Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

#ISC2Congress: CISO Best Practices for Managing Cyber Risk

Two leading CISOs provide best practice tips for CISOs on undertaking a sustainable cyber risk management program This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #ISC2Congress: CISO Best Practices for Managing Cyber Risk

Operation Triangulation iOS Attack Details Revealed

Kaspersky said the attack exploited five vulnerabilities, four of which were unknown zero-days This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Operation Triangulation iOS Attack Details Revealed

Half of Cyber-Attacks Go Unreported

Almost half of organizations have failed to report cyber-attacks to the appropriate authorities in 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Half of Cyber-Attacks Go Unreported

ShadowSyndicate Investigation Reveals RaaS Ties

The investigation was conducted by Group-IB, Bridewell and threat researcher Michael Koczwara This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ShadowSyndicate Investigation Reveals RaaS Ties

ZenRAT Malware Uncovered in Bitwarden Impersonation

Discovered by Proofpoint, ZenRAT is a modular remote access trojan targeting Windows users This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ZenRAT Malware Uncovered in Bitwarden Impersonation

More than 30 US Banks Targeted in New Xenomorph Malware Campaign

ThreatFabric explained the malware relies on deceptive phishing webpages posing as a Chrome update This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: More than 30 US Banks Targeted in New Xenomorph Malware Campaign

Sophisticated APT Clusters Target Southeast Asia

Unit 42 uncovered three separate threat actor clusters: Stately Taurus, Alloy Taurus and Gelsemium This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated APT Clusters Target Southeast Asia

China-Linked EvilBamboo Targets Mobiles

This extensive operation is directed at Tibetan, Uyghur and Taiwanese individuals and organizations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China-Linked EvilBamboo Targets Mobiles

Voting Equipment Giants Team Up For Security

The move aims to combat the rampant spread of misinformation among American voters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Voting Equipment Giants Team Up For Security