Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Training by security ...

 Business

The notable shortage of cybersecurity specialists on the market in recent years has become particularly problematic in 2020. The pandemic, which has led to a widespread shift to remote working, has also highlighted the need to change security strategies at many companies. Even small firms have realized that the skills   show more ...

of their IT administrators are no longer sufficient to ensure business continuity and protect corporate information. Management faces a choice: Hire an additional information security specialist or provide specialist advanced training to existing IT staff. Both approaches have merit, but the second is where we can help you out. The changed threat landscape The best person to explain what has changed since the beginning of social isolation and stay-at-home orders is your own IT administrator. The task of making remote work convenient for workers was foisted on IT departments, and in most cases they have been able to cope with the challenge, providing access to corporate information systems, setting up new services, and helping employees troubleshoot any difficulties that arose. But within just a few weeks, it became clear to many that new processes required new security mechanisms. That happened primarily because all sorts of attackers became active, sending phishing messages and carrying out BEC attacks on employees working from home, although attempts to brute-force remote access tools have seen explosive growth as well. Employees have complicated the situation. Finding themselves in unfamiliar and uncomfortable environments, many took it upon themselves to search for tools to facilitate teamwork. In many cases, they didn’t bother to seek IT specialists’ approval for the use of those applications and services, and they rarely showed much care in securing them. As a result, IT administrators not only had to keep an eye on a bunch of new factors in their workplaces, but they also had to think of ways to make remote work as secure as possible. Gaining a deeper knowledge of today’s threat landscape and a better understanding of what is happening at employees’ remote workstations has become paramount. How we can help The Kaspersky Endpoint Security Cloud solution, which protects employee workstations, is one of the key tools in our arsenal. Because it works in the cloud and does not require additional hardware, it does not place an unnecessary load on IT resources. At the same time, the administrator can manage the solution from a single cloud console. One of its latest feature updates is a mechanism for detecting shadow IT systems, which are the very cloud services employees use to work with corporate data without informing their IT department. However, our colleagues continue to improve the solution. Seeing that many administrators lack a full understanding of modern cyberthreats, they released a new experimental feature, Cybersecurity for IT Online, a training tool you can access directly from the same console. We’d say the course brings IT solution managers’ knowledge up to the level of a beginner security expert. At the moment, training focuses specifically on improving understanding of malicious software. It teaches users basic malware classification and how to recognize dangerous and suspicious behavior, and it offers interactive tasks in a simulated environment. Students acquire the skills of an incident detection specialist. The feature has been implemented in the beta version of the solution, and our experts are prepared to expand the range of available lessons if we see a demand for that. Another innovation in this version of Kaspersky Endpoint Security Cloud is product video guides, also accessible from the console. The guides will help employees set up the new solution without having to hunt through manuals. To learn more and try out the demo version of Kaspersky Endpoint Security Cloud, you can download it here.

 Malware and Vulnerabilities

Researchers from Kaspersky Lab have spotted new variants of GravityRAT which is known for checking the CPU temperature of Windows computers to avoid being executed in sandboxes and virtual machines.

 Incident Response, Learnings

The Yazoo County School District of Mississippi has voted to pay $300,000 to recover files encrypted during a suspected ransomware attack where hackers accessed its IT systems without authorization.

 Trends, Reports, Analysis

While Trickbot has taken some hard punches, it's probably not done. There are also signs that the people behind Trickbot are fighting back, bringing new servers up as others go down.

 Incident Response, Learnings

The attackers started as a low-level user and exploited the Zerologon vulnerability (CVE-2020-1472) to gain access to the primary domain controller, with the entire attack lasting about 5 hours.

 Incident Response, Learnings

The electronics retailer was fined $9,000 for failing to secure customers' personal details such as names, mobile numbers, and addresses, after its second breach of data protection laws in two years.

 Expert Blogs and Opinion

Faced with business continuity challenges, many companies failed to put all the necessary protocols, processes, and controls in place, making it difficult for security teams to respond to incidents.

 Govt., Critical Infrastructure

NotifyUs will enable data handlers to check whether it is mandatory to report a breach under new rules. It was launched ahead of the new privacy bill, which comes into force on December 1.

 Expert Blogs and Opinion

The cross-section of networks, cybersecurity, and applications existing in the cloud, on-premises, and in hybrid environments adds a layer of complexity that multiple teams across domains must manage.

 Breaches and Incidents

A fresh report reveals that hackers are resorting to account takeover in Office 365 using innovative techniques, as more and more organizations deploy Microsoft services and products.

 Feed

This Metasploit module exploits the .NET deserialization vulnerability within the RadAsyncUpload (RAU) component of Telerik UI ASP.NET AJAX that is identified as CVE-2019-18935. In order to do so the module must upload a mixed mode .NET assembly DLL which is then loaded through the deserialization flaw. Uploading the   show more ...

file requires knowledge of the cryptographic keys used by RAU. The default values used by this module are related to CVE-2017-11317, which once patched randomizes these keys. It is also necessary to know the version of Telerik UI ASP.NET that is running. This version number is in the format YYYY.#(.###)? where YYYY is the year of the release (e.g. 2020.3.915).

 Feed

Red Hat Security Advisory 2020-4273-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include crlf injection and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2020-4265-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include cross site scripting and information leakage vulnerabilities.

 Feed

Ubuntu Security Notice 4593-1 - Sergei Glazunov discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.

 Feed

An unauthenticated remote code execution vulnerability was found in the LISTSERV Maestro software, versions 9.0-8 and below. This vulnerability stems from a known issue in struts, CVE-2010-1870, that allows for code execution via OGNL Injection. This vulnerability has been confirmed to be exploitable in both the   show more ...

Windows and Linux version of the software and has existed in the LISTSERV Maestro software since at least version 8.1-5. As a result, a specially crafted HTTP request can be constructed that executes code in the context of the web application. Exploitation of this vulnerability does not require authentication and can lead to root level privilege on any system running the LISTServ Maestro services.

 Feed

Ubuntu Security Notice 4592-1 - Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Andy Nguyen discovered that the Bluetooth A2MP   show more ...

implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-4290-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a use-after-free vulnerability.

 Feed

This Metasploit module attempts to create a new login session by invoking the su command of a valid username and password. If the login is successful, a new session is created via the specified payload. Because su forces passwords to be passed over stdin, this module attempts to invoke a pseudo-terminal with python, python3, or script.

 Feed

Red Hat Security Advisory 2020-4289-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an information leakage vulnerability.

 Feed

Ubuntu Security Notice 4591-1 - Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Andy Nguyen discovered that the Bluetooth A2MP   show more ...

implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-4287-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and information leakage vulnerabilities.

 Feed

The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks

 Feed

A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact

 Feed

There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is the

 Feed

A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact

2020-10
Aggregator history
Tuesday, October 20
THU
FRI
SAT
SUN
MON
TUE
WED
OctoberNovemberDecember