Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

New .NET Malware "WhiteSnake" Targets Python Developers, Uses Tor for C&C Communication

The JFrog Security Research team recently discovered a new malware payload in the PyPI repository, written in C#. This is uncommon since PyPI is primarily a repository for Python packages, and its codebase consists mostly of Python code, or natively compiled libraries used by Python programs. This finding raised our concerns about the potential for cross-language malware attacks.

Software Supply Chain Security at RSA Conference 2023

The risk of supply chain attacks increases as more companies rely on third-party vendors and suppliers for critical services and products. Supply chain attacks have become increasingly prominent in recent years. In 2022, for instance, supply chain attacks surpassed the number of malware-based attacks by 40%.

Hackers Backdoor to Microsoft SQL Servers using Trigona ransomware

South Korean cyber security organisation AhnLab has identified a breach in Microsoft SQL servers allowing deployment of Trigona ransomware. The attacks were threat actors using brute-force or dictionary attacks with obtained or guessed credentials to infiltrate externally accessible MS-SQL servers.

Coming soon: Save & fill passkeys with 1Password in the browser

Starting this summer, 1Password customers will be able to store, manage, and use passkeys to access their online accounts through 1Password in the browser. With 1Password, you can access your passkeys on any device and seamlessly sign in. Passkeys are the future of authentication: they're both safer, and easier to use than passwords.

More than 256,000 Consumers Put at Risk By the Consumer Financial Protection Bureau

The Consumer Financial Protection Bureau (CFPB) is a government agency that's tasked with protecting consumers from financial institutions. The agency mostly works to prevent companies from charging outrageous fees and surcharges to customers, but it helps with monitoring how consumer data is being used by companies as well.

Another Perspective on ChatGPT's Social Engineering Potential

We’ve had occasion to write about ChatGPT’s potential for malign use in social engineering, both in the generation of phishbait at scale and as a topical theme that can appear in lures. We continue to track concerns about the new technology as they surface in the literature.

WatchGuard Wins Seven Awards at 2023 Global InfoSec Awards

We’re thrilled to share that Cyber Defense Magazine has once again awarded WatchGuard with seven wins at this year’s Global InfoSec Awards! The judges of this coveted awards program selected the 2023 winners based on three key areas of excellence including nominees’ understanding of tomorrow’s threats, today, provision of cost-effective solutions, and innovation in new and novel ways that help to better mitigate cyber risk and stay ahead of the next breach.

What is Password Sharing?

You may be hearing about password sharing more often these days as Netflix cracks down on users sharing logins with anyone outside their household. The new rule has been met with strong opposition by those who share streaming logins with friends and family. For many, password sharing has become the norm when it comes to streaming services. Password sharing refers to the act of sharing login credentials with other people so they also have access to your account.

Uncovering Digital Evidence: Navigating the Complexities of Cloud Computing Forensic Science

Forensic investigators must understand how to navigate challenges to successfully uncover digital evidence in the cloud. By following best practices and utilizing the latest tools and techniques, organizations can be better prepared to investigate cyber threats and mitigate risks.