Analysis: White House Cybersecurity Policy Maker – Secure Open Source Software Even If It Benefits ‘Adversaries’ We Should Do It Anyway

By Joe Fay Resiliency is the endgame of the U.S. approach to internet and software security. The U.S. has a vested interest in creating a secure and resilient internet and software ecosystem, even if it means its “adversaries” also benefit, a White House cybersecurity leader told the State of Open Conference in London late last week. During a panel session on international security policy, Sal Kimmich, director of open source at EscherCloudAI, AI DevSecOps, said researchers uncovering vulnerabilities could face pressure from nation states, and there needs to be a way of protecting them. Microsoft director of open source strategy,…

Mirai V3G4 botnet exploits 13 flaws to target IoT devices

During the second half of 2022, a variant of the Mirai bot, tracked as V3G4, targeted IoT devices by exploiting tens of flaws. Palo Alto Networks Unit 42 researchers reported that a Mirai variant called V3G4 was attempting to exploit several flaws to infect IoT devices from July to December 2022.  Below is the list […]

The post Mirai V3G4 botnet exploits 13 flaws to target IoT devices appeared first on Security Affairs.

Security warning: Beep malware can evade detection

Find out how Beep malware can evade your security system, what it can do and how to protect your business.
The post Security warning: Beep malware can evade detection appeared first on TechRepublic.

Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after

ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K.. […]

The post Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after appeared first on Security Affairs.

New Screenshotter Malware Campaign Targets Victims After Profiling

Researchers have warned users about a new malicious campaign that scans and profiles potential victims…
New Screenshotter Malware Campaign Targets Victims After Profiling on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration…

New MortalKombat ransomware employed in financially motivated campaign

Talos researchers observed a financially motivated threat actor using a new ransomware dubbed MortalKombat and a clipper malware named Laplas. Since December 2022, Cisco Talos researchers have been observing an unidentified financially motivated threat actor deploying two new malware, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware. The threat actor […]

The post New MortalKombat ransomware employed in financially motivated campaign appeared first on Security Affairs.

Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable

Hyundai and Kia car makers are releasing an emergency software update to fix a flaw that can allow stealing a car with a USB cable. Carmakers Hyundai and KIA are rolling out an emergency update for the software shipped with several car models. The update addresses a bug that can be exploited by thieves to […]

The post Hyundai and Kia to patch a flaw that allows the theft of the cars with a USB cable appeared first on Security Affairs.

Spam and phishing in 2022

Statistics on spam and phishing with the key trends in 2022: two-stage spear phishing, hijacking of social network and instant messaging accounts, import substitution, and survey phishing.