/2022 - 13:01

Top News


  • Bad Bots Swarm the Internet in Record Numbers in 2021

"Malicious bots accounted for almost 28% of global web traffic in 2021, a record high that exceeded the previous year’s figure of 26%, according to Imperva.  
Bots are software apps that run automated tasks. However, while most of them perform legitimate work such as crawling and indexing the internet for search engines, an increasing number are being used for malign purposes.

InfoSec News 20220518

  • Publicado: Qua, 18/05/2022 - 14:45

Top News


  • Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver

"The Shadowserver Foundation has started scanning the internet for Kubernetes API servers and found roughly 380,000 that allow some form of access.
ShadowServer is conducting daily scans of the IPv4 space on ports 443 and 6443, looking for IP addresses that respond with an HTTP 200 OK status, which indicates that the request has succeeded.

InfoSec News 20220517

  • Publicado: Ter, 17/05/2022 - 13:09

Top News


  • Hackers Can Abuse Low-Power Mode to Run Malware on Powered-Off iPhones

"Researchers from a university in Germany have analyzed the low-power mode (LPM) implementation on iPhones and found that it introduces potentially serious security risks, even allowing attackers to run malware on powered-off devices.

InfoSec News 20220516

  • Publicado: Seg, 16/05/2022 - 11:46

Top News


  • Ukraine Computer Emergency Response Team (CERT-UA) reported a phishing campaign conducted by Armageddon APT using GammaLoad.PS1_v2 malware.

"Ukraine Computer Emergency Response Team (CERT-UA) reported a phishing campaign using messages with subject “On revenge in Kherson!” and containing the “Plan Kherson.htm” attachment."

Link

InfoSec News 20220513

  • Publicado: Sex, 13/05/2022 - 12:20

Top News


  • DEA Investigating Breach of Law Enforcement Data Portal

"The U.S. Drug Enforcement Administration (DEA) says it is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases."

Link

TLP1 : Green

InfoSec News 20220512

  • Publicado: Qui, 12/05/2022 - 11:04

Top News


  • Pro-Russian hackers target Italy institutional websites - ANSA news agency

"Pro-Russian hackers have attacked the websites of several Italian institutions, including the senate, ANSA news agency reported on Wednesday."

Link

TLP1 : Green

InfoSec News 20220511

  • Publicado: Qua, 11/05/2022 - 13:57

Top News


  • New IceApple exploit toolset deployed on Microsoft Exchange servers

"Security researchers have found a new post-exploitation framework that they dubbed IceApple, deployed mainly on Microsoft Exchange servers across a wide geography.
IceApple is described as being “highly sophisticated,” its developer prioritizing keeping a low profile for long-term objectives in targeted attacks."

Link

InfoSec News 20220510

  • Publicado: Ter, 10/05/2022 - 11:16

Top News


  • Hacktivists yesterday defaced the Russian TV with pro-Ukraine messages and took down the RuTube video streaming site.

"Hacktivists and white hat hackers continue to support Ukraine against the Russian invasion, in a recent attack, they defaced Russian TV with anti-war messages and took down the RuTube video streaming site."

Link

InfoSec News 20220509

  • Publicado: Seg, 09/05/2022 - 14:29

Top News


  • Costa Rica declares national emergency after Conti ransomware attacks

"The Costa Rican President Rodrigo Chaves has declared a national emergency following cyber attacks from Conti ransomware group on multiple government bodies.
BleepingComputer also observed Conti published most of the 672 GB dump that appears to contain data belonging to the Costa Rican government agencies."

Link

InfoSec News 20220505

  • Publicado: Qui, 05/05/2022 - 13:59

Top News


  • Kaspersky Warns of Fileless Malware Hidden in Windows Event Logs

"Threat hunters at Kaspersky are publicly documenting a malicious campaign that abuses Windows event logs to store fileless last stage Trojans and keep them hidden in the file system.
In a research report published Wednesday, Kaspersky said the first phase of the campaign started around September 2021, with the threat actor luring victims into downloading a digitally-signed Cobalt Strike module.

Páginas