An In-Depth Look at ICS Vulnerabilities Part 2


In part two of our three-part series, we continue to analyze vulnerabilities using MITRE ATT&CK. We also look into the sectors affected and their risk levels.

Read more

New UAC-0056 activity: There’s a Go Elephant in the room

Credit to Author: Threat Intelligence Team| Date: Fri, 01 Apr 2022 21:44:40 +0000

In late March, the cyber espionage group UNC2589 also known as SaintBear launched a spear phishing campaign targeting several entities in Ukraine. In this blog we review this attack and the intended payloads.

The post New UAC-0056 activity: There’s a Go Elephant in the room appeared first on Malwarebytes Labs.

Read more

This Week in Security News – April 1, 2022

Credit to Author: Jon Clay| Date: Fri, 01 Apr 2022 00:00:00 +0000

Probing the activities of cloud-based cryptocurrency-mining groups, and Lapsus$ ‘back from vacation’

Read more

Globant suffers network breach due to LAPSUS$ compromise

Credit to Author: Jovi Umawing| Date: Fri, 01 Apr 2022 18:56:37 +0000

LAPSUS$ is a young group believed to be ran by teenagers. In their latest heist, they leaked data from Globant, a software firm.

The post Globant suffers network breach due to LAPSUS$ compromise appeared first on Malwarebytes Labs.

Read more

Update now! Apple patches two zero-day vulnerabilities that may have been actively exploited

Credit to Author: Pieter Arntz| Date: Fri, 01 Apr 2022 18:43:44 +0000

Apple released security updates for macOS Monterey 12.3.1, iOS 15.4.1, iPadOS 15.4.1, tvOS 15.4.1, and watchOS 8.5.1 patching 2 vulnerabilities that may have been exploited in the wild.

The post Update now! Apple patches two zero-day vulnerabilities that may have been actively exploited appeared first on Malwarebytes Labs.

Read more