www.securityweek.com Open in urlscan Pro
2606:4700:20::6818:a003  Public Scan

URL: https://www.securityweek.com/in-other-news-tsa-wants-new-cyber-rules-scam-call-detection-in-android-sim-swappers-arrested/
Submission Tags: falconsandbox
Submission: On November 18 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.securityweek.com/

<form method="get" id="zox-search-form" action="https://www.securityweek.com/">
  <input type="text" name="s" id="zox-search-input" value="Search" onfocus="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }"
    onblur="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }">
  <input type="submit" id="zox-search-submit" value="Search">
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" name="ea" maxlength="128" placeholder="Business Email Address..." class="form-text required" required="">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Text Content

Now on Demand: CISO Forum Virtual Summit - All Sessions Available to Watch
Instantly


SECURITYWEEK NETWORK:

 * Cybersecurity News
 * Webcasts
 * Virtual Events


ICS:

 * ICS Cybersecurity Conference

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker

 * Cybersecurity News
 * Webcasts
 * Virtual Events

 * ICS Cybersecurity Conference

Connect with us
 * 
 * 
 * 

Hi, what are you looking for?





SECURITYWEEK

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker




GOVERNMENT


IN OTHER NEWS: TSA WANTS NEW CYBER RULES, SCAM CALL DETECTION IN ANDROID, SIM
SWAPPERS ARRESTED

Noteworthy stories that might have slipped under the radar: TSA proposes new
cyber rules for pipelines and railroads, Google adds scam call detection to
Android, SIM swappers arrested in US. 

By

SecurityWeek News

November 15, 2024
   
   
 * 

 * Flipboard
   
   Reddit
   
   Whatsapp
   
   Whatsapp
   
   Email

SecurityWeek’s cybersecurity news roundup provides a concise compilation of
noteworthy stories that might have slipped under the radar.

We provide a valuable summary of stories that may not warrant an entire article,
but are nonetheless important for a comprehensive understanding of the
cybersecurity landscape.

Each week, we curate and present a collection of noteworthy developments,
ranging from the latest vulnerability discoveries and emerging attack techniques
to significant policy changes and industry reports. 

Here are this week’s stories: 

Team Software data breach impacts 100,000 people

Business software maker Team Software (WorkWave) revealed this week that a
recent data breach impacts nearly 100,000 individuals. The company said it
detected unauthorized access to its network in late July and an investigation
showed that the compromised systems stored personal information. 

DDoS attack disrupts credit card readers in Israel

A DDoS attack disrupted credit card readers at gas stations and supermarkets in
Israel. The provider impacted by the attack, Hyp Credit Guard, said the attack
lasted for roughly one hour and targeted its services as well as communication
suppliers. The company said it quickly managed to block the attack. 

Advertisement. Scroll to continue reading.


Researcher finds many macOS sandbox escape vulnerabilities

Researcher Mickey Jin has discovered more than 10 macOS sandbox escape
vulnerabilities related to what he described as an overlooked attack surface
involving XPC services. Apple was informed about the findings and patched a
majority of them, but the researcher says there are still a few that are in the
process of being fixed. Sandbox escapes are very valuable to threat actors as
they increase the impact of remote code execution vulnerabilities, which would
otherwise be constrained to the sandbox environment. 

TSA proposes cyber risk management and reporting requirements for pipelines and
railroads

The TSA has proposed a new rule that would require pipeline and railroad owners
and operators to establish cyber risk management programs. These surface
transportation entities would also have to report cybersecurity incidents to the
cybersecurity agency CISA.

Microsoft Visio files abused in phishing attacks

Perception Point has seen cybercriminals leveraging a new type of two-step
phishing attack that involves Microsoft Visio files (.vsdx) and SharePoint to
evade detection. The attacks start with emails sent out from compromised
accounts. The emails deliver links to SharePoint pages that host Visio files,
which redirect users to Microsoft credential phishing pages. Hundreds of
organizations worldwide have been targeted.

Black hat SEO in Japan

Trend Micro in collaboration with academics and authorities in Japan conducted
research into threat groups specializing in black hat search engine optimization
(SEO), including their malware and poisoning attacks. The threat actors’ goal is
to lure users to fake e-commerce sites.

Hamas-linked hackers expand from espionage to disruptive attacks

Wirte, a Hamas-linked threat actor, has expanded its operations, from espionage
to disruptive attacks involving wiper malware, according to Check Point. The
security firm said it found “clear links” between a custom malware used by Wirte
and a wiper that was used to target Israeli entities in attacks observed in
February and October 2024. 

North Korea-linked macOS malware abuses Flutter

Jamf researchers found malware samples that abuse Flutter, Google’s open source
UI software development kit, to obfuscate malicious code. The malware targets
macOS and it has been linked to North Korean hackers. The researchers said it’s
possible that the malware wasn’t actually used in attacks and instead it’s part
of tests conducted by the hackers to see if they can bypass detection and pass
Apple’s notarization. 

Three individuals arrested and charged in US over SIM swapping

Three residents of Indiana have been arrested and charged over their alleged
roles in a SIM swapping operation. The suspects are Indigo Kiara Graham, Cortez
Tarmar Crawford, and Trevon Demar Allen. According to authorities, the
defendants created fraudulent IDs in victims’ names, performed SIM swaps in
exchange for money, and obtained 2FA codes. The SIM swapping ultimately allowed
money and data theft, with some victims being extorted for restoring access to
data. 

New real-time protections in Android

Google this week announced two new real-time protection features in Android,
namely Scam Detection in Phone and Google Play Protect live threat detection.
The former, now rolling out to Pixel devices, uses on-device AI to notify users
of potential scam calls by detecting conversation patterns commonly associated
with scams. The latter, available for Pixel 6 and later devices, analyzes the
activity patterns of apps to deliver real-time alerts on potential harmful
software, with an initial focus on stalkerware. 

Related: In Other News: FBI’s Ransomware Disruptions, Recall Delayed Again,
CrowdStrike Responds to Bloomberg Article

Related: In Other News: China Hacked Singtel, GuLoader Attacks on Industrial
Firms, LastPass Phishing Campaign

Written By SecurityWeek News






MORE FROM SECURITYWEEK NEWS

 * Cybereason and Trustwave Announce Merger
 * US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’
   Hack
 * In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms,
   LastPass Phishing Campaign
 * In Other News: FBI’s Ransomware Disruptions, Recall Delayed Again,
   CrowdStrike Responds to Bloomberg Article
 * Armis Raises $200M at $4.2B Valuation, Eyes IPO
 * Filigran Secures $35M Investment to Disrupt Threat Intel
 * In Other News: CVE Turns 25, Henry Schein Data Breach, Reward for Shahid
   Hemmat Hackers
 * Concentric AI Secures $45M Series B Funding to Expand DSPM Tech


LATEST NEWS

 * Homeland Security Department Releases Framework for Using AI in Critical
   Infrastructure
 * SurePath AI Raises $5.2 Million for Gen-AI Governance Solution
 * Glove Stealer Malware Bypasses Chrome’s App-Bound Encryption
 * Known Brand, Government Domains Hijacked via Sitting Ducks Attacks
 * CISO Forum Virtual Summit: Full Session List On Demand
 * Man Who Stole and Laundered Roughly $1B in Bitcoin Is Sentenced to 5 Years in
   Prison
 * CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks
 * Critical Plugin Flaw Exposed 4 Million WordPress Websites to Takeover



TRENDING


PALO ALTO NETWORKS CONFIRMS NEW FIREWALL ZERO-DAY EXPLOITATION


CITRIX, CISCO, FORTINET ZERO-DAYS AMONG 2023S MOST EXPLOITED VULNERABILITIES


CISCO PATCHES CRITICAL VULNERABILITY IN DATA CENTER MANAGEMENT PRODUCT


NIST EXPLAINS WHY IT FAILED TO CLEAR CVE BACKLOG


KNOWN BRAND, GOVERNMENT DOMAINS HIJACKED VIA SITTING DUCKS ATTACKS


VMWARE PATCHES POTENTIALLY SERIOUS PIXEL SHADER VULNERABILITIES


HOMELAND SECURITY DEPARTMENT RELEASES FRAMEWORK FOR USING AI IN CRITICAL
INFRASTRUCTURE


VENEZUELA’S MADURO SAYS CYBER ATTACK PREVENTED POWER RESTORATION




DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest
threats, trends, and technology, along with insightful columns from industry
experts.




WEBINAR: INSIDE A HACKER’S PLAYBOOK: HOW CYBERCRIMINALS USE DEEPFAKES AND BEC TO
STEAL COMPANY FUNDS

December 10, 2024

Don’t miss this Live Attack demonstration to learn how hackers operate and gain
the knowledge to strengthen your defenses.

Register


EVENT: ICS CYBERSECURITY CONFERENCE

Oct. 21-24, 2024 | Atlanta

The leading industrial cybersecurity conference for Operations, Control Systems
and IT/OT Security professionals to connect on SCADA, DCS PLC and field
controller cybersecurity.

Watch Sessions

PEOPLE ON THE MOVE

Erica Smith will become CFO at CyberArk, effective January 1, 2025.

AI-powered identity verification provider Vouched has appointed Neal Oman as CTO
and Patrick Williams as Senior Director of Marketing.

Todd Chronert has joined MDR company Red Canary as its Chief Revenue Officer
(CRO).

More People On The Move

EXPERT INSIGHTS


THE BIGGEST INHIBITOR OF CYBERSECURITY: THE HUMAN ELEMENT

Essential steps such as security awareness training, MFA, and Zero Trust
identity management help organizations reduce the human element and stay ahead
in the cybersecurity curve. (Torsten George)


DESIGNING A FUTURE-FOCUSED CYBERSECURITY INVESTMENT STRATEGY

CISOs must attempt to define a strategic approach to technology investment that
will protect the business over the long term. (Marc Solomon)


API SECURITY MATTERS: THE RISKS OF TURNING A BLIND EYE

Willfully ignoring important security issues to make our lives easier is,
unfortunately, something that does happen in the security field.  (Joshua
Goldfarb)


BACK TO THE FUTURE, SECURING GENERATIVE AI

While there are similar security challenges that parallel traditional security,
we must understand that AI requires new ways to approach security. (Matt Honea)


HOW TO IMPROVE THE SECURITY OF AI-ASSISTED SOFTWARE DEVELOPMENT

CISOs need an AI visibility and KPI plan that supports a “just right” balance to
enable optimal security and productivity outcomes. (Matias Madou)

   
   
 * 

 * Flipboard
   
   Reddit
   
   Whatsapp
   
   Whatsapp
   
   Email


 * 
 * 
 * 


POPULAR TOPICS

 * Cybersecurity News
 * Industrial Cybersecurity


SECURITY COMMUNITY

 * Virtual Cybersecurity Events
 * Webcast Library
 * CISO Forum
 * AI Risk Summit
 * ICS Cybersecurity Conference
 * Cybersecurity Newsletters


STAY INTOUCH

 * Cyber Weapon Discussion Group
 * RSS Feed
 * Security Intelligence Group
 * Follow SecurityWeek on LinkedIn


ABOUT SECURITYWEEK

 * Advertising
 * Event Sponsorships
 * Writing Opportunities
 * Feedback/Contact Us


NEWS TIPS

Got a confidential news tip? We want to hear from you.

Submit Tip


ADVERTISING

Reach a large audience of enterprise cybersecurity professionals

Contact Us


DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Daily Briefing and get the latest content
delivered to your inbox.


 * Privacy Policy

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights
Reserved.





DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest
cybersecurity news, threats, and expert insights. Unsubscribe at any time.











Close