Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Why backups aren’t ...

 Business

Even newborn babies seem to know the word ransomware these days — it appears in newspapers, magazines, infosec reports, and pretty much everywhere else with alarming regularity. And we may have dubbed 2016 the Year of Ransomware, but it turned out to be nothing in comparison with 2017. After a relatively quiet 2018   show more ...

and 2019, 2020 saw ransomware again making headlines. Our corporate blog contains dozens of articles about ransomware, almost all of which offer three general tips: Use good protection. Never download suspicious files from suspicious sites or open suspicious attachments in e-mails from suspicious people, and teach your employees to do the same. Back up data regularly. From time to time, I hear objections of the following nature: Protection and employee awareness are all well and good, but why bother strengthening protection and training employees when we can just back everything up regularly? We back up all the time anyway, and if we get hit by ransomware, we’ll just restore everything, so what’s the big deal? Here’s the big deal. Backups have to be recoverable Backups are, of course, necessary. But did you ever try restoring your company’s infrastructure from a backup? It might not be as easy as it sounds — and the more computers and infrastructure heterogeneity you have, the more difficult the task becomes. Experienced IT pros have all probably faced a backup not quite restoring everything, or not restoring everything quite as expected. The process is certainly never as quick as they hope. And sometimes backups don’t work at all. Anyone who’s ever stepped on the proverbial backup rake knows they have to check the integrity of backups regularly, to do some practice runs resurrecting the server in a staging environment, and generally to make sure that if it becomes necessary, recovery won’t take too long. And those who’ve never tried to execute recovery from a backup should really not rest easy; their backups are unlikely to help when the heat is on. Here’s another problem with relying on a backup: If the backup server lives inside the network perimeter, then ransomware will encrypt it along with all other computers in the network, which means a farewell to recovery plans. Your bottom line: Maximize your likelihood of a quick rollback by segmenting the network, making backups wisely, and performing test recoveries. Recovery means downtime — and downtime is expensive For large companies with diverse devices and infrastructure, a quick recovery is unlikely. Even if the backup functions perfectly, and you sweat blood to restore everything, it will still take quite a while. During those weeks (yes, we’re probably talking about weeks, not days), the company will be idle. Some will guesstimate the cost of such downtime as less than that of paying the ransomers (we strongly advise against that). In any case, downtime after a ransomware attack is unavoidable; it’s impossible to decrypt and get all systems and services running again straight away, even if the cybercriminals are kind enough to provide you with a decryptor. n the real world, cybercriminals aren’t kind, and even if they are, the decryptor doesn’t necessarily work as intended.” Is that OK Your bottom line: To avoid ransomware-related downtime, don’t get infected by ransomware. (But how? The answer is protection and employee awareness!) Modern ransomware is worse than just encryptors Ransomware gangs used to target mainly end users, demanding about $300 in cryptocurrency for decryption. However, they have now discovered the joy of attacking companies, which can pay — and are more likely to pay — much larger ransoms. And some of those cybercriminals have no scruples about going after organizations on the medical front line: This year has seen many hospitals attacked, and recently a company in the coronavirus vaccine supply chain was hit. Modern ransomware does more than encrypt — it lurks in networks and siphons off every bit of data it can sniff out. The data is then analyzed and used to blackmail companies with encryption, leaks, or both. Failure to pay, the ransom message might say, will result in the publication of clients’ personal data or the company’s trade secrets. Even if not fatal, that would stain the company’s reputation, perhaps permanently. As well, such a leak will result in some very unpleasant conversations with GDPR compliance regulators and the like. If an intruder decides to leak corporate secrets or users’ personal data, having backups won’t help you. Furthermore, if you store backups in a place, such as a cloud, that’s relatively easily reached by an insider, they too could provide attackers with the information they need to blackmail you. Your bottom line: Backups are necessary, but they alone are not enough to protect your business from ransomware. Three pillars of security against ransomware Once again, because there is no silver bullet against ransomware, our advice remains the same: Backing up is absolutely necessary but must be done correctly, with diligence and recovery rehearsals. Part of that diligence is knowing the details of your backups: how often your company backs up its data and where the backups are stored. All relevant employees must also know exactly how to restart operations quickly. Protection is also a must — not just reactive but proactive protection that keeps threats from gaining a foothold in the network. Training employees in the basics of cybersecurity, and regularly checking their knowledge, is no less vital. In short, your security comes down to the same three words: backup, protection, awareness. All three need to be in place, and when they are, you can confidently say you’re employing optimal antiransomware security strategy.

 Expert Blogs and Opinion

Cyberattacks are becoming easier to conduct while conversely security is getting increasingly difficult, according to Kevin Curran, senior IEEE member and professor of cybersecurity, Ulster University.

 Malware and Vulnerabilities

An adversary could send the victim various requests to trigger two vulnerabilities that could later allow them to shut down access to the device and disclose sensitive information.

 Identity Theft, Fraud, Scams

A new scam using an IRS form as its mechanism has been found targeting users of Google's G Suite, with as many as 50,000 executives and "important" employees affected so far.

 Trends, Reports, Analysis

POS malware planted on payment processing devices has enabled threat actors to steal payment card data from terminals at retail stores, hotels, restaurants and other establishments since at least 2008

 Trends, Reports, Analysis

Business email compromise attacks have surged over the past year-and-a-half, while scams designed to part users with their money remain a persistent phishing threat, according to Barracuda Networks.

 Malware and Vulnerabilities

As far as its genetic makeup goes, so to speak, Phobos ransomware is a heavily similar strain to the infamous Dharma variant. Experts regard the former as a highly similar version of the latter.

 Feed

This Metasploit module exploits a stack-based buffer overflow in the Solaris PAM library's username parsing code, as used by the SunSSH daemon when the keyboard-interactive authentication method is specified. Tested against SunSSH 1.1.5 on Solaris 10u11 1/13 (x86) in VirtualBox, VMware Fusion, and VMware Player. Bare metal untested. Your addresses may vary.

 Feed

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides   show more ...

automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

 Feed

Ubuntu Security Notice 4672-1 - Rene Freingruber discovered that unzip incorrectly handled certain specially crafted password protected ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial   show more ...

of service. Antonio Carista discovered that unzip incorrectly handled certain specially crafted ZIP archives. If a user or automated system using unzip were tricked into opening a specially crafted zip file, an attacker could exploit this to cause a crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-5623-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include a null pointer vulnerability.

 Feed

Red Hat Security Advisory 2020-5625-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.0 serves as a replacement for Red Hat   show more ...

Single Sign-On 7.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

 Feed

Red Hat Security Advisory 2020-5624-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.6.0. Issues addressed include buffer overflow and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2020-5622-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.6.0. Issues addressed include buffer overflow and use-after-free vulnerabilities.

 Feed

Victor CMS version 1.0 suffers from multiple authenticated remote SQL injection vulnerabilities. SQL injection was originally discovered in this version in May of 2020 by BKpatron.

 Feed

Red Hat Security Advisory 2020-5618-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.6.0. Issues addressed include buffer overflow and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2020-5611-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only   show more ...

the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include a buffer overflow vulnerability.

 Feed

Red Hat Security Advisory 2020-5607-01 - The fapolicyd software framework introduces a form of file access control based on a user-defined policy. The application file access control feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix:   show more ...

When an update replaces the binary of a running application, the kernel modifies the application binary path in memory by appending the " " suffix. Previously, the fapolicyd file access policy daemon treated such applications as untrusted, and prevented them from opening and executing any other files. As a consequence, the system was sometimes unable to boot after applying updates.

 Feed

One of the many features of an Active Directory Password Policy is the maximum password age. Traditional Active Directory environments have long using password aging as a means to bolster password security. Native password aging in the default Active Directory Password Policy is relatively limited in configuration settings. Let's take a look at a few best practices that have changed in regards

 Feed

Cybersecurity researchers today disclosed a new supply-chain attack targeting the Vietnam Government Certification Authority (VGCA) that compromised the agency's digital signature toolkit to install a backdoor on victim systems. Uncovered by Slovak internet security company ESET early this month, the "SignSight" attack involved modifying software installers hosted on the CA's website ("ca.gov.vn

2020-12
Aggregator history
Thursday, December 17
TUE
WED
THU
FRI
SAT
SUN
MON
DecemberJanuaryFebruary