Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for 5G - The Two-Edged S ...

 Security

5G has been looming on the horizon for years, yet its industry-revolutionizing potential is just out of reach for healthcare providers and customers. The restrictions will not be in effect for long and 5G will gain more availability in the near future, according to Matthew Doyle, the COO & Head of Investor Relations,   show more ...

Chicago Pacific Founders. The arrival of 5G can broaden the healthcare industry's potential in ways we could never have imagined a decade ago. The downside is that it can also surface new security threats to patients and providers. Thanks to its super-fast mobile speeds, 5G has the potential to have a hugely positive effect on the healthcare industry. Whereas 4G could send data to and from 100,000 devices per square kilometer, 5G's hyper-fast download speeds would enable data transmission for a million devices over the same distance.  Healthcare organizations can now r... (read more)

image for Why You Should Be Wa ...

 Security

SMS-based phishing attacks are nothing new. In used since the mid-90s, the techniques have been enhanced with the launch of smartphones. In their most recent incarnation, AKA Smishing, the attacks are being carried out on a scale never seen before.  Previously, Smishing attacks were mostly used in a manner like email   show more ...

phishing attacks, impersonating established personal or business contacts to obtain credentials and other victim information. However, with the increase in work-from-home opportunities and the usage of mobile devices for both work and personal purposes, threat actors are concentrating on producing more persuasive phishing messages.   According to Cyberint security company, one of the most prominent recent ads took advantage of the huge rise in online shopping by impersonating retailers and shipping firms under the umbrella of package delivery for ... (read more)

image for The Biggest Cyberatt ...

 Security

New Zealand's Waikato Hospital is facing a second week of interruption as it works to repair its computer infrastructure after a massive cyberattack. With computers and phone lines knocked out, the attacker remains unknown. According to Kevin Snee, chief executive of Waikato District Health Board (DHB) the   show more ...

hospital's cyberattack is "probably the biggest cyber-attack in New Zealand's history".  He also stated on Monday to RNZ’s Morning Report, that he expects about 20% of elective surgeries and outpatient clinic appointments to be canceled at Waikato hospital this week. Furthermore, the DHB’s IT systems will be fully operational next week.  “We’re a very complex system and this has proved more c... (read more)

image for Japan

 Security

A popular Japanese dating app dubbed Omiai has been hacked, exposing the personally identifiable information of nearly 2 million users, according to Bloomberg.  The app's developer, Net Marketing Co, alerted the public to numerous unauthorized intrusions into its servers in April this year. During the intrusions,   show more ...

the attackers stole usernames, photos, and data from ID cards, driver's licenses, and passports, all of which were required for KYC (know your customer) purposes during registration. The good news is that no payment or credit card information had been compromised.  Men do not have access to the service, which is free for women. Men must pay for one of the platform's subscription plans, roughly about $40 per month, to register and use it.  The attackers are not known by now  According to variou... (read more)

image for 4.5 Million Air Indi ...

 Security

Air India has reported that 4.5 million passengers' personal information was exposed in a third-party data breach. Although revealed about two months ago, the real scale of the breach has come out this week, according to Infosecurity Magazine.   The incident had an effect on SITA, an IT provider that claims to   show more ...

represent 90% of the aviation industry. Attackers gained access to servers that run passenger processing systems for airline clients.  Air India stated they were first aware of the attack on February 25. However, the company was unable to confirm the number of people affected until SITA informed it on March 25 and 5. The statement noted “The breach involved personal data registered between August 26 2011 and February 3 2021, with details that included name, date of birth, contact information, passp... (read more)

image for Britons Tracked With ...

 Security

Millions of Britons had their position tracked without their knowledge. According to a government report, the monitoring was done to see whether being vaccinated against COVID-19 made people more likely to spend time away from home.   According to the report, 10% of British mobile phone owners unwillingly   show more ...

participated in a study that used cell tower data to map approximate locations.  According to a study from the SPI-B committee of Government scientists, data from 1 out of every 10 people's phones was monitored in February without their owners' express knowledge.   Researchers at Oxford University used the statistics in studies for the Clinical Pandemic Influenza Community on Behaviours (SPI-B).  The later advises the Sage group of Government scientific advisors.  When the scientists compared the movements of the vaccinated p... (read more)

image for How scammers target  ...

 Threats

The pandemic has left tens of millions of people around the world effectively jobless, and scammers, never ones to miss an opening, have been targeting freelancers and job seekers more frequently. Today, we look at an unusually sophisticated scam aimed at artists and designers. Job hunting on ArtStation The story   show more ...

begins with ArtStation, a site where artists publish their portfolios in categories such as game art, anime, comics, media, and film production. It is normal for site users to receive personal e-mails from potential customers. Since last year, however, ArtStation freelancers have found themselves targeted by highly professional cybercriminals posing as employees of major game developers including 2K, Big Fish, Bluepoint, and Riot Games. The story of a scam One user, a US-based concept artist, received what looked like an invitation for an interview with 2K, publisher of such titles as BioShock, Mafia, Sid Meier’s Civilization, NBA 2K, and Borderlands. The position came with a good salary and the option to work remotely. The e-mail was well crafted and included many details that are usually indicative of an HR professional. Fake e-mail about a work-from-home job The contractor carefully studied the message, which looked nothing like ordinary spam. Even the sender’s domain appeared legitimate: @2kgamesjobs.com. In between the terms of employment and links to LinkedIn profiles, the alleged employer stated that the interview would be held on Telegram and included a link to download and install the app. The artist downloaded the messaging app and contacted the alleged recruiter. At this point most scammers would pivot straight to extortion, but these ones remained in character for quite a while longer. They conducted a long and in-depth interview with the artist, but not over a video or even voice call, which is what we’d expect from a legitimate company, but rather in text using Telegram’s secret chat mode. Still, not for one second did the artist get the sense it was all a sham. The fake recruiter’s questions required professional knowledge of perspective, color theory, and shading. The test seemed real, and the artist was relieved to pass it. Now all that stood between the artist and the perfect job was a couple of formal procedures: some software and hardware requirements including a MacBook Pro with certain specs, a graphic-design package, a screen-calibration tool, and a time-tracking system — nothing implausible, but the equipment had to be purchased from a particular vendor. In return, the artist could expect an advance payment check. However, the mandatory purchase of equipment was enough to make the artist suspect that something was amiss. The artist found a warning on 2K’s website about “bad actors posing as company HR personnel” and stopped communicating with the scammers. That was the end of the story for this artist, but not all targets were as vigilant. Denouement If the artist had continued to communicate with the fraudsters after the phony interview, they would indeed receive a check, which would appear to come from 2K’s finance department and be delivered by a real FedEx courier, which again shows how much effort the scammers put into the operation. The check looks real, but it’s fake However, the check does not stand up to scrutiny. It looks real; the lettering on the stub even suggests the presence of a watermark on the back. But it’s just a piece of paper printed on an ordinary color printer. The scammers try to time its arrival for late on a Friday afternoon so the recipient won’t have time to go to the bank and verify its authenticity. The timing may be linked to something more, however. Checks go through a process called clearing, which can take several days. Most banks do not work on weekends, so the scammers figure the new “employee” will simply pay for the equipment out of their own pocket that very weekend, assuming the check will clear. If the victim confirms their willingness to do so, the attackers reveal the identity of their authorized supplier, which turns out to be an individual with a Venmo or Zelle account, two US money transfer services. The bogus recruitment scheme is designed to get the jobseeker to send to this unknown party a sum equal to the cost of a MacBook and other “required software and equipment” — more than US$3,500 in total. How to protect yourself The scheme is big enough for the implicated companies to draw attention to it. ArtStation, for its part, posted an in-depth article about the scam. Some game developers and publishers have also posted warnings on their websites for potential candidates. Some studios warn artists to be careful Here are some tips to help you avoid falling victim to this kind of scam: Limit job searches to official sources. ArtStation’s job board, for example, shows only vetted listings. Be wary of offers to discuss a job or hold an interview in secret chats, in which messages are encrypted and cannot be forwarded, and which alert participants if anyone takes a screenshot. Check contact information on companies’ official websites, which usually provide addresses and communication channels for HR personnel. If necessary, e-mail a general inquiry to the company asking if the person who contacted you actually works there. Use a reliable security solution with fraud and phishing protection.

 Malware and Vulnerabilities

Experts identified a cybercriminal group called XingLocker that uses a customized MountLocker ransomware version. The latter was spotted using enterprise Windows Active Directory APIs to worm through networks.

 Trends, Reports, Analysis

As per the NTT 2021 Global Threat Intelligence Report web application and application-specific attacks accounted for 67% of attacks in 2020. The data has been collected from January 1, 2020, to December 30, 2020.

 Feed

Red Hat Security Advisory 2021-2093-01 - Red Hat OpenShift Serverless 1.14.1 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and   show more ...

enhancements. For more information, see the documentation listed in the References section. Issues addressed include a code execution vulnerability.

 Feed

Red Hat Security Advisory 2021-1563-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

 Feed

Red Hat Security Advisory 2021-1561-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2021-1562-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

 Feed

Red Hat Security Advisory 2021-2095-01 - Red Hat OpenShift Serverless Client kn 1.14.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.14.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include a code execution vulnerability.

 Feed

Cybersecurity researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be abused by an adversary to hijack the infrastructure without any operator intervention. "In a telco setting, where a telco is monitoring thousands of sites, if a customer site is fully compromised, an attacker can use the vulnerabilities to compromise the telco, and then

 Feed

As businesses move to a remote workforce, hackers have increased their activity to capitalize on new security holes. Cybercriminals often use unsophisticated methods that continue to be extremely successful. These include phishing emails to harvest credentials and gain easy access to business-critical environments. Hackers are also using ransomware to hold your data hostage, demanding a ransom

 Feed

State-sponsored hackers affiliated with North Korea have been behind a slew of attacks on cryptocurrency exchanges over the past three years, new evidence has revealed. Attributing the attack with "medium-high" likelihood to the Lazarus Group (aka APT38 or Hidden Cobra), researchers from Israeli cybersecurity firm ClearSky said the campaign, dubbed "CryptoCore," targeted crypto exchanges in

2021-05
SAT
SUN
MON
TUE
WED
THU
FRI
MayJuneJuly