Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

This week on the Kaspersky Transatlantic Cable podcast, Jeff and I spoke with Claire Hatcher, our fraud prevention team’s head of business development. During the call, we discussed the wide-ranging issues surrounding fraud and how it affects its victims — a view often overlooked because of fraud’s   show more ...

common portrayal as a victimless crime. We also chat about how people can best defend themselves against fraud and scams, especially e-mail and phone scams, and also briefly look at an upcoming webinar Claire is hosting. To learn more about Kaspersky Fraud Prevention, head here.

image for Doing more with less ...

 Business

The events of the past year have forced many companies to change their approach to work and, by extension, information security. Seeking to learn about their pandemic-related challenges, we polled 5,266 IT decision-makers in 31 countries. Respondents talked about the threats they encountered, the costs of   show more ...

cyberincident recovery, and the current state of security within their organizations. To learn more about major trends of the past year, forecasts for the coming year, and recommendations from Kaspersky and invited experts, see our report, “Plugging the gaps: 2021 corporate IT security predictions.” IT departments have to get creative Although the number of cyberattacks continues to rise, security budgets for IT departments in general are shrinking. In 2020, spending by large companies (1,000 or more employees) on cybersecurity fell by an average of 26% against the year before; In the SMB segment (50–999 employees), IT budgets are also down by about 10%; Spending on IT departments and information security is likely to decrease further. In other words, IT teams will have to do more with less. Perimeter security is becoming irrelevant Company software has moved to home computers and personal smartphones, so companies can no longer rely on a secure corporate network segregated from a dangerous external environment. According to our experts, the best protection strategy for companies will involve inspecting cybersecurity and certifying employee workplaces. Training must be practical and coherent Working from home, employees cannot always rely on corporate security and prompt assistance from IT. Therefore, more than ever, they need up-to-date, applicable knowledge about cyberthreats and how to stay safe. Their training must be systematic and extensive — a handful of seminars will not suffice. Outsourcing helps cut HR costs Maintaining a full roster of highly specialized cybersecurity experts is expensive for every company type and size, from SMBs to the largest enterprises. Therefore, reliable MSSPs (managed security service providers) are more important than ever. At the same time, experts recommend additional training for in-house infosec staff (if any), so that they can manage outsourcing. Cloud services will take off According to IDG, spending on cloud services in 2021 will consume about 32% of IT budgets, so it is essential to oversee the platforms’ monitoring and security. Experts strongly encourage deploying tools for analyzing employee actions, including use of unauthorized third-party software and cloud services, as well as expanding the transparency of work done on personal mobile devices. Trends from 2020 will continue in 2021, with 75% of professionals worldwide saying they intend to reevaluate their relationship with the office after the pandemic ends. For details of the challenges ahead and advice for protecting your business in 2021, see the full report. For ease of use, it is divided into sections with forecasts and recommendations for CEOs, CIOs/CISOs, SOC team leads, and IT security managers.

 Expert Blogs and Opinion

CISOs of organizations that have been hit by the attackers who compromised SolarWinds Orion are now mulling over how to make sure that they’ve eradicated the attackers’ presence from their networks.

 Incident Response, Learnings

Researchers found that out of all the companies and organizations that installed a backdoored SolarWinds Orion update, the majority were never targeted by the threat actors using Sunburst.

 Feed

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

 Feed

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

 Feed

This Metasploit module takes advantages of Archive_Tar versions prior to 1.4.11 which fail to validate file stream wrappers contained within filenames to write an arbitrary file containing user controlled content to an arbitrary file on disk. Note that the file will be written to disk with the permissions of the user   show more ...

that PHP is running as, so it may not be possible to overwrite some files if the PHP user is not appropriately privileged.

 Feed

Backdoor.Win32.Wollf.16 malware creates and runs a service named contime.exe with SYSTEM integrity and listens on port 5240. The malware uses a weak hardcoded password of 12345678 which can easily be viewed in the binary using strings utility.

 Feed

Gentoo Linux Security Advisory 202101-18 - Multiple vulnerabilities have been found in Python, the worst of which could result in the arbitrary execution of code. Versions less than 2.7.18-r6:2.7 are affected.

 Feed

Gentoo Linux Security Advisory 202101-14 - Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Versions less than 78.6.1 are affected.

 Feed

Gentoo Linux Security Advisory 202101-13 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 88.0.4324.96 are affected.

 Feed

Red Hat Security Advisory 2021-0247-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include information leakage and memory leak vulnerabilities.

 Feed

Red Hat Security Advisory 2021-0246-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include information leakage and memory leak vulnerabilities.

 Feed

Red Hat Security Advisory 2021-0248-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include information leakage and memory leak vulnerabilities.

 Feed

Red Hat Security Advisory 2021-0250-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include information leakage and memory leak vulnerabilities.

 Feed

A newly discovered Android malware has been found to propagate itself through WhatsApp messages to other contacts in order to expand what appears to be an adware campaign. "This malware spreads via victim's WhatsApp by automatically replying to any received WhatsApp message notification with a link to [a] malicious Huawei Mobile app," ESET researcher Lukas Stefanko said. The link to the fake

 Feed

Over the years, penetration testing has had to change and adapt alongside the IT environments and technology that need to be assessed. Broad cybersecurity issues often influence the strategy and growth of pen-testing. In such a fast-paced field, organizations get real value from learning about others' penetration testing experiences, identifying trends, and the role they play in today's threat

 Feed

In 1982, when SMTP was first specified, it did not contain any mechanism for providing security at the transport level to secure communications between mail transfer agents. Later, in 1999, the STARTTLS command was added to SMTP that in turn supported the encryption of emails in between the servers, providing the ability to convert a non-secure connection into a secure one that is encrypted

 Data loss

Another day, and another report that a cryptocurrency exchange has been breached by malicious hackers. Indian cryptocurrency exchange BuyUCoin says that is investigating claims that sensitive data related to hundreds of thousands of its users has been published on the dark web, where it is available for free download. Read more in my article on the Hot for Security blog.

2021-01
Aggregator history
Monday, January 25
FRI
SAT
SUN
MON
TUE
WED
THU
JanuaryFebruaryMarch