Poor permission controls and user input validation is endemic to the platforms that protect Americans’ legal, medical, and voter data.
Автор: Nate Nelson, Contributing Writer
Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle, but not necessarily enough money or people to handle it sufficiently well.
Novel Exploit Chain Enables Windows UAC Bypass
Adversaries can exploit CVE-2024-6769 to jump from regular to admin access without triggering UAC, but Microsoft says it’s not really a vulnerability.
Transport, Logistics Orgs Hit by Stealthy Phishing Gambit
Companies in this industry vertical tend toward large financial transactions with partners, suppliers, and customers.
‘SloppyLemming’ APT Abuses Cloudflare Service in Pakistan Attacks
Who needs advanced malware when you can take advantage of a bunch of OSS tools and free cloud services to compromise your target?
Kansas Water Plant Pivots to Analog After Cyber Event
A water treatment facility in a small city took serious precautions to prevent any bad outcomes from a hazy cyber incident.
Meet UNC1860: Iran’s Low-Key Access Broker for State Hackers
The group has used more than 30 custom tools to target high-value government and telecommunications organizations on behalf of Iranian intelligence services, researchers say.
Citrine Sleet Poisons PyPI Packages With Mac & Linux Malware
A North Korean advanced persistent threat (APT) actor (aka Gleaming Pisces) tried to sneak simple backdoors into public software packages.
Vice Society Pivots to Inc Ransomware in Healthcare Attack
Inc ransomware — one of the most popular among cybercriminals today — meets healthcare, the industry sector most targeted by RaaS.
Phishing Espionage Attack Targets US-Taiwan Defense Conference
Hackers sent a convincing lure document, but after 20 years of similar attacks, the target organization was well prepared.