Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Nov 08, 2024

=> Kdenlive 24.08.3 Arrives with Subtitle and Timeline Stability Fixes | Best Free and Open Source Software

Integrity

Cyble Inc ☛ New GodFather Malware Targets 500 Banking And Crypto Apps

=> ↺ New GodFather Malware Targets 500 Banking And Crypto Apps

Cyble researchers have identified a new stealthier variant of the GodFather malware that uses native code and automated actions to target as many as 500 banking and cryptocurrency apps.

Cyble Inc ☛ GodFather Malware Targets 500 Banking & Crypto Apps Worldwide

=> ↺ GodFather Malware Targets 500 Banking & Crypto Apps Worldwide

Cyble analyzes the latest iteration of the GodFather Android banking trojan, which targets over 500 cryptocurrency and banking applications and has expanded its reach to Japan, Greece, Singapore, and Azerbaijan.

Windows TCO

Scoop News Group ☛ TSA issues proposed cyber mandates for pipelines, rail, airlines

=> ↺ TSA issues proposed cyber mandates for pipelines, rail, airlines

TSA’s new proposed rule would impact just under 300 owners and operators that fall under the agency’s authority in freight railroad, passenger railroad, rail transit, and pipeline sectors, the notice states. Additionally, the rule would ensure the aviation sector follows the same mandates.
The mandates would also require covered entities to develop cyber risk management programs and establish a cybersecurity operational plan, including regular audits to assess their effectiveness.

The Record ☛ Texas-based oilfield supplier faces disruptions following ransomware attack

=> ↺ Texas-based oilfield supplier faces disruptions following ransomware attack

A key supplier for oilfields said a ransomware attack last week has caused disruptions and limited access to certain systems.
In a regulatory filing on Thursday evening, Newpark Resources said it discovered the ransomware attack on October 29 that affected internal information systems.

The Register UK ☛ Cybercrims target global orgs using fake copyright notices

=> ↺ Cybercrims target global orgs using fake copyright notices

You can guess what happens when that archive is extracted. It includes a decoy PDF, an executable, and a DLL that contains the Rhadamanthys stealer. If the victim runs the executable, it [installs] the DLL, which then unpacks and deploys the malware.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2024/11/08/Security_Leftovers.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.64447 milliseconds
Gemini-to-HTML Time
0.727101 milliseconds

This content has been proxied by September (3851b).