For many companies, the mass transition of staff to remote working created a need for new tools. Years of fine-tuning employee interaction mechanisms went down the drain overnight as IT departments scrambled to deploy market-ready collaboration solutions. These solutions aroused no less interest among cybercriminals, show more ...
who smelled an opportunity to gain remote access to companies’ information systems and spread malware through corporate networks. New threat landscape The problem with collaboration solutions is that at any moment they can be turned into vehicles for spreading infection across the corporate network. Just one negligent employee (who uses an obvious password, logs in from a compromised machine, opens a malicious attachment, etc.) can expose the working environment to attack, whether that employee logs in from an office cubicle or a home office. The surge of interest in platforms of this kind led to a market glut of crude programs that were more focused on convenience than security. Collaboration tool security popped up in the news every now and again throughout spring and summer 2020. As a result, when the tide of confusion receded, companies that had factored in protective technologies in advance got marketing advantages. How to protect your collaboration platform When choosing a secure collaboration system, customers generally consider several aspects: encryption type, availability of multifactor authentication, the data storage server’s physical location, and data protection methods. We can assist with the latter in the form of Kaspersky Scan Engine, one of our solutions for corporate clients and technology partners. It readily integrates with any software product, scanning the files that flow through the collaboration environment for malware. Nextcloud protection Nextcloud, which is pretty clued-in about user security, enables Kaspersky Scan Engine for use as a file antivirus in its collaboration platform. Nextcloud is deployed in a private cloud on the client side, and it supports the connection of various types of user devices. In other words, in the shared working environment, files may be loaded from totally different operating systems. In theory, that flexibility increases the risk of threat propagation: first, because security solutions for different platforms can provide varying levels of protection; second, because users of some types of systems (such as Linux) tend not to use antivirus solutions at all. To prevent an end user from inadvertently (or deliberately) compromising the corporate collaboration environment by downloading and distributing a malicious file, the platform creators developed a security app that our scanning engine can connect to. To use it, corporate clients need to get the Kaspersky Scan Engine, install the Nextcloud Antivirus app, and configure it to work with our solution. That done, the app scans every file uploaded to the server for malicious code, detecting ransomware, cryptominers, spyware, and other dangerous objects. The engine receives real-time information about the latest threats through Kaspersky Security Network and can repel an attack within minutes of our technologies learning of the threat. To install Nextcloud Antivirus and connect our engine to it, learn more on the Kaspersky Scan Engine page.
The idea behind the heatmap is to automate the early bug discovery process and make it easier for enterprises to identify hotspots where functionality is most affected and quickly mitigate it.
Two critical flaws in Magento – Adobe’s e-commerce platform that is commonly targeted by attackers like the Magecart threat group – could enable arbitrary code execution on affected systems.
The K-12 Cybersecurity Resource Center has recorded more than 1,000 cyber incidents involving K-12 institutions in the United States since 2016, including ransomware and denial-of-service attacks.
The United States Cyber Command (USCYBERCOM) warns that users should apply the latest patches for Microsoft software to ensure they won’t fall victim to exploitation attempts.
Almost 800,000 internet-accessible SonicWall VPN appliances will need to be updated and patched for a major new vulnerability that was disclosed on Wednesday.
A ransomware gang going by the of Egregor has leaked data it claims to have obtained from the internal networks of two of today's largest gaming companies — Ubisoft and Crytek.
The firefighting department said that its database was hacked by unknown people demanding $600,000 in an act of alleged extortion. However, the department contacted police and have not paid the money.
San Francisco, CA-based FOSSA has raised $23.2 million in a Series B funding round from Bain Capital Ventures, Canvas Ventures, and Costanoa Ventures; bringing the total raised to $35 million.
It’s important to realize that the broader healthcare ecosystem spans numerous industries and such entities often have deep connections into healthcare providers’ operations and information systems.
The MuddyWater group uses phishing emails carrying malicious Excel or PDF documents that, when opened, would download and install a malware strain from the hackers' servers.
The growing volume and complexities of cyber threats present a compelling case for adopting threat intelligence platforms (TIPs), according to an analysis by Frost & Sullivan.
Cisco Talos discovered multiple code execution and information disclosure vulnerabilities in various functions of the F2FS toolset. F2FS is a filesystem toolset commonly found in embedded devices.
A new report by Deloitte and the National Association of State Chief Information Officers states that state and local governments can benefit by working together against ransomware and other threats.
The updates released by SAP for October 2020 include 15 Security Notes, including one that addresses a critical vulnerability. Six previously released Patch Day Security Notes were updated.
Initiatives that feature transformation delivered securely, with agility and speed at the core, will provide the sort of experience that customers, partners, and employees require.
According to the DOJ, QQAAZZ members operated a large network of bank accounts and money mules that allowed malware gangs to funnel money from hacked accounts to new, clean destinations.
Though most organizations can protect themselves effectively against DDoS attacks, researchers say it’s still important to take these threats seriously and actually invest in strong protections.
On October 14, the Emotet botnet began distributing malicious Word documents meant to download and execute a copy of Emotet. Researchers say Emotet bots received commands to fetch and run Trickbot.
The scheme used pop-up messages that disguised themselves as security alerts from Microsoft or other reputable tech companies to target primarily elderly consumers living in the United States.
Researchers at Bitdefender Labs have created a decryption tool for MaMoCrypt which is an unusual piece of ransomware, a variant of MZRevenge written in Delphi and packed using mpress.
According to Cyble, the leaked data includes personal information like names, phone numbers, user IDs, and date and time of account creation. A sample of the leaked data has been reviewed by ET.
The card details of over three million customers of Dickey's Barbecue Pit, the largest barbecue restaurant chain in the US, have been posted this week on a carding marketplace called Joker's Stash.
Security researchers say that such emails are distributed to implant fear and unnecessary chaos in the public and might also be crafted to target recipients with cryptomining, ransomware, or spyware.
Volume of data breaches reported in the US is on track for its lowest number since 2015, although hundreds of millions have had their details compromised so far in 2020, according to official figures.
The National Center for Research and Development in the European Union awards Security On-Demand research grant to accelerate cyber threat analytics technology development.
Unidentified hackers attacked the servers of Noida-based Haldiram’s Snacks with ransomware, stealing sensitive data and demanding a ransom of around $10,000 to release the information.
Juniper Networks has published 40 security advisories describing vulnerabilities in its Junos OS operating system, which powers the company’s firewalls, and various third-party components.
The ICO fined British Airways 20 million pounds - its biggest penalty to date - for failing to protect data that left more than 400,000 of its customers’ details the subject of a 2018 cyber attack.
As new payment trends emerge, such as the surge in e-commerce during the COVID-19 pandemic, payment card standards also must change, says Jeremy King of the PCI Security Standards Council.
Azure Defender for IoT, Microsoft's security solution for smart devices and industrial equipment, was announced earlier this month at the Microsoft Ignite 2020 developer conference.
Agari examined thousands of suspected BEC schemes and found that these criminal gangs are now operating in 50 countries, including newer locations that include Eastern Europe and Russia.
Hackers impersonated the North Korean Lazarus group to threaten British foreign exchange company Travelex of launching a DDoS attack on the network unless it pays 20 BTC.
FireEye disclosed financially-motivated hacking group FIN11, which has run some of the longest phishing and malware campaigns earlier, is now distributing ransomware to target pharmaceutical companies.
The online proctoring service disabled access for users after its parent company was hacked. Moreover, the source code for various Verificient apps were leaked last week on Twitter and Telegram.
Ubuntu Security Notice 4546-2 - USN-4546-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these show more ...
to cause a denial of service, conduct cross-site scripting attacks, spoof the site displayed in the download dialog, or execute arbitrary code. Various other issues were also addressed.
Ubuntu Security Notice 4584-1 - It was discovered that HtmlUnit incorrectly initialized Rhino engine. An attacker could possibly use this issue to execute arbitrary Java code.
Ubuntu Security Notice 4585-1 - It was discovered that Newsbeuter didn't handle the command line input properly. An remote attacker could use it to ran remote code by crafting a special input file. It was discovered that Newsbeuter didn't handle metacharacters in its filename properly. An remote attacker could use it to ran remote code by crafting a special filename.
Ubuntu Security Notice 4589-2 - USN-4589-1 fixed a vulnerability in containerd. This update provides the corresponding update for docker.io. It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials. Various other issues were also addressed.
Ubuntu Security Notice 4589-1 - It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials.
Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack
Carole and I have been producing a light-hearted look at the world of cybersecurity and privacy just about every week since December 2016. And this week, after millions of downloads, we released our 200th episode! We wanted to celebrate reaching that milestone, and thank the many many people who listen each week, by doing something special... and so last night we met up on YouTube for a livestream party.
British Airways has been fined £20 million (US $26 million) following a data breach which saw its systems hacked and the personal and payment card information of 400,000 customers stolen. Read more in my article on the Hot for Security blog.
Reading Time: ~ 2 min. Backdoor Found in Children’s Smartwatch Researchers have discovered that the X4, made by Norwegian smartwatch seller Xplora, contains a backdoor that could allow for information to be stolen. The X4 watch is designed specifically for children with a limited number of capabilities, mostly for show more ...
children’s security. The backdoor, however, could allow attackers to take snapshots, view messages, call records, and access geolocational data from the wearer. The watches are designed and built in China and it remains unclear who has access to data created and stored on the devices. Ransomware Strikes London Borough The London borough of Hackney recently fell victim to a ransomware attack, taking several of the council’s primary services offline. While still little is known about the attack, it’s likely that encrypted files were also stolen for auctioning to the highest bidder. Council officials are working with law enforcement to determine the initial attack vector and information that may have been targeted. Carnival Reveals Updates to Recent Cyberattack Nearly two months after a ransomware attack compromised a third-party vendor for the Carnival Corporation, the company announced sensitive passenger information has indeed been exposed. An undetermined number of customers and employees may be affected across three Carnival cruise lines. With 150,000 employees worldwide, and upwards of 13 million customers, this data breach could be affect millions of individuals. Ransomware Takes Aim at International Law Firm International law firm Seyfarth Shaw has confirmed a ransomware attack targeted their systems over the weekend. While the extent of the attack remains unclear, several systems were forced offline after encryption was executed to stop additional spreading. Firm officials stated that no client information was stolen or illicitly accessed, but they are still operating without email or a live website. Some systems were saved from the attack but officials have yet to confirm if customers were affected by the breach. Software AG Suffers Major Data Breach German IoT specialist Software AG suffered a ransomware attack that was able to exfiltrate significant amounts of data. Officials have confirmed that, while they have been able to maintain online services throughout the attack, the malicious downloading of an unknown amount of sensitive data did take place. The attacking group has not yet been identified, but other attacks of similar scale have cost companies anywhere from $20 to $70 million in ransoms for the return of their data. The post Cyber News Rundown: Child Smartwatch Backdoored appeared first on Webroot Blog.