IconBurst software supply chain attack offers malicious versions of NPM packages

Credit to Author: Pieter Arntz| Date: Wed, 06 Jul 2022 14:11:31 +0000

Researchers have uncovered a supply chain attack that tricked app and website developers into using copies of popular npm packages that contained malicious code to steal form data.

The post IconBurst software supply chain attack offers malicious versions of NPM packages appeared first on Malwarebytes Labs.

Read more

European Parliament approves sweeping big tech antitrust laws

Credit to Author: Charlotte Trueman| Date: Wed, 06 Jul 2022 06:28:00 -0700

Read more

Hive ransomware gets upgrades in Rust

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Tue, 05 Jul 2022 16:00:00 +0000

With its latest variant carrying several major upgrades, Hive proves it’s one of the fastest evolving ransomware payload, exemplifying the continuously changing ransomware ecosystem.

The post Hive ransomware gets upgrades in Rust appeared first on Microsoft Security Blog.

Read more

Think twice before deploying Windows’ Controlled Folder Access

Credit to Author: Susan Bradley| Date: Tue, 05 Jul 2022 07:29:00 -0700

As ransomware attacks gained steam in the mid-2010s, Microsoft sought to give Windows users and admins tools to protect their PCs from such attacks. With its October 2017 feature update, the company added a feature called Controlled Folder Access to Windows 10.

On paper, Controlled Folder Access sounds like a great protection for consumers, home users, and small businesses with limited resources. As defined by Microsoft, “Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).”

To read this article in full, please click here

Read more

TikTok is “unacceptable security risk” and should be removed from app stores, says FCC

Credit to Author: Jovi Umawing| Date: Tue, 05 Jul 2022 14:51:08 +0000

According to the FCC commissioner, TikTok being a video app is the “sheep’s clothing”, suggesting a wolf hides underneath those funny videos.

The post TikTok is “unacceptable security risk” and should be removed from app stores, says FCC appeared first on Malwarebytes Labs.

Read more

Cloud-based malware is on the rise. How can you secure your business?

Credit to Author: Bill Cozens| Date: Tue, 05 Jul 2022 14:34:06 +0000

Cloud-based malware in on the rise. In this post, we’ll cover four ways you can help secure your business against cloud-based malware.

The post Cloud-based malware is on the rise. How can you secure your business? appeared first on Malwarebytes Labs.

Read more