Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Collaboration tools  ...

 Business

For many companies, the mass transition of staff to remote working created a need for new tools. Years of fine-tuning employee interaction mechanisms went down the drain overnight as IT departments scrambled to deploy market-ready collaboration solutions. These solutions aroused no less interest among cybercriminals,   show more ...

who smelled an opportunity to gain remote access to companies’ information systems and spread malware through corporate networks. New threat landscape The problem with collaboration solutions is that at any moment they can be turned into vehicles for spreading infection across the corporate network. Just one negligent employee (who uses an obvious password, logs in from a compromised machine, opens a malicious attachment, etc.) can expose the working environment to attack, whether that employee logs in from an office cubicle or a home office. The surge of interest in platforms of this kind led to a market glut of crude programs that were more focused on convenience than security. Collaboration tool security popped up in the news every now and again throughout spring and summer 2020. As a result, when the tide of confusion receded, companies that had factored in protective technologies in advance got marketing advantages. How to protect your collaboration platform When choosing a secure collaboration system, customers generally consider several aspects: encryption type, availability of multifactor authentication, the data storage server’s physical location, and data protection methods. We can assist with the latter in the form of Kaspersky Scan Engine, one of our solutions for corporate clients and technology partners. It readily integrates with any software product, scanning the files that flow through the collaboration environment for malware. Nextcloud protection Nextcloud, which is pretty clued-in about user security, enables Kaspersky Scan Engine for use as a file antivirus in its collaboration platform. Nextcloud is deployed in a private cloud on the client side, and it supports the connection of various types of user devices. In other words, in the shared working environment, files may be loaded from totally different operating systems. In theory, that flexibility increases the risk of threat propagation: first, because security solutions for different platforms can provide varying levels of protection; second, because users of some types of systems (such as Linux) tend not to use antivirus solutions at all. To prevent an end user from inadvertently (or deliberately) compromising the corporate collaboration environment by downloading and distributing a malicious file, the platform creators developed a security app that our scanning engine can connect to. To use it, corporate clients need to get the Kaspersky Scan Engine, install the Nextcloud Antivirus app, and configure it to work with our solution. That done, the app scans every file uploaded to the server for malicious code, detecting ransomware, cryptominers, spyware, and other dangerous objects. The engine receives real-time information about the latest threats through Kaspersky Security Network and can repel an attack within minutes of our technologies learning of the threat. To install Nextcloud Antivirus and connect our engine to it, learn more on the Kaspersky Scan Engine page.

 Companies to Watch

San Francisco, CA-based FOSSA has raised $23.2 million in a Series B funding round from Bain Capital Ventures, Canvas Ventures, and Costanoa Ventures; bringing the total raised to $35 million.

 Trends, Reports, Analysis

It’s important to realize that the broader healthcare ecosystem spans numerous industries and such entities often have deep connections into healthcare providers’ operations and information systems.

 Trends, Reports, Analysis

Initiatives that feature transformation delivered securely, with agility and speed at the core, will provide the sort of experience that customers, partners, and employees require.

 Malware and Vulnerabilities

On October 14, the Emotet botnet began distributing malicious Word documents meant to download and execute a copy of Emotet. Researchers say Emotet bots received commands to fetch and run Trickbot.

 Malware and Vulnerabilities

Researchers at Bitdefender Labs have created a decryption tool for MaMoCrypt which is an unusual piece of ransomware, a variant of MZRevenge written in Delphi and packed using mpress.

 Identity Theft, Fraud, Scams

Security researchers say that such emails are distributed to implant fear and unnecessary chaos in the public and might also be crafted to target recipients with cryptomining, ransomware, or spyware.

 Trends, Reports, Analysis

Volume of data breaches reported in the US is on track for its lowest number since 2015, although hundreds of millions have had their details compromised so far in 2020, according to official figures.

 Malware and Vulnerabilities

Juniper Networks has published 40 security advisories describing vulnerabilities in its Junos OS operating system, which powers the company’s firewalls, and various third-party components.

 Security Products & Services

Azure Defender for IoT, Microsoft's security solution for smart devices and industrial equipment, was announced earlier this month at the Microsoft Ignite 2020 developer conference.

 Feed

Ubuntu Security Notice 4546-2 - USN-4546-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these   show more ...

to cause a denial of service, conduct cross-site scripting attacks, spoof the site displayed in the download dialog, or execute arbitrary code. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4585-1 - It was discovered that Newsbeuter didn't handle the command line input properly. An remote attacker could use it to ran remote code by crafting a special input file. It was discovered that Newsbeuter didn't handle metacharacters in its filename properly. An remote attacker could use it to ran remote code by crafting a special filename.

 Feed

Ubuntu Security Notice 4589-2 - USN-4589-1 fixed a vulnerability in containerd. This update provides the corresponding update for docker.io. It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4589-1 - It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials.

 Feed

Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack

 Podcast

Carole and I have been producing a light-hearted look at the world of cybersecurity and privacy just about every week since December 2016. And this week, after millions of downloads, we released our 200th episode! We wanted to celebrate reaching that milestone, and thank the many many people who listen each week, by doing something special... and so last night we met up on YouTube for a livestream party.

 Industry Intel

Reading Time: ~ 2 min. Backdoor Found in Children’s Smartwatch Researchers have discovered that the X4, made by Norwegian smartwatch seller Xplora, contains a backdoor that could allow for information to be stolen. The X4 watch is designed specifically for children with a limited number of capabilities, mostly for   show more ...

children’s security. The backdoor, however, could allow attackers to take snapshots, view messages, call records, and access geolocational data from the wearer. The watches are designed and built in China and it remains unclear who has access to data created and stored on the devices. Ransomware Strikes London Borough The London borough of Hackney recently fell victim to a ransomware attack, taking several of the council’s primary services offline. While still little is known about the attack, it’s likely that encrypted files were also stolen for auctioning to the highest bidder. Council officials are working with law enforcement to determine the initial attack vector and information that may have been targeted. Carnival Reveals Updates to Recent Cyberattack Nearly two months after a ransomware attack compromised a third-party vendor for the Carnival Corporation, the company announced sensitive passenger information has indeed been exposed. An undetermined number of customers and employees may be affected across three Carnival cruise lines. With 150,000 employees worldwide, and upwards of 13 million customers, this data breach could be affect millions of individuals. Ransomware Takes Aim at International Law Firm International law firm Seyfarth Shaw has confirmed a ransomware attack targeted their systems over the weekend. While the extent of the attack remains unclear, several systems were forced offline after encryption was executed to stop additional spreading. Firm officials stated that no client information was stolen or illicitly accessed, but they are still operating without email or a live website. Some systems were saved from the attack but officials have yet to confirm if customers were affected by the breach. Software AG Suffers Major Data Breach German IoT specialist Software AG suffered a ransomware attack that was able to exfiltrate significant amounts of data. Officials have confirmed that, while they have been able to maintain online services throughout the attack, the malicious downloading of an unknown amount of sensitive data did take place. The attacking group has not yet been identified, but other attacks of similar scale have cost companies anywhere from $20 to $70 million in ransoms for the return of their data. The post Cyber News Rundown: Child Smartwatch Backdoored appeared first on Webroot Blog.

2020-10
THU
FRI
SAT
SUN
MON
TUE
WED
OctoberNovemberDecember