Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

This week on the Kaspersky Transatlantic Cable podcast, Dave and I focus on crime — meaning everything from dumb criminals to statistics and ransomware. The first story we look at travels from Italy to the Dominican Republic and back again. In this case, we have a mafia member who was on the run from Italian law   show more ...

enforcement and living in the Caribbean. The problem was that this fugitive loved cooking, so much so that he broadcast his cooking on YouTube. The problem was that despite hiding his face, he left his tattoos exposed. I guess they were memorable; they led to his arrest and extradition. From there, we check out a recent report from Canalys about the sheer volume of leaked and stolen data from data breaches circulating on the Web. The third story is one of ransomware leading to extortion after a criminal gang found a huge cache of pornography on an IT worker’s computer. To close things out, we discuss the latest school to fall victim to ransomware. If you liked what you heard, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below: Mafia fugitive caught after posting cooking show on YouTube Billions of records have been hacked already. Make cybersecurity a priority or risk disaster, warns analyst “We have your porn collection”: The rise of extortionware London’s biggest school trust hit by ransomware

 Trends, Reports, Analysis

Breaking a regular website usually costs below $10,000, while custom databases are priced between $100 and $20,000, or between $5 and $50 per 1,000 entries, a Positive Technologies report said.

 Trends, Reports, Analysis

New research by security firm Acronis has found that running multiple protection and cybersecurity solutions simultaneously did not prevent data loss in many organizations last year.

 Trends, Reports, Analysis

A report by the RUSI and BAE Systems warns that the 'perfect storm' of conditions have come together and allowed ransomware attacks to run rampant against organizations around the world.

 Expert Blogs and Opinion

Confidential corporate information is no less sensitive than the personal data of an individual, and there are massive financial and reputational risks from potential blackmail or disclosure of data.

 Malware and Vulnerabilities

These files are named jquery-migrate.js and jquery-migrate.min.js and present at the exact locations where JavaScript files are normally present on WordPress sites but are in fact malicious.

 Feed

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

 Feed

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and   show more ...

more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

 Feed

Red Hat Security Advisory 2021-1050-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include denial of service and memory leak vulnerabilities.

 Feed

Red Hat Security Advisory 2021-1051-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host   show more ...

virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service and memory leak vulnerabilities.

 Feed

Gentoo Linux Security Advisory 202103-3 - Multiple vulnerabilities have been found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 1.1.1k are affected.

 Feed

Gentoo Linux Security Advisory 202103-1 - Multiple vulnerabilities have been found in Salt, the worst of which could allow remote attacker to execute arbitrary commands. Versions less than 3000.8 are affected.

 Feed

Ubuntu Security Notice 4898-1 - Viktor Szakats discovered that curl did not strip off user credentials from referrer header fields. A remote attacker could possibly use this issue to obtain sensitive information. Mingtao Yang discovered that curl incorrectly handled session tickets when using an HTTPS proxy. A remote   show more ...

attacker in control of an HTTPS proxy could use this issue to bypass certificate checks and intercept communications. This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-0943-01 - This release of Red Hat build of Eclipse Vert.x 4.0.3 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include an information leakage vulnerability.

 Feed

Ubuntu Security Notice 4897-1 - Ben Caller discovered that Pygments incorrectly handled parsing certain files. If a user or automated system were tricked into parsing a specially crafted file, a remote attacker could cause Pygments to hang or consume resources, resulting in a denial of service.

 Feed

Ubuntu Security Notice 4896-1 - It was discovered that lxml incorrectly handled certain HTML attributes. A remote attacker could possibly use this issue to perform cross-site scripting attacks.

 Feed

Red Hat Security Advisory 2021-0956-01 - ed Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.23. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2021-1044-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management, and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This   show more ...

release of Red Hat Process Automation Manager 7.10.1 serves as an update to Red Hat Process Automation Manager 7.10.0, and includes bug fixes, which are documented in the Release Notes document linked to in the References.

 Feed

Red Hat Security Advisory 2021-1039-01 - MariaDB is a community developed branch of MySQL. MariaDB is a multi-user, multi-threaded SQL database server. Issues addressed include a code execution vulnerability.

 Feed

Cybersecurity researchers on Tuesday disclosed details of a sophisticated campaign that deploys malicious backdoors for the purpose of exfiltrating information from a number of industry sectors located in Japan. Dubbed "A41APT" by Kaspersky researchers, the findings delve into a new slew of attacks undertaken by APT10 (aka Stone Panda or Cicada) using previously undocumented malware to deliver

 Feed

You're fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution. But like most companies, you've already come across its shortcoming – and these are amplified since you have a small security team. More than likely, you noticed that it has its share of detection blind spots and limitations for

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web. And now, with its FREE   show more ...

Cyber Daily email all IT … Continue reading "Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily"

 Business + Partners

“I solemnly swear to back up my important documents and precious memories on March 31st.” Are you taking the pledge this World Backup Day? Now in its tenth year, World Backup Day remains one of our favorite reminders of the risks of not backing up the data we hold dear. According to the World Backup Day site,   show more ...

“This independent initiative to raise awareness about backups and data preservation started out — like most good things on the internet – on reddit by a couple of concerned users.” The day goes beyond reminding businesses and private citizens of what they stand to lose due to device theft, hardware failure and other common forms of data loss. It’s a reminder that more and more of our culture is digital, and some of our greatest achievements reside online. Without them, we risk losing a piece of the very greatness of our civilization. (It’s a lot easier to come to work every day in support of the Carbonite mission when you put it like that.) Here are some of the threats we’ve recently faced online: 121 million ransomware attacks in the first half of 2020 alone, up 20 percent over 20191Eighty-nine percent of businesses claim to have been targeted by COVID-19-related malware in 20202Phishing attacks claiming to be companies like Netflix, HBO and YouTube skyrocketed early in the pandemic3 Numbers are great, and necessary for showing the scope of the problem, but I wanted to see how data loss—and backups—affect real people. So I reached out to our community for stories about times when backup saved their backsides. Here’s what they had to say. “In the past six weeks we have had two clients hit with ransomware. We have been able to use our backups to bring up server live environments within 45 minutes and it has saved a lot of time and data.” —David H. “We managed IT for a remote office of a national law firm. The senior partner worked out of our office, and we had a contract to back up all client data firm-wide, as we felt there were numerous vulnerabilities in their system. One morning at 7 a.m., the server RAID array died, and not only were none of the drives recoverable but their tape backup also had not been working properly for at least six months. After the first few hours of them discovering all the things that did not work, I reminded the partner that we had been backing up their data and had a full, clean back up from six hours before the crash. Our extra backup saved the day!” —David Y. “Backups saved us from a ransomware attack. We were able to isolate the server with the infected machine and restore our files from a local backup. Total downtime was less than 30 hours.” —PJ “I have been saved from losing both personal and business data more than once!”—Vasilis “I was able to use a backup to restore all my client’s data after a ransomware attack. Needless to say, they were very happy!”—Nathan “We are extremely lucky in the fact that we haven’t had any cyberattacks. We did have an issue when our sever failed, and backup basically saved us.”—Simon “Having good off-site backups enabled recovery from a large fire which rendered on-site backups useless.”—Warren “We came in one day to find the office doors busted down and the computers raided. They left the cashbox alone, just stole RAM and hard drives. We were encrypting the hard drives, so we didn’t lose any data to the wild as the encryption couldn’t be cracked. But we were back up and running within two hours from backups alone.” —Sharif Hardware failure, natural disasters, ransomware, device theft, file corruption—it’s not surprising that all of the most common forms of data loss surfaced when we reached out to our users. Don’t fall victim to them! Back up your data this March 31 to keep from feeling like a fool come April. Sources:1 SonicWall Capture Labs2 VMware/Carbon Black Global Threat Report June 20203 Webroot RTAP The post This World Backup Day, Our Customers Do the Talking appeared first on Webroot Blog.

2021-03
Aggregator history
Wednesday, March 31
MON
TUE
WED
THU
FRI
SAT
SUN
MarchAprilMay