Cybersecurity

9 vulnerabilities found in VPN software, including 1 critical issue that could lead to remote code execution

Cisco Talos has disclosed 17 vulnerabilities over the past two weeks, including nine that exist in a popular VPN software.   Attackers could exploit these vulnerabilities in the SoftEther VPN solution for individual and enterprise users to force users to drop their connections or execute arbitrary code on the targeted machine.   Talos’ Vulnerability Research team […]

Cybersecurity

The forgotten malvertising campaign

In recent weeks, we have noted an increase in malvertising campaigns via Google searches. Several of the threat actors we are tracking have improved their techniques to evade detection throughout the delivery chain. We believe this evolution will have a real world impact among corporate users getting compromised via malicious ads eventually leading to the […]

Cybersecurity

Phishing, Smishing Surge Targets USPS

Recent weeks have witnessed a significant increase in cyber-attacks targeting the US Postal Service (USPS), mainly through phishing and smishing campaigns.  The surge in these attacks has prompted DomainTools researchers to delve into their origins and implications, with findings described in an advisory published on Thursday. One smishing message raised suspicions due to its peculiar […]

Cybersecurity

Swan Retail cyber-attack woes continue

More than six weeks after hackers caused “significant disruption” to Swan Retail’s inventory management, order fulfilment and accounting systems, fashion retailers told Drapers the issues have still not been resolved. Sandersons Boutique owner and co-founder Mark Dransfield said the cyber-attack on Swan Retail, which occurred on 13 August, “has hugely affected” the business. “We are […]

Cybersecurity

White House grapples with harmonizing thicket of cybersecurity rules

Pour one out for the cyber bureaucrats in the Biden administration.  In recent weeks, the White House has embarked on a dizzying task: trying to harmonize the exceedingly broad number of cybersecurity-related regulations and technical standards set by industry that corporations and critical infrastructure operators must abide by.  That monumental task is likely to span […]