Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Gone in a Flash ...

 Business

Once ubiquitous, used for playing multimedia content, producing animated banners and browser games, and more, Adobe Flash became obsolete over time and was superseded by newer technologies. Many content creators continued to use the familiar platform, though, so both Adobe and browser makers kept up their support. But   show more ...

nothing lives forever, and product support finally ended on January 1, 2021. Browsers will no longer display any remaining Flash content. Why security specialists have long disliked Flash Flash content is essentially little programs downloaded to users’ computers and executed by Adobe’s Flash Player. Consequently, Flash Player, which was present on virtually every device with Internet access, quickly found itself in cybercriminals’ crosshairs. After all, executing code on a victim’s computer is essentially a cybercriminal’s dream. As a result, vulnerabilities of varying severity were found — and exploited — in Flash Player regularly. The vulnerabilities involved the use of scripts from third-party sites, interception of clipboard contents, execution of arbitrary code, and more. Over the course of its life, Flash Player demonstrated more than 1,000 vulnerabilities. Flash’s remarkable popularity proved dangerous as well. Any website could require a user to update Flash before viewing website content. In most cases, that prompt was appropriate — but one side effect was that it accustomed many users to seeing and obeying such prompts. Sometimes, they got an updated version of legitimate software, but in other cases, they were downloading a malware bundle. Despite Flash’s dwindling usage in recent years, some cybercriminals continued to exploit the hoax. In response, and more than a decade ago, many security experts began to recommend discontinuing the use of Flash technology. Corporate network administrators and users disabled Flash in browser settings. And until last December, Adobe continued to monitor the security of Flash Player and close newly detected vulnerabilities. What is changing in 2021? By declaring Flash dead, Adobe committed to stop fixing it. Any new vulnerabilities will remain open. What’s more, modern browsers will automatically block Flash content, displaying a placeholder in its stead. Particularly persistent users may be redirected either to the browser’s help page or to the relevant section of the Adobe website for more information. What should website owners do? If you are still deliberately using Flash content, you have to understand that no one is likely to see it anymore. Switch ongoing projects to a more modern option and think about updating old content. Even if you think you’re Flash-free, audit your websites to make sure you’ve purged any interactive components that use the technology — say, an embedded video from another website. Companies tend to support old pages and projects simply to minimize error messages, but where Flash is involved, it’s best to bite the bullet. Flash content error messages are not a very big deal, but they’re also not great; the potential consequences are nothing but negative. Some users might just get annoyed with your company, but others might try installing older versions of browsers or Flash Player, exposing themselves to a variety of problems. What should users do? Remove the Flash plugin from your browser if you have not done so already, and forget about that technology for good. From here on out, if you see a placeholder for Flash content that your browser cannot display, you probably do not want to be on that website: Either the creators have long since abandoned the project or they are negligent — or they’re out to harm users.

image for Sealed U.S. Court Re ...

 Data Breaches

The ongoing breach affecting thousands of organizations that relied on backdoored products by network software firm SolarWinds may have jeopardized the privacy of countless sealed court documents on file with the U.S. federal court system, according to a memo released Wednesday by the Administrative Office (AO) of the   show more ...

U.S. Courts. The judicial branch agency said it will be deploying more stringent controls for receiving and storing sensitive documents filed with the federal courts, following a discovery that its own systems were compromised as part of the SolarWinds supply chain attack. That intrusion involved malicious code being surreptitiously inserted into updates shipped by SolarWinds for some 18,000 users of its Orion network management software as far back as March 2020. “The AO is working with the Department of Homeland Security on a security audit relating to vulnerabilities in the Judiciary’s Case Management/Electronic Case Files system (CM/ECF) that greatly risk compromising highly sensitive non-public documents stored on CM/ECF, particularly sealed filings,” the agency said in a statement published Jan. 6. “An apparent compromise of the confidentiality of the CM/ECF system due to these discovered vulnerabilities currently is under investigation,” the statement continues. “Due to the nature of the attacks, the review of this matter and its impact is ongoing.” The AO declined to comment on specific questions about their breach disclosure. But a source close to the investigation told KrebsOnSecurity that the federal court document system was “hit hard,” by the SolarWinds attackers, which multiple U.S. intelligence and law enforcement agencies have attributed as “likely Russian in origin.” The source said the intruders behind the SolarWinds compromise seeded the AO’s network with a second stage “Teardrop” malware that went beyond the “Sunburst” malicious software update that was opportunistically pushed out to all 18,000 customers using the compromised Orion software. This suggests the attackers were targeting the agency for deeper access to its networks and communications. The AO’s court document system powers a publicly searchable database called PACER, and the vast majority of the files in PACER are not restricted and are available to anyone willing to pay for the records. But experts say many other documents stored in the AO’s system are sealed — either temporarily or indefinitely by the courts or parties to a legal matter — and may contain highly sensitive information, including intellectual property and trade secrets, or even the identities of confidential informants. Nicholas Weaver, a lecturer at the computer science department at University of California, Berkeley, said the court document system doesn’t hold documents that are classified for national security reasons. But he said the system is full of sensitive sealed filings — such as subpoenas for email records and so-called “trap and trace” requests that law enforcement officials use to determine with whom a suspect is communicating via phone, when and for how long. “This would be a treasure trove for the Russians knowing about a lot of ongoing criminal investigations,” Weaver said. “If the FBI has indicted someone but hasn’t arrested them yet, that’s all under seal. A lot of the investigative tools that get protected under seal are filed very early on in the process, often with gag orders that prevent [the subpoenaed party] from disclosing the request.” The acknowledgement from the AO comes hours after the U.S. Justice Department said it also was a victim of the SolarWinds intruders, who took control over the department’s Office 365 system and accessed email sent or received from about three percent of DOJ accounts (the department has more than 100,000 employees). The SolarWinds hack also reportedly jeopardized email systems used by top Treasury Department officials, and granted the attackers access to networks inside the Energy, Commerce and Homeland Security departments. The New York Times on Wednesday reported that investigators are examining whether a breach at another software provider — JetBrains — may have precipitated the attack on SolarWinds. The company, which was founded by three Russian engineers in the Czech Republic, makes a tool called TeamCity that helps developers test and manage software code. TeamCity is used by developers at 300,000 organizations, including SolarWinds and 79 of the Fortune 100 companies. “Officials are investigating whether the company, founded by three Russian engineers in the Czech Republic with research labs in Russia, was breached and used as a pathway for hackers to insert back doors into the software of an untold number of technology companies,” The Times said. “Security experts warn that the monthslong intrusion could be the biggest breach of United States networks in history.” Under the AO’s new procedures, highly sensitive court documents filed with federal courts will be accepted for filing in paper form or via a secure electronic device, such as a thumb drive, and stored in a secure stand-alone computer system. These sealed documents will not be uploaded to CM/ECF. “This new practice will not change current policies regarding public access to court records, since sealed records are confidential and currently are not available to the public,” the AO said. James Lewis, senior vice president at the Center for Strategic and International Studies, said it’s too soon to tell the true impact of the breach at the court system, but the fact that they were apparently targeted is a “a very big deal.” “We don’t know what the Russians took, but the fact that they had access to this system means they had access to a lot of great stuff, because federal cases tend to involve fairly high profile targets,” he said.

image for Episode 199 COVID’ ...

 Companies

In this episode of the podcast (#199), sponsored by LastPass, we talk with Sareth Ben of Securonix about how massive layoffs that have resulted from the COVID pandemic put organizations at far greater risk of data theft. In our second segment, we’re joined by Barry McMahon, a Senior Global Product Marketing Manager   show more ...

at LogMeIn, to talk about data...Read the whole entry... » Related StoriesEpisode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware!Episode 190: 20 Years, 300 CVEs. Also: COVID’s Lasting Security LessonsEpisode 198: Must Hear Interviews from 2020

 Identity Theft, Fraud, Scams

COVID-19 vaccines have been approved in some countries while many are conducting their trials. Cybercriminals are taking advantage of these much-awaited developments to steal credential and payment data from unsuspecting users.

 Trends, Reports, Analysis

A fleeceware app isn’t traditional Android malware in the sense that it doesn’t contain malicious code. Instead, the threat comes from excessive subscription fees that it might not clearly advertise.

 Malware and Vulnerabilities

Researchers uncovered a new ransomware family called Babuk that has successfully encrypted systems of at least five online gambling companies in the first half of 2020.

 Feed

Backdoor.Win32.NinjaSpy.c suffers from a remote stack buffer overflow vulnerability. The specimen drops a DLL named "cmd.dll" under C:WINDOWS which listens on both TCP ports 2003 and 2004. By sending consecutive HTTP PUT requests with large payloads of characters, we can cause buffer overflow.

 Feed

This Metasploit module exploits an arbitrary file upload in the WordPress wpDiscuz plugin version 7.0.4. This flaw gave unauthenticated attackers the ability to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable server.

 Feed

Ubuntu Security Notice 4687-1 - A use-after-free was discovered in Firefox when handling SCTP packets. An attacker could potentially exploit this to cause a denial of service, or execute arbitrary code.

 Feed

WordPress Autoptimize plugin suffers from a remote shell upload vulnerability. The ao_ccss_import AJAX call does not ensure that the file provided is a legitimate zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote code execution.

 Feed

A North Korean hacking group has been found deploying the RokRat Trojan in a new spear-phishing campaign targeting the South Korean government. Attributing the attack to APT37 (aka Starcruft, Ricochet Chollima, or Reaper), Malwarebytes said it identified a malicious document last December that, when opened, executes a macro in memory to install the aforementioned remote access tool (RAT). "The

 Feed

Hardware security keys—such as those from Google and Yubico—are considered the most secure means to protect accounts from phishing and takeover attacks. But a new research published on Thursday demonstrates how an adversary in possession of such a two-factor authentication (2FA) device can clone it by exploiting an electromagnetic side-channel in the chip embedded in it. The vulnerability (

2021-01
Aggregator history
Friday, January 08
FRI
SAT
SUN
MON
TUE
WED
THU
JanuaryFebruaryMarch