article thumbnail

Former NSA employee pleads guilty to attempted selling classified documents to Russia

Security Affairs

The ex-NSA employee had Top Secret clearance that give him access to top secret documents. All three documents from which the excerpts were taken contain NDI, are classified as Top Secret//Sensitive Compartmented Information (SCI) and were obtained by Dalke during his employment with the NSA.”

article thumbnail

Uber hacked, internal systems and confidential documents were allegedly compromised

Security Affairs

Uber on Thursday disclosed a security breach, threat actors gained access to its network, and stole internal documents. Uber on Thursday suffered a cyberattack, the attackers were able to penetrate its internal network and access internal documents, including vulnerability reports. states the message. Pierluigi Paganini.

Hacking 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

These 2 attacks allow to alter certified PDF Documents

Security Affairs

Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. The attacks are documented in CVE-2020-35931 , CVE-2021-28545 , and CVE-2021-28546. ed document by inserting annotations that include malicious code.

Banking 115
article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

Documents leaked from Russian IT contractor NTC Vulkan show it was likely involved in the development of offensive tools. The documents demonstrate that it also developed hacking tools for the Russia-linked APT group Sandworm. The documents include details for three projects named Scan, Amesit, and Krystal-2B.

article thumbnail

New SEC Rules around Cybersecurity Incident Disclosures

Schneier on Security

In an email newsletter, Melissa Hathaway wrote: Now that the rule is final, companies have approximately six months to one year to document and operationalize the policies and procedures for the identification and management of cybersecurity (information security/privacy) risks.

article thumbnail

YouTube creators’ accounts hijacked with cookie-stealing malware

Security Affairs

The malware landing page is disguised as a software download URL that was sent via email or a PDF on Google Drive, or via Google documents containing the phishing links. The researchers identified around 15,000 actor accounts, most of which were created for this campaign. Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

Remcos RAT campaign targets US accounting and tax return preparation firms

Security Affairs

Microsoft warns of a new Remcos RAT campaign targeting US accounting and tax return preparation firms ahead of Tax Day. Tax Day, Microsoft has observed a new Remcos RAT campaign targeting US accounting and tax return preparation firms. Crooks use lures masquerading as tax documentation sent by a client. Ahead of the U.S.