February 8, 2021

Cyber cops in Ukraine carried out an arrest and several raids last week in connection with the author of a U-Admin, a software package used to administer what’s being called “one of the world’s largest phishing services.” The operation was carried out in coordination with the FBI and authorities in Australia, which was particularly hard hit by phishing scams perpetrated by U-Admin customers.

Read More Arrest, Raids Tied to ‘U-Admin’ Phishing Kit

Hackers are exploiting a zero-day in SonicWall:

In an email, an NCC Group spokeswoman wrote: “Our team has observed signs of an attempted exploitation of a vulnerabilitythat affects the SonicWall SMA 100 series devices. We are working closely with SonicWall to investigate this in more depth.”

In Monday’s update, SonicWall representatives said the company’s engineering team confirmed that the submission by NCC Group included a “critical zero-day” in the SMA 100 series 10.x code. SonicWall is tracking it as SNWLID-2021-0001. The SMA 100 series…

Read More SonicWall Zero-Day

The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have shifted their focus and identities are increasingly under attack.

The post Why threat protection is critical to your Zero Trust security strategy appeared first on Microsoft Security.

Read More Why threat protection is critical to your Zero Trust security strategy

Governments will have to use more than updated privacy laws if they want to stop technology companies from leveraging disinformation and lies for profit, says British Columbia’s information and privacy commissioner.

The post B.C. privacy commissioner says privacy laws alone can’t restrain big tech’s ‘predatory behaviour’ first appeared on IT World Canada.

Read More B.C. privacy commissioner says privacy laws alone can’t restrain big tech’s ‘predatory behaviour’

Today’s podcast reports on data breaches at SitePoint and Emsisoft, how Morse code is used for hiding a phishing attack and why you should watch for bad browser extensions
The post Cyber Security Today – Data breaches at SitePoint and Emsisoft, Morse c…

Read More Cyber Security Today – Data breaches at SitePoint and Emsisoft, Morse code used for hiding a phishing attack and watch for bad browser extensions

It seems to be the season of sophisticated supply-chain attacks.

This one is in the NoxPlayer Android emulator:

ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API (api.bignox.com) and file-hosting servers (res06.bignox.com).

Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server to deliver malware to NoxPlayer users.

[…]

Despite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn’t target all of the company’s users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users…

Read More NoxPlayer Android Emulator Supply-Chain Attack