By security practitioners, for security practitioners novacoast federal | Apex Program | novacoast | about innovate
By security practitioners, for security practitioners

Weekly Top Ten Cybersecurity Stories – 8.19.2022

WEEKLY TOP TEN | AUGUST 19, 2022 22:01 GMT

Our Threat Operations and Intelligence team compiles a daily digest of new cybersecurity threats from around the Internet. This top 10 has been culled from the 40+ unique stories we found relevant over the week, ranked by highest risk:

  1. Cybereason Researchers Warn of Increasing Use of Bumblebee Malware Loader in Campaigns
    https://thehackernews.com/2022/08/hackers-using-bumblebee-loader-to.html
  2. Several Zimbra Collaboration Suite CVEs Found in Active Exploitation by Threat Actors
    https://securityaffairs.co/wordpress/134314/hacking/zimbra-rce-actively-exploited.html
  3. New DarkTortilla Crypter Increasingly Found Protecting RAT Campaigns
    https://www.darkreading.com/vulnerabilities-threats/darktortilla-sophisticated-malware-rat-infections
  4. Chinese-affiliated Winnti APT Found Breaking Cobalt Strike Payloads Into Numerous Obfuscated Fragments to Avoid Detection
    https://www.bleepingcomputer.com/news/security/winnti-hackers-split-cobalt-strike-into-154-pieces-to-evade-detection/
  5. BlackByte Ransomware Outfit Releases Updated 2.0 Version, Updates Extortion Methodology
    https://securityaffairs.co/wordpress/134531/cyber-crime/blackbyte-ransomware-v2.html
  6. Yet Another Cryptominer-laced PyPI Package Discovered by Security Researchers
    https://securityaffairs.co/wordpress/134381/security/pypi-package-fileless-linux-malware.html
  7. CISA Releases Alert on Zeppelin Ransomware Organization
    https://www.cisa.gov/uscert/ncas/alerts/aa22-223a
  8. Apple Patches Two Zero Day Vulnerabilities Affecting iOS, iPadOS, and macOS Devices
    https://securityaffairs.co/wordpress/134527/security/apple-zero-day-flaws-2.html
  9. Researchers Discover In-Development BugDrop Android Malware Bypassing Google Security Controls To Deploy Xenomorph RAT
    https://www.threatfabric.com/blogs/bugdrop-new-dropper-bypassing-google-security-measures.html
  10. Threat Actor Impersonates McAfee in Widespread Phishing Campaign
    https://www.consumeraffairs.com/news/scammers-are-impersonating-software-maker-mcafee-in-new-imposter-scam-081622.html
Previous Post

Fidelis Cybersecurity Training and Certification

Next Post

Cloudflare Training and Certification

Innovate uses cookies to give you the best online experience. If you continue to use this site, you agree to the use of cookies. Please see our privacy policy for details.