Breaking News

•••  All important news related to new attacks and see the solutions we can offer you  •••

01/09/2020

Malware authors trick Apple into trusting malicious Shlayer apps

Cyber Defense

The authors of the Mac malware known as Shlayer have successfully managed to get their malicious payloads through Apple's automated notarizing process.

Since February 2020 all Mac software distributed outside of its Mac App Store must be notarized by Apple to be able to run on macOS Catalina and above.

The notarization process requires developers to submit software they built for the macOS platform to be scanned through Apple's notary service, an automated system designed to scan submitted software for both malicious components and code-signing issues.

If they pass this automated security check, the apps are allowed by the macOS Gatekeeper - a macOS security feature that checks if downloaded apps have been checked for known malicious content - to run on the system.

Contact us for a test with Cymulate breach and Attack simulation
31/08/2020

North Korea's BeagleBoyz Robbing Banks

Lees het originele artikel hier
Cyber Defense

 

This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM). Working with U.S. government partners, CISA, Treasury, FBI, and USCYBERCOM identified malware and indicators of compromise (IOCs) used by the North Korean government in an automated teller machine (ATM) cash-out scheme—referred to by the U.S. Government as “FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.”

 

New identified malware used by the NorthKorean government in an automated teller machine (ATM) cash-out.

 

This mallware can be simulated and your can test if your environment is vulnerable using Cymulate BAS solution
 

Contact us for a test with Cymulate breach and Attack simulation
27/08/2020

'Next-Gen' Open Source Component Attacks Surge 430%

Lees het originele artikel hier
Software Security

As commercial and enterprise software developers become more disciplined about keeping their open source software components updated to reduce the risk of software supply chain attacks, the bad guys are getting craftier: Researchers warn that they're over-running open source projects to turn them into malware distribution channels.

It used to be that attackers simply preyed on existing vulnerabilities within well-used open source components, with the understanding they could victimize the many organizations relying on outdated dependencies. Attackers are now more frequently getting proactive by infiltrating open source projects to seed them with compromised components that they can pounce on once they're downloaded and used by unsuspecting organizations.

Contact us for more information about Checkmarx SCA
Load more