Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare. Go to Source Author: Robert Lemos, Contributing Writer
Author Archives: Onsite Computing, Inc.
Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called “TinyShell.” Go to Source Author: Rob Wright
Facebook is warning that a FreeType vulnerability in all versions up to 2.13 can lead to arbitrary code execution, with reports that the flaw has been exploited in attacks. […] Go to Source Author: Bill Toulas
A threat actor leveraged the vulnerability in an “extremely sophisticated” attack on targeted iOS users, the company says. Go to Source Author: Jai Vijayan, Contributing Writer
CISA says the Medusa ransomware operation has impacted over 300 organizations in critical infrastructure sectors in the United States until last month. […] Go to Source Author: Sergiu Gatlan
The prolonged attack, which lasted 300+ days, is the first known compromise of the US electric grid by the Voltzite subgroup of the Chinese APT; during it, the APT attempted to exfiltrate critical OT infrastructure data. Go to Source Author: Elizabeth Montalbano, Contributing Writer
A new Android spyware named ‘KoSpy’ is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps. […] Go to Source Author: Bill Toulas
Indian authorities arrested Aleksej Besciokov, the co-founder and one of the administrators of the Russian Garantex crypto-exchange while vacationing with his family in Varkala, India. […] Go to Source Author: Sergiu Gatlan
In the past, the vulnerability was exploited to drop Mirai botnet malware. Today, it’s being used once more for another botnet campaign with its own malware. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company’s root certificates. […] Go to Source Author: Bill Toulas
