Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How invulnerable is  ...

 Business

Linux is malware-free — or so many believed for many years. The delusion arose from three bases. First, Linux was a niche system, used far less commonly than Windows. Second, it was used mainly by IT pros, who are savvier than the average user. And third, given the specifics of the system architecture, malware would   show more ...

have to obtain root permissions somehow to cause damage, greatly complicating attacks. However, times change, and nowadays, Linux-based systems are catching up with Windows in some areas, having long overtaken it in others. What’s more, many developers are trying to make their systems more end-user friendly by providing graphical shells and tools that at first glance are indistinguishable from easy-to-use Windows systems. That has greatly increased the popularity of Linux, but it’s also attracted more error-prone users. And the increasing popularity of Linux — in the strategically important server niche as well as in workstations — has drawn more cybercriminal attention. Admittedly, we haven’t seen a single large-scale epidemic affecting Linux-based systems — yet. The masterminds behind targeted and APT attacks are creating ever more tools tailored specifically for this family of operating systems. Having analyzed numerous sophisticated threats in recent years, our colleagues from the Global Research and Analysis Team (GReAT) found that most of today’s attacker groups are seriously interested in Linux. Winniti (aka APT41 or Barium), Cloud Snooper, DarkHotel, Equation, Lazarus, Sofacy, The Dukes, The Lamberts, Turla, WildNeutron, and many others all have tools for attacking Linux-based machines. Another developer of tools targeting Linux is HackingTeam, a company that sells software for so-called legal surveillance to governments and law enforcement agencies. It was hacked a few years ago, and some of its know-how ended up in the hands of cybercriminals. For a more detailed description of attacker groups and their tools, see our Securelist blog report. Linux security tips Our experts have developed a set of recommendations to help minimize threats to Linux systems. Create a list of trusted software sources for Linux and block the installation of software and the running of scripts from third-party sources; Update the software in good time — set it to update automatically, and avoid updates over unencrypted channels; Carefully configure the firewall, making sure it keeps logs and blocks all unused ports; Use two-factor authentication and hardware tokens; Be prepared for insider attacks: Use encryption, Trusted Boot, and hardware integrity control tools; Periodically audit all systems, check logs for indicators of attack, and carry out penetration testing; Use a Linux server security solution. In particular, our corporate solution, Kaspersky Total Security for Business, includes components for protecting mail servers and gateways. You can find more detailed advice and recommendations in this Securelist post.

image for Transatlantic Cable  ...

 News

It is 2020, and an election year in the US, so Dave and I kick off this week’s Kaspersky Transatlantic Cable podcast by looking at Russian troll farms. In this story, the FBI tipped off Facebook, which in turn took down a number of accounts tied to the Internet Research Agency. That may have stopped the accounts   show more ...

before the disinformation spice could flow. Staying in the land of fakeness, we jump from news to Amazon reviews. This deep dive from the media exposed some interesting things about product reviews on the e-commerce giant — in the UK, at least. Our third story stays on the topic of things that aren’t real. Unlike politics and reviews, this story takes a look at artificial intelligence and deepfakes: namely, Microsoft’s new technology to help fight deepfakes. To close out the podcast, we look at some new legislation in the UK that should help protect kids’ app data. If you like what you heard, please consider sharing with your friends or subscribing. For more information on the topics discussed, please click on the links below. After FBI tip, Facebook says it uncovered Russian meddling Amazon takes down a five-star fraud in the UK Microsoft strengthens deepfake fight with new authentication tools UK says children’s apps must have built-in privacy

image for PKI Points the Way f ...

 Companies

Modern enterprise networks are populated by both people and, increasingly, "things." But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is   show more ...

needed for effective IoT security. The post ...Read the whole entry... » Related StoriesWith Remote Work: MFA Makes Everyone HappyHow NIST Is Securing The Quantum EraThe Essential Role of IAM in Remote Work

 Trends, Reports, Analysis

Cybersecurity agencies from New Zealand, France, and Japan warned against Emotet operators who have been working hard to strengthen their infrastructure and ramp up their attacks.

 Govt., Critical Infrastructure

Small and medium-sized healthcare suppliers and providers are set to get a small cybersecurity boost after the government announced a £500,000 (~$650,000) fund to support certification and training.

 Malware and Vulnerabilities

Zeppelin ransomware has sailed back into relevance, after a hiatus of several months. A wave of attacks were spotted in August by Juniper Threatlab researchers, making use of a new trojan downloader.

 Threat Intel & Info Sharing

This CISA alert follows a similar warning the FBI issued in July about an increase in DDoS attacks using amplification techniques.

 Malware and Vulnerabilities

Since the start of the year, the new ProLock ransomware gang has made a name for itself by hacking into large companies and government networks, encrypting files, and demanding huge ransom payments.

 Feed

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged   show more ...

the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

 Feed

Red Hat Security Advisory 2020-3723-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 85.0.4183.83. Issues addressed include information leakage, integer overflow, and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2020-3713-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.

 Feed

Red Hat Security Advisory 2020-3711-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

 Feed

Red Hat Security Advisory 2020-3708-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

 Feed

Red Hat Security Advisory 2020-3706-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

 Feed

Red Hat Security Advisory 2020-3704-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

 Feed

Red Hat Security Advisory 2020-3702-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

 Feed

Gentoo Linux Security Advisory 202009-3 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 85.0.4183.102 are affected.

 Feed

IT help desks everywhere are having to adjust to the 'new normal' of supporting mainly remote workers. This is a major shift away from visiting desks across the office and helping ones with traditional IT support processes. Many reasons end-users may contact the helpdesk. However, password related issues are arguably the most common. Since the onset of the global pandemic that began earlier

 Feed

A group of researchers has detailed a new timing vulnerability in Transport Layer Security (TLS) protocol that could potentially allow an attacker to break the encryption and read sensitive communication under specific conditions. Dubbed "Raccoon Attack," the server-side attack exploits a side-channel in the cryptographic protocol (versions 1.2 and lower) to extract the shared secret key used

 Feed

Bluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide. Discovered independently by two separate teams of academic researchers, the flaw resides in the Cross-Transport Key Derivation (CTKD) of devices

 Feed

Cybercriminals successfully plundered another digital cryptocurrency exchange. European cryptocurrency exchange Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars. Eterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier Digital Asset

 Podcast

The Gadget Show's Jon Bentley joins us to discuss the mystery of a Facebook friend you never requested, software updates for the Mercedes S-Class, and risks in the online classroom. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast hosted by computer security veterans Graham Cluley and Carole Theriault.

2020-09
Aggregator history
Thursday, September 10
TUE
WED
THU
FRI
SAT
SUN
MON
SeptemberOctoberNovember