Top Ukrainian cyber official praises volunteer hacks on Russian targets, offers updates

Ukraine’s Victor Zhora said the so-called IT Army has done “useful” things, and he offered information about the “CaddyWiper” incident.

The post Top Ukrainian cyber official praises volunteer hacks on Russian targets, offers updates appeared first on CyberScoop.

Continue reading Top Ukrainian cyber official praises volunteer hacks on Russian targets, offers updates

10 Years Later, What Did LulzSec Mean for Cybersecurity?

While working on several articles on the WannaCry attacks for my job as a cybersecurity journalist, I learned about LulzSec, which ranked among the most notable attacks of the 2010s. I wanted to find out more about the group that committed major cybersecurity attacks on many household-name companies over a chaotic 50 days in 2011. […]

The post 10 Years Later, What Did LulzSec Mean for Cybersecurity? appeared first on Security Intelligence.

Continue reading 10 Years Later, What Did LulzSec Mean for Cybersecurity?

Threats to ICS and industrial enterprises in 2022

In recent years, we have observed various trends in the changing threat landscape for industrial enterprises. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year. Continue reading Threats to ICS and industrial enterprises in 2022

Spyware providers are flocking to international arms fairs to sell to NATO foes

European and Middle Eastern spyware and surveillance firms are marketing intrusion software to adversaries of the U.S., its intelligence allies and NATO, Atlantic Council research published Monday reveals. Looking at more than 200 companies that attended international arms fairs in the past two decades, researchers found that 85% of companies likely selling interception or intrusion technologies marketed these capabilities to governments outside their home country — even when no intelligence relationship existed. Five companies, including Israel-based Cellebrite and Sweden-based Micro Systemation AB, marketed those capabilities to U.S. and NATO adversaries. Neither company immediately responded to requests for comment. The findings coincide with an explosion of surveillance vendors attending international arms trade shows, including the heavily attended Milipol France and the U.K. -based Security and Policing Home Office.  The report underscores growing concerns about the threat that spyware companies pose to the United States and its allies. U.S. and European leaders have […]

The post Spyware providers are flocking to international arms fairs to sell to NATO foes appeared first on CyberScoop.

Continue reading Spyware providers are flocking to international arms fairs to sell to NATO foes

FTC’s right-to-repair ruling is a small step for security researchers, giant leap for DIY hackers

When the Federal Trade Commission voted unanimously on July 21 to enforce rules against manufacturers who have made it difficult for consumers to fix their own devices, it marked a significant win for the “right-to-repair” movement that includes farmers, hackers and consumer advocates among its ranks. The consumer watchdog agency’s decision to ramp up enforcement actions against illegal right-to-repair restrictions came after Americans, for years, had been limited by legal restrictions that prevented them from fixing technology they already purchased. For instance, manufacturers can withhold repair tools and implement software-based locks that prevent owners from making even simple updates unless they visit a repair shop authorized by the company. That has been the ongoing struggle for John Deere owners, some of whom resorted to hacking their tractors with Ukrainian software in order to fix them. Companies like Apple, as well as industry groups, fought for years against state and federal […]

The post FTC’s right-to-repair ruling is a small step for security researchers, giant leap for DIY hackers appeared first on CyberScoop.

Continue reading FTC’s right-to-repair ruling is a small step for security researchers, giant leap for DIY hackers

New Internet Explorer, Chrome zero-days highlight a growing market

Hackers are still using vulnerabilities in the seven-year-old Internet Explorer 11 browser to go after targets, even as Microsoft plans to sunset the program in less than a year, researchers at Google’s Threat Analysis Group reported Wednesday. The campaign largely targeted victims in Armenia. In April and June, cybercriminals targeted Armenian users with the exploit, researchers found. “This exploit was delivered via an Office document rather than via the Internet Explorer browser GUI,” explained Shane Huntley, director of Google’s Threat Analysis Group “Even if a user was to uninstall Internet Explorer, the exploit would still work.” Microsoft fixed the exploit in June. The same surveillance group exploited a vulnerability in Chrome. They sent the exploits via email with links posing as legitimate websites. They were instead attacker-controlled domains that fingerprinted a user’s device and allowed hackers to determine if they would send the exploit. The vulnerability existed in code shared […]

The post New Internet Explorer, Chrome zero-days highlight a growing market appeared first on CyberScoop.

Continue reading New Internet Explorer, Chrome zero-days highlight a growing market