April’s Patch Tuesday update includes fixes for two zero-day vulnerabilities

Credit to Author: Pieter Arntz| Date: Wed, 13 Apr 2022 13:57:39 +0000

April’s Patch Tuesday brings patches for two zero-day vulnerabilities and two potentially wormable Network File System vulnerabilities.

The post April’s Patch Tuesday update includes fixes for two zero-day vulnerabilities appeared first on Malwarebytes Labs.

Read more

Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed

Credit to Author: Pieter Arntz| Date: Fri, 08 Apr 2022 14:23:30 +0000

Two announcements in two days detail operations against GRU-controlled infrastructure

The post Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed appeared first on Malwarebytes Labs.

Read more

The Original APT: Advanced Persistent Teenagers

Credit to Author: BrianKrebs| Date: Wed, 06 Apr 2022 17:55:38 +0000

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world’s biggest corporations on edge.

Read more

Windows 11 — we haven’t seen anything, yet

Credit to Author: Rob Enderle| Date: Wed, 06 Apr 2022 10:24:00 -0700

Disclosure: Microsoft is a client of the author.

Microsoft this week had an analyst event about Windows 11 and a variety of productivity, management, and security features the company has planned. Over the last couple of years, Microsoft has aggressively improved both Windows and Office 365, but the big change ahead is the potential blend of Windows with Windows 365. We’ll see that start by the end of the year. The end game should be what appears to be a Windows desktop that integrates so well with the cloud that it can, when necessary, seamlessly switch between instances to comply with company policy, assure security, and provide recourse on automatic demand from Azure Cloud. 

To read this article in full, please click here

Read more

Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations

Credit to Author: Katie McCafferty| Date: Wed, 06 Apr 2022 01:30:07 +0000

For the fourth consecutive year, Microsoft 365 Defender demonstrated industry-leading protection in MITRE Engenuity’s independent ATT&CK® Enterprise Evaluations. These results highlighted the importance of taking an XDR-based approach spanning endpoints, identities, email and cloud, and the importance of both prevention and protection.

The post Microsoft 365 Defender demonstrates industry-leading protection in the 2022 MITRE Engenuity ATT&CK® Evaluations appeared first on Microsoft Security Blog.

Read more

Globant suffers network breach due to LAPSUS$ compromise

Credit to Author: Jovi Umawing| Date: Fri, 01 Apr 2022 18:56:37 +0000

LAPSUS$ is a young group believed to be ran by teenagers. In their latest heist, they leaked data from Globant, a software firm.

The post Globant suffers network breach due to LAPSUS$ compromise appeared first on Malwarebytes Labs.

Read more

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

Credit to Author: BrianKrebs| Date: Tue, 29 Mar 2022 14:07:27 +0000

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.

Read more