The notable shortage of cybersecurity specialists on the market in recent years has become particularly problematic in 2020. The pandemic, which has led to a widespread shift to remote working, has also highlighted the need to change security strategies at many companies. Even small firms have realized that the skills show more ...
of their IT administrators are no longer sufficient to ensure business continuity and protect corporate information. Management faces a choice: Hire an additional information security specialist or provide specialist advanced training to existing IT staff. Both approaches have merit, but the second is where we can help you out. The changed threat landscape The best person to explain what has changed since the beginning of social isolation and stay-at-home orders is your own IT administrator. The task of making remote work convenient for workers was foisted on IT departments, and in most cases they have been able to cope with the challenge, providing access to corporate information systems, setting up new services, and helping employees troubleshoot any difficulties that arose. But within just a few weeks, it became clear to many that new processes required new security mechanisms. That happened primarily because all sorts of attackers became active, sending phishing messages and carrying out BEC attacks on employees working from home, although attempts to brute-force remote access tools have seen explosive growth as well. Employees have complicated the situation. Finding themselves in unfamiliar and uncomfortable environments, many took it upon themselves to search for tools to facilitate teamwork. In many cases, they didn’t bother to seek IT specialists’ approval for the use of those applications and services, and they rarely showed much care in securing them. As a result, IT administrators not only had to keep an eye on a bunch of new factors in their workplaces, but they also had to think of ways to make remote work as secure as possible. Gaining a deeper knowledge of today’s threat landscape and a better understanding of what is happening at employees’ remote workstations has become paramount. How we can help The Kaspersky Endpoint Security Cloud solution, which protects employee workstations, is one of the key tools in our arsenal. Because it works in the cloud and does not require additional hardware, it does not place an unnecessary load on IT resources. At the same time, the administrator can manage the solution from a single cloud console. One of its latest feature updates is a mechanism for detecting shadow IT systems, which are the very cloud services employees use to work with corporate data without informing their IT department. However, our colleagues continue to improve the solution. Seeing that many administrators lack a full understanding of modern cyberthreats, they released a new experimental feature, Cybersecurity for IT Online, a training tool you can access directly from the same console. We’d say the course brings IT solution managers’ knowledge up to the level of a beginner security expert. At the moment, training focuses specifically on improving understanding of malicious software. It teaches users basic malware classification and how to recognize dangerous and suspicious behavior, and it offers interactive tasks in a simulated environment. Students acquire the skills of an incident detection specialist. The feature has been implemented in the beta version of the solution, and our experts are prepared to expand the range of available lessons if we see a demand for that. Another innovation in this version of Kaspersky Endpoint Security Cloud is product video guides, also accessible from the console. The guides will help employees set up the new solution without having to hunt through manuals. To learn more and try out the demo version of Kaspersky Endpoint Security Cloud, you can download it here.
The US Department of Treasury's Financial Crimes Enforcement Network (FinCEN) today announced the first-ever penalty against a Helix and Coin Ninja cryptocurrency mixing services.
Referred to as WIZARD SPIDER, the group has been widely using TrickBot for the distribution of ransomware, and the recent attempts to disrupt the botnet were expected to put an end to such operations.
The report focuses on creating a supply chain strategy for ICTs but notes that similar efforts are needed for operational technologies that control critical infrastructure sectors.
Researchers from Kaspersky Lab have spotted new variants of GravityRAT which is known for checking the CPU temperature of Windows computers to avoid being executed in sandboxes and virtual machines.
Cybersecurity megamix continues its shopping spree by adding identity management firm Decipher Works and cloud security specialists CloudTen to its growing list of brands.
The Yazoo County School District of Mississippi has voted to pay $300,000 to recover files encrypted during a suspected ransomware attack where hackers accessed its IT systems without authorization.
While Trickbot has taken some hard punches, it's probably not done. There are also signs that the people behind Trickbot are fighting back, bringing new servers up as others go down.
The attackers started as a low-level user and exploited the Zerologon vulnerability (CVE-2020-1472) to gain access to the primary domain controller, with the entire attack lasting about 5 hours.
VulnerableThings.com, an online platform designed to help IoT vendors receive, assess, manage, and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF).
Active since last week, the Office 365 operation has reached tens of thousands of inboxes through multiple connected campaigns spoofing apps like Microsoft Office, Microsoft Teams, and Zoom.
The electronics retailer was fined $9,000 for failing to secure customers' personal details such as names, mobile numbers, and addresses, after its second breach of data protection laws in two years.
The FBI issued a flash alert to warn of the potential use of spoofed US Census Bureau domains in future malicious campaigns including phishing and credential theft attacks.
A new phishing campaign uses a Coinbase-themed email pretending to be a "New terms of service" that prompts users to install an Office 365 consent app that gives attackers access to a victim's email.
Instagram's alleged data mishandling allowed the email addresses and phone numbers of children aged under 18 to become visible to other users. Facebook has denied breaking any privacy laws.
A security researcher has discovered a vulnerability in Google’s Waze app that can allow hackers to identify people using the popular navigation app and track them by their location.
Russian activity involved reconnaissance operations, as per the UK NCSC. Targets included the Games' organizers, logistics services, and sponsors, the UK government said in a separate press release.
Faced with business continuity challenges, many companies failed to put all the necessary protocols, processes, and controls in place, making it difficult for security teams to respond to incidents.
On September 18, the company was hit by a cyberattack, some of the websites operated by the company were not reachable, including Ray-Ban, Sunglass Hut, LensCrafters, EyeMed, and Pearle Vision.
SOCs are most concerned with advanced threat detection and are increasingly looking to next-gen automation tools like AI/ML technologies to proactively safeguard the enterprise, Micro Focus reveals.
The data leaked on the Russian hacking forum includes Florida voters’ names, voter IDs, phone numbers, addresses, dates of birth, gender, race, party affiliation, and more
The US government formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses.
Rapper “Nuke Bizzle" was charged with fraudulently applying for over $1.2 million in benefits under CARES Act, as per a statement from the U.S. Attorney’s Office in the Central District of California.
The attack occurred in September and targeted at least 20 subscribers of the Partner Communications Company (formerly Orange Israel), all of them involved at a higher level in cryptocurrency projects.
The NSA warned that Chinese government hackers were taking aim at U.S. networks involved in defense, characterizing the threat posed by Beijing as a critical priority in need of urgent attention.
NotifyUs will enable data handlers to check whether it is mandatory to report a breach under new rules. It was launched ahead of the new privacy bill, which comes into force on December 1.
The SQL injection vulnerability in Street Mobster impacted the players’ usernames, email addresses, and passwords, as well as other game-related data that is stored on the database.
A ransomware gang has donated a part of the ransom demands it extorted from victims to charity organizations. The sender was a ransomware group going by the name of Darkside.
The cyber intelligence startup 4iQ said it’s planning to ramp up its investment in go-to-market activities after hiring Kailash Ambwani as its new chief executive and closing the new funding round.
Iranian-American businessman Farhad Azima has accused a pair of Indian companies of stealing his emails and publishing them to the web, according to a lawsuit filed in federal court in North Carolina.
With the address bar being the only and last line of defense on mobile browsers, address bar spoofing vulnerabilities are many times more dangerous on smartphones and other mobile devices.
Zero-trust security has three main on-ramps -- each with its own technology path. For a clear-cut zero-trust implementation, enterprises need to choose their on-ramp wisely.
The cross-section of networks, cybersecurity, and applications existing in the cloud, on-premises, and in hybrid environments adds a layer of complexity that multiple teams across domains must manage.
Security firms, victim advocacy groups, and anti-domestic abuse organizations combined forces roughly a year ago to bring an end to stalkerware used to monitor domestic partners’ devices.
Revealing an attack on the U.S. Census Bureau from last year, the DHS warns that nation-state actors linked to China, Russia, Iran, and North Korea can attempt to disrupt upcoming elections.
Kaspersky researchers are warning against an attack campaign by the GravityRAT spyware that can now target Android and macOS devices in addition to Windows systems, making it a multiplatform threat.
A fresh report reveals that hackers are resorting to account takeover in Office 365 using innovative techniques, as more and more organizations deploy Microsoft services and products.
This Metasploit module exploits the .NET deserialization vulnerability within the RadAsyncUpload (RAU) component of Telerik UI ASP.NET AJAX that is identified as CVE-2019-18935. In order to do so the module must upload a mixed mode .NET assembly DLL which is then loaded through the deserialization flaw. Uploading the show more ...
file requires knowledge of the cryptographic keys used by RAU. The default values used by this module are related to CVE-2017-11317, which once patched randomizes these keys. It is also necessary to know the version of Telerik UI ASP.NET that is running. This version number is in the format YYYY.#(.###)? where YYYY is the year of the release (e.g. 2020.3.915).
Red Hat Security Advisory 2020-4273-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include crlf injection and traversal vulnerabilities.
Red Hat Security Advisory 2020-4265-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include cross site scripting and information leakage vulnerabilities.
Ubuntu Security Notice 4593-1 - Sergei Glazunov discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.
Gentoo Linux Security Advisory 202010-6 - Ark was found to allow arbitrary file overwrite, possibly allowing arbitrary code execution. Versions less than 20.04.3-r2 are affected.
Gentoo Linux Security Advisory 202010-5 - Multiple vulnerabilities have been found in LibRaw, the worst of which may allow attackers to execute arbitrary code. Versions less than 0.20.0 are affected.
Red Hat Security Advisory 2020-4276-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an information leakage vulnerability.
An unauthenticated remote code execution vulnerability was found in the LISTSERV Maestro software, versions 9.0-8 and below. This vulnerability stems from a known issue in struts, CVE-2010-1870, that allows for code execution via OGNL Injection. This vulnerability has been confirmed to be exploitable in both the show more ...
Windows and Linux version of the software and has existed in the LISTSERV Maestro software since at least version 8.1-5. As a result, a specially crafted HTTP request can be constructed that executes code in the context of the web application. Exploitation of this vulnerability does not require authentication and can lead to root level privilege on any system running the LISTServ Maestro services.
Ubuntu Security Notice 4592-1 - Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Andy Nguyen discovered that the Bluetooth A2MP show more ...
implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information. Various other issues were also addressed.
Red Hat Security Advisory 2020-4290-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a use-after-free vulnerability.
Gentoo Linux Security Advisory 202010-4 - Multiple vulnerabilities have been found in libxml2, the worst of which could result in a Denial of Service condition. Versions less than 2.9.10 are affected.
This Metasploit module attempts to create a new login session by invoking the su command of a valid username and password. If the login is successful, a new session is created via the specified payload. Because su forces passwords to be passed over stdin, this module attempts to invoke a pseudo-terminal with python, python3, or script.
Red Hat Security Advisory 2020-4291-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
Red Hat Security Advisory 2020-4286-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an information leakage vulnerability.
Gentoo Linux Security Advisory 202010-3 - An information disclosure vulnerability in libjpeg-turbo allow remote attackers to obtain sensitive information. Versions 2.0.4-r1 are affected.
Red Hat Security Advisory 2020-4289-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an information leakage vulnerability.
Ubuntu Security Notice 4591-1 - Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Andy Nguyen discovered that the Bluetooth A2MP show more ...
implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information. Various other issues were also addressed.
Red Hat Security Advisory 2020-4287-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service and information leakage vulnerabilities.
The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks
A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact
There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is the
A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact