Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. […]
Category Archives: Uncategorized
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2024-7593 (CVSS score: 9.8), which could be exploited by a remote unauthenticated attacker to bypass the […]
Leaders in professional athletics lament the realities and risks of growth in connected stadium environments, social networks, and legalized gambling. Go to Source Author: Jeffrey Schwartz, Contributing Writer
A water treatment facility in a small city took serious precautions to prevent any bad outcomes from a hazy cyber incident. Go to Source Author: Nate Nelson, Contributing Writer
The encrypted messaging service said it will share users’ IP addresses and phone numbers with authorities when requested. Go to Source Author: Dark Reading Staff
The security vulnerabilities could lead to everything from gas spills to operations data disclosure, affecting gas stations, airports, military bases, and other hypersensitive locations. Go to Source Author: Tara Seals, Managing Editor, News, Dark Reading
Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some of the malicious apps have also been found on the Google Play Store. They have been cumulatively downloaded 11 million times. They include – Wuta […]
The money-transfer company is going on day four of its services being suspended. Go to Source Author: Dark Reading Staff
A sound cyber-risk management strategy analyzes all the business impacts that may stem from an attack and estimates the related costs of mitigation versus the costs of not taking action. Go to Source Author: Dave Gerry
The U.S. Department of Commerce (DoC) said it’s proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that of the People’s Republic of China (PRC) and Russia. “The proposed rule focuses on hardware and software integrated into the Vehicle Connectivity System (VCS) and […]
