Midnight Blizzard Conducts Large-Scale Spear-Phishing Campaign Utilizing RDP Files

Summary Since October 22, 2024, Microsoft Threat Intelligence has observed recorded activity of the Russian threat actor known as Midnight Blizzard conducting a sophisticated spear-phishing campaign aimed at individuals in various sectors, including government, academia, defense, and non-governmental organizations. This ongoing activity involves sending highly targeted emails, which include a signed Remote Desktop Protocol (RDP) configuration file…

Read More

Why Hotels Need Regular Penetration Testing: Protecting Guest Data and Brand Reputation

In today’s digital landscape, hotels face increasing cybersecurity risks that can jeopardize guest data and damage brand reputation. Regular penetration testing has become an essential practice for hotels to identify vulnerabilities, ensure compliance, and maintain a strong security posture. This article explores the importance of penetration testing for hotels and guides on implementing an effective…

Read More

Infostealer Infection Results in One of the Largest Retail Breach in History

Summary A significant data breach involving Hot Topic, Torrid, and Box Lunch, advertised by the threat actor Satanic, has reportedly exposed the personal data of 350 million customers, including names, emails, addresses, phone numbers, and birthdates, billions of payment details and loyalty points, including the last 4 digits of customers’ credit cards, card types, hashed…

Read More

Chinese Nation-State Hackers APT41 Attack Gambling Sector for Financial Gain

Summary APT41, also known as Brass Typhoon, Wicked Panda, and Winnti, a Chinese state-sponsored threat actor, has been linked to a sophisticated cyber campaign targeting the gambling and gaming industry, according to a new report from security company Security Joes. Over at least six months, APT41 shifted from traditional espionage to financially motivated attacks, using techniques like…

Read More

RH-ISAC Launches New Program Aimed at Securing Supply Chains

VIENNA, VA (October 22, 2024) – The Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC) announced the launch of LinkSECURE, a new program to help mature the cybersecurity capabilities of vendors and address the growing concern of supply chain cybersecurity vulnerabilities. The program aims to reduce third-party risk for RH-ISAC member companies by strengthening…

Read More

Intel Broker Claims Cisco Breach, Selling Stolen Data from Major Firms

Summary The threat actor known as Intel Broker has allegedly claimed responsibility for a major data breach at technology firm Cisco, stealing sensitive information, including source codes, credentials, and confidential documents. The breach allegedly occurred on October 6 or June 10, 2024, depending on date format, with Intel Broker announcing the theft on Breach Forums on October…

Read More

4,000+ Adobe Commerce, Magento Shops Compromised in CosmicSting Attacks

Summary Adobe Commerce and Magento online stores are being targeted in CosmicSting attacks at an increasingly scaling rate, with threat actors hacking approximately 5% of all Adobe Commerce and Magento stores. The CosmicSting vulnerability, designated CVE-2024-34102, is a critical severity information disclosure flaw; when chained with CVE-2024-2961, a security issue in glibc’s iconv function, an attacker can achieve…

Read More

Retail & Hospitality ISAC Announces Pam Lindemoen as New CSO and VP

Vienna, VA (October 1, 2024) – The Retail & Hospitality Information Sharing and Analysis Center today announced that Pam Lindemoen will join the organization as Chief Security Officer & VP of Strategy. In this role, she will oversee the organization’s security operations, including cybersecurity and information security, while also leading strategic planning and partner engagement….

Read More

BitSight Discloses Zero-Day Vulnerabilities in ATG ICS Critical Infrastructure Systems

Researchers from BitSight Technologies’ TRACE team have uncovered several critical zero-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. If these vulnerabilities are weaponized, malicious actors could exploit industrial control systems (ICS) used in critical infrastructure sectors, including retail and hospitality, potentially causing harm, including physical destruction, environmental risks, and financial losses….

Read More

Hyatt Hotels Leverages Passwordless to Reduce Risk and Elevate the Guest Experience

Yubico and Microsoft deliver strong identity, endpoint and access controls to Hyatt’s global operations Hyatt Hotels Corporation is one of the world’s most well-recognized and respected hospitality brands with approximately 1,500 hotel and all-inclusive properties spanning across 70 countries. With so many properties and employees spread out across the globe, it is a daunting task…

Read More