Mitigate risk by integrating threat modeling and DevOps processes

Credit to Author: Christine Barrett| Date: Thu, 02 Feb 2023 17:00:00 +0000

Are you wondering how you can effectively integrate threat modeling with your DevOps practice to maximize value and shift-left security? We have collected a few ideas for you, with the help of a few leading security experts.

The post Mitigate risk by integrating threat modeling and DevOps processes appeared first on Microsoft Security Blog.

Read more

ACLU, public defenders push back against Google giving police your mobile data

The ACLU and eight federal public defenders are asking the Fourth Circuit Court of Appeals to exclude mobile device location data obtained from Google via a so-called geofence warrant that helped law enforcement catch a bank robbery suspect.

The first geofence civil rights case to reach a federal court of appeals raises serious Fourth Amendment concerns against unreasonable search and seizure related to the location and personal information of mobile device users.

Geofence warrants have primarily been issued for Google to hand over data about every cell phone or other mobile device within a specific geographical region and timeframe. The problem: location data on every person carrying a mobile device in that area is scooped up in a wide net and their data is then handed over en masse to law enforcement.

To read this article in full, please click here

Read more

UAC Bypass Using CMSTP

Credit to Author: Rayapati Lakshmi Prasanna Sai| Date: Thu, 02 Feb 2023 09:31:57 +0000

With Ransomware attacks surging dramatically over the past year, and reports pegging it as 25% of the total…

The post UAC Bypass Using CMSTP appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

New APT34 Malware Targets The Middle East

Credit to Author: Mohamed Fahmy| Date: Thu, 02 Feb 2023 00:00:00 +0000

We analyze an infection campaign targeting organizations in the Middle East for cyberespionage in December 2022 using a new backdoor malware. The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers.

Read more

GitHub revokes several certificates after unauthorized access

Categories: News

Tags: GitHub

Tags: Atom

Tags: Desktop for Mac

Tags: Apple Developer ID

Tags: certificates

Tags: Digicert

Tags: sunset

After an unauthorized access incident, GitHub will revoke three certificates which will affect users of Atom and GitHub Desktop for Mac.

(Read more…)

The post GitHub revokes several certificates after unauthorized access appeared first on Malwarebytes Labs.

Read more

Up to 10 million people potentially impacted by JD Sports breach

Categories: News

Tags: JD Sports

Tags: data breach

Tags: stolen

Tags: unauthorised

Tags: access

Tags: data

Tags: customers

Tags: phish

Tags: social engineering

We take a look at JD Sports revealing a breach which took place between 2018 and 2020, and how this could impact those affected.

(Read more…)

The post Up to 10 million people potentially impacted by JD Sports breach appeared first on Malwarebytes Labs.

Read more