Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

In episode 192 of the Kaspersky Transatlantic Cable podcast, Jeff and I discuss a new ransomware attack with a surprising doxing angle. From there we move to a story on Threatpost about Google’s decision to begin removing third-party tracking cookies from its browser and turning to a controversial technology   show more ...

called Federated Learning of Cohorts (FLoC). After that, we talk about deepfakes and their potential for business opportunities, as well as the many concerns people still have about them. To wrap up, we briefly touch on a breaking-news story about the European Banking Authority being hit by a Microsoft Exchange attack. If you liked what you heard, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below: Ransomware gang fully doxes bank employees in extortion attempt Ransom: To pay nothing or not to pay? That is the question Critics blast Google’s aim to replace browser cookie with ‘FLoC’ ‘Deepfake is the future of content creation’ Zero-day vulnerabilities in Microsoft Exchange Server

image for 10 useful things the ...

 Tips

A year ago, on March 11, the World Health Organization officially declared a pandemic. Each of us has spent the past year differently, extracting our own unique experiences. But some things common to all can be generalized. We shan’t dwell on the bad. Instead, let’s focus on the good. What useful lessons   show more ...

have we learned over the past 365 days? 1. Washing hands, and not only before eating It took a mere 3,000 years for the masses to take the ideas of Hippocrates and Avicenna to heart. Now that’s what I call progress. These days, we have learned not only to wash our hands but that phones are also cleanable. Isopropyl alcohol is the best way to get the germs off our smart devices. Leaving aside for one moment the microbiological aspect, humankind has realized that Instagram pics look far better on a clean screen than on a dirty one. Also, the removal of ancient layers of sediment from the speaker and microphone greatly improves sound quality (note: Blu Tack is all you need). 2. Wearing masks Some countries developed this practice a little earlier than others, but global public adoption of masks really happened in 2020. Few would argue that being considerate of others in the event of a sneezing fit is both easy and the right thing to do. But pre-2020, to appear in a mask in public in Europe or the Americas was to declare yourself a weirdo — the equivalent of, say, walking down the street in your birthday suit. Today, the opposite is true: Most people now feel uncomfortable if they are not masked up. 3. Working in your PJs (or not) Working from home has made us more relaxed about some things. Some folks may still strut around the house in patent-leather shoes — hey, whatever floats their boat — but for most people, an end to the office dress code was overdue. What used to be considered a nightgown is now smart casual. Fashion scales have tipped heavily in favor of the webcam-visible top half of one’s outfit over the bottom. Brands have started printing their logos right under the throat, and we’re just waiting for the return of dickeys. However, we digress. The main point is that we have become less stressed about at least one aspect of our appearance. 4. Being your own IT When tech support is far away, you quickly learn useful IT admin skills for you and your household. Wi-Fi doesn’t reach the kitchen? No problem. Webcams out of stock? Try a car phone holder plus an old phone. Browser buried under push notifications? Disable ’em and revel in your newfound digital peace. At this rate, tech support may soon be out of a job. https://media.kasperskydaily.com/wp-content/uploads/sites/92/2021/03/10023551/Workplace_at_home_02_1080_EN.mp4 5. Muting your microphone in Zoom Actually, no, this one’s wishful thinking. Not everyone has mastered this key skill — we still hear heavy breathing and worse during group calls. But most of us, when joining the next in a long line of video calls, reflexively turn off the microphone and camera. This is clear progress. Seriously, though, humanity has become far more adept at communicating and interacting remotely. What used to require a face-to-face meeting and a long search for an empty conference room (or even a transcontinental flight) is now far more doable, even on the spur of the moment. 6. Living with family/roommates That’s living, not simply seeing each other twice a day. Constant contact turned out to be harder than expected, and not everyone is skilled in this discipline. That said, lots of people have discovered new avenues of interaction with household members. https://media.kasperskydaily.com/wp-content/uploads/sites/92/2021/03/10023551/Workplace_at_home_04_1080_EN.mp4 7. Missing out on water-cooler talk Some are still reeling from this one, but perhaps it’s made our working hours more efficient? 8. Appreciating the comforts of home Personal problems in the “it can wait” category have assumed a new urgency. When your home is your world, putting things off only causes more suffering down the line. For example, one of our colleagues confessed that only a couple of months ago she decided to buy herself a work desk. Now she wishes she hadn’t waited so long! https://media.kasperskydaily.com/wp-content/uploads/sites/92/2021/03/10023551/Workplace_at_home_03_1080_EN.mp4 9. Keeping it simple You don’t have to fly halfway around the world to enjoy yourself. A neighborhood nature walk may not be quite as exciting as an exotic safari, but experiencing local life with fresh eyes ain’t too shabby. We can’t put a huge smile on this one; we do miss travel a lot and really look forward to getting away again, but in the meantime, we can all discover new sights in a familiar environment. 10. Adapting to changes Much of the past year has been scary and unpleasant, but at the right dose, even poison can be medicinal. The pandemic has knocked us out of our usual patterns and forced us to adapt. We can but hope that, as life normalizes, we hang onto our useful COVID adaptations for a long time to come.

image for Futility or Fruition ...

 contributed

The current approaches most organizations take towards security are not good enough, writes Albert Zhichun Li, the Chief Security Scientist at Stellar Cyber. Something has to change. The post Futility or Fruition?Rethinking Common Approaches To Cybersecurity appeared first on The Security Ledger. Related   show more ...

StoriesContainers Complicate Compliance (And What To Do About It)PKI Points the Way for Identity and Authentication in IoTWhat’s Good IAM? The Answer may depend on your Industry

 Breaches and Incidents

A ransomware attack paralyzed the systems at the Oloron-Sainte-Marie hospital in southwest France. The ransomware gang is demanding the payment of a ransom of $50,000 worth of Bitcoin.

 Trends, Reports, Analysis

Alert overload still plagues the cybersecurity industry, according to Critical Start. 47% of respondents reported personally investigating 10 to 20 alerts each day, a 12% increase from 2019.

 Malware and Vulnerabilities

Microsoft and FireEye uncover three more malware strains associated with the suspected Russian perpetrators who breached the SolarWinds software between August and September 2020.

 Trends, Reports, Analysis

Considering the duplication and behavioral differences between the two groups, Intezer researchers argue that QNAPCrypt may have been transferred to the SunCrypt operator and upgraded.

 Threat Actors

Multiple zero-day exploits (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) were used to launch attacks against on-premise versions of Microsoft Exchange Server.

 Trends, Reports, Analysis

Scammers have started targeting Wall Street investors to earn seven times more money than a normal BEC scam by using fake capital calls notices requesting payment for counterfeit investments.

 Feed

NuCom 11N Wireless Router version 5.07.90 suffers from a remote privilege escalation vulnerability. The non-privileged default user (user:user) can elevate his/her privileges by sending a HTTP GET request to the configuration backup endpoint and disclose the http super password (admin credentials) in Base64 encoded   show more ...

value. Once authenticated as admin, an attacker will be granted access to the additional and privileged pages.

 Feed

Red Hat Security Advisory 2021-0808-01 - The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Issues addressed include a use-after-free vulnerability.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

scanlogd is a system daemon which attempts to log all portscans of a host to the syslog, in a secure fashion.

 Feed

Red Hat Security Advisory 2021-0809-01 - The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2021-0713-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a denial of service vulnerability.

 Feed

Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks. The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and

 Feed

Password security has long been an issue for businesses and their cybersecurity standards. Account passwords are often the weakest link in the overall security posture for many organizations. Many companies have used Microsoft's default password policies for decades. While these can be customized, businesses often accept the default values for their organization. The Windows default password

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) on Wednesday issued a joint advisory warning of active exploitation of vulnerabilities in Microsoft Exchange on-premises products by nation-state actors and cybercriminals. "CISA and FBI assess that adversaries could exploit these vulnerabilities to compromise networks, steal

 Data loss

Is it the end of the road for John McAfee? Is PornHub more legitimate than Facebook? And do you know as much as you think you do about the Microsoft Exchange Server mega-hack? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.

2021-03
Aggregator history
Thursday, March 11
MON
TUE
WED
THU
FRI
SAT
SUN
MarchAprilMay