Thursday, July 28, 2022

Hackers Change Tactics for New Post-Macro Era - Infosecurity Magazine

Microsoft announced in October 2021 that it would soon block XL4 macros which are specific to Excel. Several months later it said the same about VBA macros , which are used in Office applications.

The changes began to roll out this year, and Proofpoint saw an almost immediate reaction from the cybercrime community.

Publisher: Infosecurity Magazine
Date: 2022-07-28T11:00:00
Author: Phil Muncaster
Twitter: @InfosecurityMag
Reference: (Read more) Visit Source



Hackers Force a $4B Question: Can DeFi Be Safe? | PYMNTS.com

Yet another decentralized lending and algorithmic stablecoin protocol was hacked yesterday, with $3.5 million stolen from its treasury via what appears for now to be a one-off exploit.

DeFi hacks are becoming more frequent, with the amount lost — $4 billion — now surpassing the $3.2 billion lost to centralized cryptocurrency exchange hacks, according to blockchain analytics firm Crystal Blockchain.

logo
Date: 2022-07-28T14:30:02-04:00
Twitter: @PYMNTS.com
Reference: (Read more) Visit Source



$10 million reward offered for information on foreign government-linked malicious hackers

A $10 million reward is being offered for information leading to the identification or location of malicious hackers working with North Korea to launch cyber attacks on US critical infrastructure.

Regular readers of the Tripwire State of Security blog are likely to be all too familiar with the names of some of those hacking groups, who are believed to be responsible for such high profile incidents as the 2014 hack of Sony Pictures, attacks on cryptocurrency exchanges, and the Bangladesh ...

Publisher: The State of Security
Date: 2022-07-28T14:50:01 00:00
Twitter: @CyberTripwire
Reference: (Read more) Visit Source



Hackers scan for vulnerabilities within 15 minutes of disclosure

System administrators have even less time to patch disclosed security vulnerabilities than previously thought, as a new report shows threat actors scanning for vulnerable endpoints within 15 minutes of a new CVE being publicly disclosed.

According to Palo Alto's 2022 Unit 42  Incident Response Report , hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Worried about midterms, US offers $10 mln bounty for election hackers

The reward, which is administered by the department's Diplomatic Security Service, also could be used for information about prior acts of election interference by foreign entities, the RFJ program said in its announcement.

Paul Rosenzweig, a former senior Department of Homeland Security cybersecurity official, said he expects the bounty offer to have little impact on longstanding U.S. efforts to stop Russia's efforts to meddle in American elections.

Publisher: USA TODAY
Author: Josh Meyer
Reference: (Read more) Visit Source



The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware - Security ...

Welcome to the latest edition of The Week in Cybersecurity , which brings you headlines and analysis of the most pressing topics in cybersecurity. This week: Austrian group KNOTWEED spreads malware via Microsoft products, new malware-infested apps pop up in the Google Play store, and more.

PSOAs, also known by Microsoft as 'cyber mercenaries,' sell hacking tools or services through a variety of business models. Microsoft believes that KNOTWEED blends two business models: access-as-a-service and hack-for-hire. The group sells the Subzero malware to third parties to use.

logo
Publisher: Security Boulevard
Date: 2022-07-28T19:34:25 00:00
Author: Carolynn van Arsdale
Twitter: @securityblvd
Reference: (Read more) Visit Source



Ways Hackers Can Steal Information from Your Device

According to research by a software testing firm, not less than 30,000 websites are hacked daily worldwide and every 39 seconds there is a new cyber-attack launched at someone on the web.

Let’s dig deeper into how hackers operate and how you can protect yourself from cyber attacks and scams.

logo
Publisher: HackRead | Latest Cyber Crime - InfoSec- Tech - Hacking News
Date: 2022-07-27T01:00:00 01:00
Author: https www facebook com owais sultan 16
Reference: (Read more) Visit Source



Bloomberg - Are you a robot?
Reference: (Read more) Visit Source







We love trees 🥰🍀💕❤️💋😘

#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART

https://opensea.io/collection/aotam

Hot NFT tree art collection available. This is BIG!
See the amazing artwork. Click here.



Earth is nice. We want it.





No comments:

Post a Comment