Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps

Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.

DARKReading
#android#google#intel#nokia
Data Destruction Policies in the Age of Cloud Computing

It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?

API Flaws in Lego Marketplace Put User Accounts, Data at Risk

Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.

NSA Slices Up 5G Mobile Security Risks

The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.

Cybereason Warns Global Organizations Against Destructive Ransomware Attacks From Black Basta Gang

The Royal Ransomware Group has emerged as a threat to companies in 2022 and they have carried out dozens of successful attacks on global companies. Cybereason suggests that companies raise their awareness of this potential pending threat.

Microsoft-Signed Malicious Drivers Usher In EDR-Killers, Ransomware

Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.

CSAF Is the Future of Vulnerability Management

Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.

Apple Zero-Day Actively Exploited on iPhone 15

Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.