www.securityweek.com
Open in
urlscan Pro
2606:4700:20::6818:a003
Public Scan
URL:
https://www.securityweek.com/in-other-news-tsa-wants-new-cyber-rules-scam-call-detection-in-android-sim-swappers-arrested/
Submission Tags: falconsandbox
Submission: On November 18 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On November 18 via api from US — Scanned from DE
Form analysis
4 forms found in the DOMGET https://www.securityweek.com/
<form method="get" id="zox-search-form" action="https://www.securityweek.com/">
<input type="text" name="s" id="zox-search-input" value="Search" onfocus="if (!window.__cfRLUnblockHandlers) return false; if (this.value == "Search") { this.value = ""; }"
onblur="if (!window.__cfRLUnblockHandlers) return false; if (this.value == "Search") { this.value = ""; }">
<input type="submit" id="zox-search-submit" value="Search">
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form class="sw-newsletter-cc" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" name="ea" maxlength="128" placeholder="Business Email Address..." class="form-text required" required="">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Text Content
Now on Demand: CISO Forum Virtual Summit - All Sessions Available to Watch Instantly SECURITYWEEK NETWORK: * Cybersecurity News * Webcasts * Virtual Events ICS: * ICS Cybersecurity Conference * Malware & Threats * Cyberwarfare * Cybercrime * Data Breaches * Fraud & Identity Theft * Nation-State * Ransomware * Vulnerabilities * Security Operations * Threat Intelligence * Incident Response * Tracking & Law Enforcement * Security Architecture * Application Security * Cloud Security * Endpoint Security * Identity & Access * IoT Security * Mobile & Wireless * Network Security * Risk Management * Cyber Insurance * Data Protection * Privacy & Compliance * Supply Chain Security * CISO Strategy * Cyber Insurance * CISO Conversations * CISO Forum * ICS/OT * Industrial Cybersecurity * ICS Cybersecurity Conference * Funding/M&A * Cybersecurity Funding * M&A Tracker * Cybersecurity News * Webcasts * Virtual Events * ICS Cybersecurity Conference Connect with us * * * Hi, what are you looking for? SECURITYWEEK * Malware & Threats * Cyberwarfare * Cybercrime * Data Breaches * Fraud & Identity Theft * Nation-State * Ransomware * Vulnerabilities * Security Operations * Threat Intelligence * Incident Response * Tracking & Law Enforcement * Security Architecture * Application Security * Cloud Security * Endpoint Security * Identity & Access * IoT Security * Mobile & Wireless * Network Security * Risk Management * Cyber Insurance * Data Protection * Privacy & Compliance * Supply Chain Security * CISO Strategy * Cyber Insurance * CISO Conversations * CISO Forum * ICS/OT * Industrial Cybersecurity * ICS Cybersecurity Conference * Funding/M&A * Cybersecurity Funding * M&A Tracker GOVERNMENT IN OTHER NEWS: TSA WANTS NEW CYBER RULES, SCAM CALL DETECTION IN ANDROID, SIM SWAPPERS ARRESTED Noteworthy stories that might have slipped under the radar: TSA proposes new cyber rules for pipelines and railroads, Google adds scam call detection to Android, SIM swappers arrested in US. By SecurityWeek News November 15, 2024 * * Flipboard Reddit Whatsapp Whatsapp Email SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide a valuable summary of stories that may not warrant an entire article, but are nonetheless important for a comprehensive understanding of the cybersecurity landscape. Each week, we curate and present a collection of noteworthy developments, ranging from the latest vulnerability discoveries and emerging attack techniques to significant policy changes and industry reports. Here are this week’s stories: Team Software data breach impacts 100,000 people Business software maker Team Software (WorkWave) revealed this week that a recent data breach impacts nearly 100,000 individuals. The company said it detected unauthorized access to its network in late July and an investigation showed that the compromised systems stored personal information. DDoS attack disrupts credit card readers in Israel A DDoS attack disrupted credit card readers at gas stations and supermarkets in Israel. The provider impacted by the attack, Hyp Credit Guard, said the attack lasted for roughly one hour and targeted its services as well as communication suppliers. The company said it quickly managed to block the attack. Advertisement. Scroll to continue reading. Researcher finds many macOS sandbox escape vulnerabilities Researcher Mickey Jin has discovered more than 10 macOS sandbox escape vulnerabilities related to what he described as an overlooked attack surface involving XPC services. Apple was informed about the findings and patched a majority of them, but the researcher says there are still a few that are in the process of being fixed. Sandbox escapes are very valuable to threat actors as they increase the impact of remote code execution vulnerabilities, which would otherwise be constrained to the sandbox environment. TSA proposes cyber risk management and reporting requirements for pipelines and railroads The TSA has proposed a new rule that would require pipeline and railroad owners and operators to establish cyber risk management programs. These surface transportation entities would also have to report cybersecurity incidents to the cybersecurity agency CISA. Microsoft Visio files abused in phishing attacks Perception Point has seen cybercriminals leveraging a new type of two-step phishing attack that involves Microsoft Visio files (.vsdx) and SharePoint to evade detection. The attacks start with emails sent out from compromised accounts. The emails deliver links to SharePoint pages that host Visio files, which redirect users to Microsoft credential phishing pages. Hundreds of organizations worldwide have been targeted. Black hat SEO in Japan Trend Micro in collaboration with academics and authorities in Japan conducted research into threat groups specializing in black hat search engine optimization (SEO), including their malware and poisoning attacks. The threat actors’ goal is to lure users to fake e-commerce sites. Hamas-linked hackers expand from espionage to disruptive attacks Wirte, a Hamas-linked threat actor, has expanded its operations, from espionage to disruptive attacks involving wiper malware, according to Check Point. The security firm said it found “clear links” between a custom malware used by Wirte and a wiper that was used to target Israeli entities in attacks observed in February and October 2024. North Korea-linked macOS malware abuses Flutter Jamf researchers found malware samples that abuse Flutter, Google’s open source UI software development kit, to obfuscate malicious code. The malware targets macOS and it has been linked to North Korean hackers. The researchers said it’s possible that the malware wasn’t actually used in attacks and instead it’s part of tests conducted by the hackers to see if they can bypass detection and pass Apple’s notarization. Three individuals arrested and charged in US over SIM swapping Three residents of Indiana have been arrested and charged over their alleged roles in a SIM swapping operation. The suspects are Indigo Kiara Graham, Cortez Tarmar Crawford, and Trevon Demar Allen. According to authorities, the defendants created fraudulent IDs in victims’ names, performed SIM swaps in exchange for money, and obtained 2FA codes. The SIM swapping ultimately allowed money and data theft, with some victims being extorted for restoring access to data. New real-time protections in Android Google this week announced two new real-time protection features in Android, namely Scam Detection in Phone and Google Play Protect live threat detection. The former, now rolling out to Pixel devices, uses on-device AI to notify users of potential scam calls by detecting conversation patterns commonly associated with scams. The latter, available for Pixel 6 and later devices, analyzes the activity patterns of apps to deliver real-time alerts on potential harmful software, with an initial focus on stalkerware. Related: In Other News: FBI’s Ransomware Disruptions, Recall Delayed Again, CrowdStrike Responds to Bloomberg Article Related: In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms, LastPass Phishing Campaign Written By SecurityWeek News MORE FROM SECURITYWEEK NEWS * Cybereason and Trustwave Announce Merger * US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ Hack * In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms, LastPass Phishing Campaign * In Other News: FBI’s Ransomware Disruptions, Recall Delayed Again, CrowdStrike Responds to Bloomberg Article * Armis Raises $200M at $4.2B Valuation, Eyes IPO * Filigran Secures $35M Investment to Disrupt Threat Intel * In Other News: CVE Turns 25, Henry Schein Data Breach, Reward for Shahid Hemmat Hackers * Concentric AI Secures $45M Series B Funding to Expand DSPM Tech LATEST NEWS * Homeland Security Department Releases Framework for Using AI in Critical Infrastructure * SurePath AI Raises $5.2 Million for Gen-AI Governance Solution * Glove Stealer Malware Bypasses Chrome’s App-Bound Encryption * Known Brand, Government Domains Hijacked via Sitting Ducks Attacks * CISO Forum Virtual Summit: Full Session List On Demand * Man Who Stole and Laundered Roughly $1B in Bitcoin Is Sentenced to 5 Years in Prison * CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks * Critical Plugin Flaw Exposed 4 Million WordPress Websites to Takeover TRENDING PALO ALTO NETWORKS CONFIRMS NEW FIREWALL ZERO-DAY EXPLOITATION CITRIX, CISCO, FORTINET ZERO-DAYS AMONG 2023S MOST EXPLOITED VULNERABILITIES CISCO PATCHES CRITICAL VULNERABILITY IN DATA CENTER MANAGEMENT PRODUCT NIST EXPLAINS WHY IT FAILED TO CLEAR CVE BACKLOG KNOWN BRAND, GOVERNMENT DOMAINS HIJACKED VIA SITTING DUCKS ATTACKS VMWARE PATCHES POTENTIALLY SERIOUS PIXEL SHADER VULNERABILITIES HOMELAND SECURITY DEPARTMENT RELEASES FRAMEWORK FOR USING AI IN CRITICAL INFRASTRUCTURE VENEZUELA’S MADURO SAYS CYBER ATTACK PREVENTED POWER RESTORATION DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. WEBINAR: INSIDE A HACKER’S PLAYBOOK: HOW CYBERCRIMINALS USE DEEPFAKES AND BEC TO STEAL COMPANY FUNDS December 10, 2024 Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses. Register EVENT: ICS CYBERSECURITY CONFERENCE Oct. 21-24, 2024 | Atlanta The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity. Watch Sessions PEOPLE ON THE MOVE Erica Smith will become CFO at CyberArk, effective January 1, 2025. AI-powered identity verification provider Vouched has appointed Neal Oman as CTO and Patrick Williams as Senior Director of Marketing. Todd Chronert has joined MDR company Red Canary as its Chief Revenue Officer (CRO). More People On The Move EXPERT INSIGHTS THE BIGGEST INHIBITOR OF CYBERSECURITY: THE HUMAN ELEMENT Essential steps such as security awareness training, MFA, and Zero Trust identity management help organizations reduce the human element and stay ahead in the cybersecurity curve. (Torsten George) DESIGNING A FUTURE-FOCUSED CYBERSECURITY INVESTMENT STRATEGY CISOs must attempt to define a strategic approach to technology investment that will protect the business over the long term. (Marc Solomon) API SECURITY MATTERS: THE RISKS OF TURNING A BLIND EYE Willfully ignoring important security issues to make our lives easier is, unfortunately, something that does happen in the security field. (Joshua Goldfarb) BACK TO THE FUTURE, SECURING GENERATIVE AI While there are similar security challenges that parallel traditional security, we must understand that AI requires new ways to approach security. (Matt Honea) HOW TO IMPROVE THE SECURITY OF AI-ASSISTED SOFTWARE DEVELOPMENT CISOs need an AI visibility and KPI plan that supports a “just right” balance to enable optimal security and productivity outcomes. (Matias Madou) * * Flipboard Reddit Whatsapp Whatsapp Email * * * POPULAR TOPICS * Cybersecurity News * Industrial Cybersecurity SECURITY COMMUNITY * Virtual Cybersecurity Events * Webcast Library * CISO Forum * AI Risk Summit * ICS Cybersecurity Conference * Cybersecurity Newsletters STAY INTOUCH * Cyber Weapon Discussion Group * RSS Feed * Security Intelligence Group * Follow SecurityWeek on LinkedIn ABOUT SECURITYWEEK * Advertising * Event Sponsorships * Writing Opportunities * Feedback/Contact Us NEWS TIPS Got a confidential news tip? We want to hear from you. Submit Tip ADVERTISING Reach a large audience of enterprise cybersecurity professionals Contact Us DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Daily Briefing and get the latest content delivered to your inbox. * Privacy Policy Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved. DAILY BRIEFING NEWSLETTER Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time. Close