New spear phishing campaign targets Russian dissidents

Credit to Author: Threat Intelligence Team| Date: Tue, 29 Mar 2022 18:02:48 +0000

We’ve identified a new campaign using a combination of exploits, malicious macros and other lures that is targeted at Russian individuals who may have violated restrictions imposed by the Russian government.

The post New spear phishing campaign targets Russian dissidents appeared first on Malwarebytes Labs.

Read more

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

Credit to Author: Lauren Goodwin| Date: Tue, 29 Mar 2022 16:00:00 +0000

In this blog, we will share how you can increase security for on-premises and hybrid infrastructure through offerings including Azure Arc, Microsoft Defender for Cloud, and Secured-core for Azure Stack HCI.

The post 3 steps to secure your multicloud and hybrid infrastructure with Azure Arc appeared first on Microsoft Security Blog.

Read more

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

Credit to Author: BrianKrebs| Date: Tue, 29 Mar 2022 14:07:27 +0000

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.

Read more

Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers

Credit to Author: Gabor Szappanos| Date: Tue, 29 Mar 2022 11:26:28 +0000

In the wake of December 2021 exposure of a remote code execution vulnerability (dubbed “Log4Shell”) in the ubiquitous Log4J Java logging library, we tracked widespread attempts to scan for and exploit the weakness—particularly among cryptocurrency mining bots. The vulnerability affected hundreds of software products, making it difficult for some organizations to assess their exposure. One […]

Read more

Attacks on Ukraine communications are a major part of the war

Credit to Author: Pieter Arntz| Date: Tue, 29 Mar 2022 13:11:34 +0000

Along with the physical war in Ukraine there are accompanying cyberattacks, and communication lines are among the primary targets.

The post Attacks on Ukraine communications are a major part of the war appeared first on Malwarebytes Labs.

Read more