IT Security News Daily Summary 2023-10-28

Roundcube Webmail servers under attack – Week in security with Tony Anscombe

iLeakage Attack: Protecting Your Digital Security

Study Asks Facebook Users How Much They Think Their Data Is Worth

DEF CON 31 – Policy Panel: International Cyber Policy 101

Update now! Apple patches a raft of vulnerabilities

Octo Tempest cybercriminal group is “a growing concern”—Microsoft

Rorschach Ransomware Gang Targets Chilean Telecom Giant GTD

Passkeys vs Passwords: The Future of Online Authentication

AI-Generated Phishing Emails: A Growing Threat

From China To WikiLeaks: Censored Texts Survive In Bitcoin And Ethereum

D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges

October 2023 Web Server Survey

This Cryptomining Tool Is Stealing Secrets

Certain online games use dark designs to collect player data

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World

Bug hunters earned $1,038,250 for 58 unique 0-days at Pwn2Own Toronto 2023

Researchers Uncover Wiretapping of XMPP-Based Instant Messaging Service

Cultivating a Fortified Workplace: Building a Security-First Culture

SOC Automation Explained: 7 Real-World Examples

Why Smart SOAR is the Best SOAR for Slack

Few APAC firms will benefit from AI due to doubt and data management

10 Tips for Security Awareness Training That Hits the Target

ESET APT Activity Report Q2–Q3 2023

The Imperative Role Parents Play in Ensuring Their Children’s Safety While Navigating the Digital Landscape

Apple Private Wi-Fi hasn’t worked for the past three years

Protecting your intellectual property and AI models using Confidential Containers

An integrated incident response solution with Microsoft and PwC

IT Security News Daily Summary 2023-10-27

Lockbit ransomware gang claims to have stolen data from Boeing

Canadian government issues call for proposals to support fight against misinformation

Safari Side-Channel Attack Enables Browser Theft

Combating retail theft & fraud

The Importance of Transparency in Protecting Our Networks and Data

The Federal Partnership for Interoperable Communications (FPIC) Releases the Transition to Advanced Encryption Standard White Paper

The Destruction of Gaza’s Internet Is Complete

The Top 6 Enterprise VPN Solutions to Use in 2023

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic

DEF CON 31 Policy Panel: Navigating the Digital Frontier Advancing Cyber Diplomacy

Cyber Security Today, Week in Review for the week ending Friday, Oct. 27, 2023

Mass exploitation of CitrixBleed vulnerability, including a ransomware group

Singapore wants banks and telcos to bear losses if found negligent in phishing scams

CCleaner says hackers stole users’ personal data during MOVEit mass-hack

F5 hurriedly squashes BIG-IP remote code execution bug

Understand the True Cost of a UEM Before Making the Switch

Heimdal® Announces New Partnership with ResenNet, displacing ResenNet’s long-standing RMM provider, N-able

Google Expands Bug Bounty Program to Find Generative AI Flaws

Top 12 IT security frameworks and standards explained

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

After the Deal Closes: Lessons Learned in M&A Cybersecurity

Eclypsium Named Most Innovative Software Supply Chain Security Company in Coveted Top InfoSec Innovator Awards for 2023

Enhancing Online Privacy: Google Trials IP Address Masking Option

Google Maps Utilises AI For Immersive View Tool

Going Beyond MFA: How Okta is Redefining Enterprise Identity

Hacktivist Activity Related to Gaza Conflict Dwindles

More Than a Cryptominer, StripedFly Malware Infects 1 Million PCs

Okta Data Breach Highlights Hackers’ Untapped Gold Mine

Healey-Driscoll Awards $2.3M to CyberTrust Massachusetts to Strengthen Municipal Cybersecurity Efforts

Unlocking API Security Excellence: Wallarm at OWASP Global AppSec DC 2023

Report: September Sees Record Ransomware Attacks Surge

The Dark Side of AI: How Cyberthreats Could Get Worse, Report Warns

Five Canada Hospitals hit by cyber attack, ransomware suspected

VMware Tools Flaw Let Attackers Escalate Privileges

Apple fixes bug that undermined iOS privacy feature for years

Empowering Partner Success: How Cisco’s PXP Transforms the Partner Experience

Imperva Customers are Protected Against the Latest F5 BIG-IP Vulnerability

N. Korean Lazarus Group Targets Software Vendor Using Known Flaws

And the phishing Oscar goes to…

Patch…later? Safari iLeakage bug not fixed

Internet access in Gaza is collapsing as ISPs fall offline

Cisco report reveals observability as the new strategic priority for IT leaders

Protecting Small and Medium-Sized Businesses from Cyberthreats

CISA Announces New Release of Logging Made Easy

France agency ANSSI warns of Russia-linked APT28 attacks on French entities

European Governments Email Servers Targeted by Threat Actors

Watch out for StripedFly malware

What Lurks in the Dark: Taking Aim at Shadow AI

CISA Announces Launch of Logging Made Easy

Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner

AridViper, an intrusion set allegedly associated with Hamas

Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

9 vulnerabilities found in VPN software, including 1 critical issue that could lead to remote code execution

How helpful are estimates about how much cyber attacks cost?

Expert Cybersecurity Awareness: Test Your Attack Knowledge

How to Defend Against Account Opening Abuse

When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief

The evolution of 20 years of cybersecurity awareness

Empowering Cybersecurity: A Generative AI Revolution

Getting to Know: Kim Forsthuber

compliance officer

Staying Ahead of Social Engineering Threats

Downtown Toronto hospital investigating ‘data security incident’

8 Tips for Best Results in Red-Teaming

Microsoft unveils shady shenanigans of Octo Tempest and their cyber-trickery toolkit

Apple Drops Urgent Patch Against Obtuse TriangleDB iPhone Malware

iLeakage Attack Exploits Safari To Steal Sensitive Data From Macs, iPhones

Hackers Earn $350k On Second Day Of Pwn2Own Toronto 2023

iPhones Have Been Exposing Your Unique MAC Despite Apple’s Promises Elsewise

Crypto King Tells Judge He Acted On Legal Advice

Bankman-Fried Says He Acted On Legal Advise

IT, Security Leaders Play Catch-Up With Generative AI Threats

Malicious Android Apps on Google Play With Over 2 Million Installs

Cyber Security Today, Oct. 27, 2023 – Malware hiding as a cryptominer may have infected 1 million PCs since 2017

Adtran tackles GPS vulnerabilities with Satellite Time and Location technology

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

How to Keep Your Business Running in a Contested Environment

PM Rishi Sunak Outlines AI Risks, Cautions Against Rush To Regulation

Oktane 2023: Okta Unveils New Identity Innovations To Secure the AI Era

The Rise of Superclouds: The Latest Trend in Cloud Computing

How to Collect Market Intelligence with Residential Proxies?

#ISC2Congress: Generative AI A Boon for Organizations Despite the Risks, Experts Say

Tor Browser Security Audit reveals 2 high security issues

How to remotely help an elderly relative struggling with a smartphone or a tablet?

Messaging Service Wiretap Discovered through Expired TLS Cert

TeamViewer Tensor enhancements improve security and productivity

Service Mesh and Management Practices in Microservices

How to add a GUI for your Ubuntu firewall (and why you should)

Protect Your Passwords for Life for Just $25

F5 urges to address a critical flaw in BIG-IP

How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

King Charles III signs off on UK Online Safety Act, with unenforceable spying clause

Germany wins the 2023 European Cybersecurity Challenge

Toumei – 76,682 breached accounts

Zero-Day Exploits Cheat Sheet: Definition, Examples & How It Works

Security Agency Rolls Out Protective DNS for Schools

TOTOLINK X2000R buffer overflow | CVE-2023-46544

TOTOLINK X2000R buffer overflow | CVE-2023-46559

TOTOLINK X2000R buffer overflow | CVE-2023-46562

TOTOLINK X2000R buffer overflow | CVE-2023-46564

TOTOLINK X2000R buffer overflow | CVE-2023-46554

Apple news: iLeakage attack, MAC address leakage bug

What is Advanced Persistent Threat? Uncover the Hidden Dangers!

Microsoft Sounds Alarm Over English-Speaking Octo Tempest

Authentication vs. Authorization

Hello Alfred app exposes user data

Knight Ransomware Victim: Michels Markisen GmbH

Nigerian Police Dismantle Major Cybercrime Hub

OpenSSL 3.2 Release Candidate

You know what? Everyone gets a virus now and then.

American Family Insurance Suffered Cyber Attack

Demystifying cybersecurity terms: Policy, Standard, Procedure, Controls, Framework, Zero Trust

Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows?

Silicon UK Pulse: Your Tech News Update: Episode 24

Managing Cloud Sprawl: A Key Defense Against Cybersecurity Threats

The Critical Need to Defend Against Unauthorized Apps

Hunter International Ransomware Group hacks plastic surgery clinic

A cascade of compromise: unveiling Lazarus’ new campaign

Raven: Open-source CI/CD pipeline security scanner

Abyss Ransomware Victim: apexga[.]bank

New infosec products of the week: October 27, 2023

F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution

France says Russian state hackers breached numerous critical networks

Android adware apps on Google Play amass two million installs

Nigerian Police dismantle cybercrime recruitment, mentoring hub

Cloudflare sees surge in hyper-volumetric HTTP DDoS attacks

New iLeakage attack steals emails, passwords from Apple Safari

IoT security threats highlight the need for zero trust principles

Cybersecurity: The Cornerstone of Business Success

AI strengthens banking’s defense against fraud

SMBs at risk as AI misconceptions lead to overconfidence

iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A- and M-Series CPUs

2023-10-25 – DarkGate infection from malspam

Introduction to WAF Exception Policy

AI-related security fears drive 2024 IT spending

How to Begin Observability at the Data Source

Navigating the Complex World of Platform Engineering

SMBs Need to Balance Cybersecurity Needs and Resources

Generated on 2023-10-28 23:55:41.433414