Teenage members of Lapsus$ ransomware gang convicted

Categories: Business

Tags: business

Tags: hack

Tags: hacked

Tags: compromise

Tags: lapsus$

Tags: convicted

Tags: crime

Tags: ransomware

Tags: leak

Tags: breach

A wave of video game developer compromises has come to a court-based conclusion.

(Read more…)

The post Teenage members of Lapsus$ ransomware gang convicted appeared first on Malwarebytes Labs.

Read more

Update now! Google Chrome’s first weekly update has arrived

Categories: Exploits and vulnerabilities

Tags: stable channel

Tags: weekly updates

Tags: CVE-2023-4427

Tags: CVE-2023-4428

Tags: CVE-2023-4429

Tags: CVE-2023-4430

Tags: CVE-2023-4431

Tags: use after free

Tags: out of bounds

Tags: heap corruption

The first of Chrome’s now weekly security updates fixes five vulnerabilities.

(Read more…)

The post Update now! Google Chrome’s first weekly update has arrived appeared first on Malwarebytes Labs.

Read more

Smart lightbulb and app vulnerability puts your Wi-Fi password at risk

Categories: Business

Tags: business

Tags: home

Tags: personal

Tags: router

Tags: wi-fi

Tags: wireless

Tags: network

Tags: home

Tags: bulb

Tags: smart bulb

Tags: IoT

Tags: app

Tags: TP-Link

We take a look at reports that a smart lightbulb and app vulnerability could potentially put your Wi-Fi password at risk.

(Read more…)

The post Smart lightbulb and app vulnerability puts your Wi-Fi password at risk appeared first on Malwarebytes Labs.

Read more

[updated] Ivanti Sentry critical vulnerability—don’t play dice, patch

Categories: Exploits and vulnerabilities

Categories: News

Tags: Ivanti

Tags: Sentry

Tags: MobileIron

Tags: CVE-2023-38035

Tags: MICS

Tags: port 8443

There is some uncertainty about whether a vulnerability in Ivanti Sentry is being exploited in the wild, but why take the risk when you can patch?

(Read more…)

The post [updated] Ivanti Sentry critical vulnerability—don’t play dice, patch appeared first on Malwarebytes Labs.

Read more

Kroll Employee SIM-Swapped for Crypto Investor Data

Credit to Author: BrianKrebs| Date: Fri, 25 Aug 2023 18:05:10 +0000

Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings. And there are indications that fraudsters may already be exploiting the stolen data in phishing attacks. Cryptocurrency lender BlockFi and the now-collapsed crypto trading platform FTX each disclosed data breaches this week thanks to a recent SIM-swapping attack targeting an employee of Kroll — the company handling both firms’ bankruptcy restructuring.

Read more

New law could turn UK into a hacker's playground

It looks as if people are at last waking up to a second extraordinarily dangerous requirement buried within a UK government bill designed to promote the nation as a surveillance state. It means bureaucrats can delay or prevent distribution of essential software updates, making every computer user far less secure.

A poor law

This incredibly damaging limitation is just one of the many bad ideas buried in the UKs latest piece of shoddy tech regulation, the Investigatory Powers Act. What makes the law doubly dangerous is that in the online world, you are only ever as secure as your least secure friend, which means UK businesses will likely suffer by being flagged as running insecure versions of operating systems.

To read this article in full, please click here

Read more

Managed Apple IDs, iCloud, and the shadow IT connection

Apple is continuing its expansion of Managed Apple IDs for business customers, giving them increased access to iCloud services and Apple Continuity features. Companies get iCloud backup and new syncing options (particularly for passwords, passkeys, and other enterprise credentials) — along with access to business-friendly Continuity features such as Universal Control.

But they could also lead to increased data sprawl and siloing. Ironically, those issues are typically related to shadow IT, even though they’re enterprise features. Let’s look at what’s going on and how enterprises can take advantage of these features and services without running into trouble.

To read this article in full, please click here

Read more