Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for New Trojan Found to  ...

 Security

A new STRRAT version has been found by a group of Microsoft cybersecurity specialists.  It is a Java-based malware that is disguised like ransomware to rob personal data stored on infected computers. This is yet another threat to be addressed, as the harm it causes is very significant.   As noted by ZDNet, the   show more ...

malicious software is distributed via an extensive campaign for phishing. The malware is sent to victims through compromised e-mail addresses, allegedly payment-related messages. In most cases, the messages are accompanied by a  PDF file or picture. The PC connects to a C2 server which downloads the malware while trying to open the file to see the information it supposedly contains. Thus, STRRAT starts working with a dual goal on the infected machine: stealing confidential information and turning the attention ... (read more)

image for macOS Malware Caught ...

 Security

Last month, security researchers revealed that a notorious malware family exploited a never seen before flaw. The vulnerability enabled macOS security defenses to be bypassed and run unimpeded. There are indicators that macOS might have targeted again in the future. Jamf claims it has found evidence for a   show more ...

vulnerability that allows XCSSET to have access to parts of macOS that need permission, access to the microphone, camera, or record the screen, without consent.  XCSSET was first found by Trend Micro in 2020 targeting Apple developers, particularly the Xcode projects used to code and create apps. By infecting app development projects, developers unconsciously spread malware to their users in a supply-chain-like attack defined by Trend Micro researchers. The malwar... (read more)

image for FBI Identifies 16 Co ...

 Security

The FBI has related the Conti ransomware community to at least 16 cyberattacks in the United States aimed at disrupting healthcare and first responder networks.   911 dispatchers, law enforcement officers, and emergency care services have all been targeted in the last year as medical services struggled to handle the   show more ...

COVID-19 pandemic.   According to the FBI's flash advisory (.PDF), Conti has been linked to at least 400 cyberattacks against organizations worldwide, with at least 290 originating in the United States.  In order to increase the likelihood of a payout, ransomware operators can penetrate a victim's network, steal sensitive files... (read more)

image for Bluetooth Devices Vu ...

 Security

The Bluetooth core and mesh profile specifications may be exploited by cybercriminals as legit devices and perform man-in-the-middle (Mit-) attacks.   According to the Carnegie Mellon CERT Coordination Center, "Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks   show more ...

and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing". The two Bluetooth specifications ensure the protocol for many-to-many Bluetooth communications and enable the sharing of data through ad-hoc networks between devices.  Bluetooth Impersonation AttackS, also called BIAS, allows a cybercriminal to create a safe connection with a victim and effectively bypass the authentication mechanism of Bluetooth.  According to the security researchers, the first problems associated with the safe establishment of

image for Why CAPTCHA is no lo ...

 Business

In a panel discussion at RSA Conference 2021 about Web attacks and online fraud, researchers discussed lessons drawn from studies of cybercriminal tactics and attacks on large organizations. One speaker, former law enforcement officer Dan Woods, talked about his experience training as a CAPTCHA farm worker. The work   show more ...

was copious and the pay meager (about $3 a day), but his main takeaway was that CAPTCHA is no longer fit for its purpose. Generally speaking, if an interface is created for a human, there is no need for a bot to access it. Programs communicate with each other through APIs, not user interfaces; a bot trying to access an online resource or service through a user interface is almost certainly part of an exploitation attempt. For many years, CAPTCHA, a mechanism for distinguishing human users from computers, has waged a lonely war against illegal bots. Many services, including online banking systems and loyalty programs, still use it. But can we still trust CAPTCHA? What is a click farm? Click farm refers to the human element of click fraud: lots of people clicking on ads that pay per click, or boosting a Web pages’ search rankings, or driving up likes, views, votes, and other metrics. Bots used to do the clicking, but the use of antifraud algorithms has led scammers to engage real people. Some click farms, like the one that hired Woods, specialize in CAPTCHA services, taking over for bots that encounter verification issues. The CAPTCHA farm worker’s job is to perform tasks that are very simple for a person but unreliably complex for a machine. They may select images with a fire hydrant, decipher a distorted sequence of letters, solve a very simple arithmetic equation, or do any number of other, similar chores. You may have seen a variation on the theme of this image circulating online: Internet meme about robots and CAPTCHAs Well, it’s not just a joke. Do you need CAPTCHA? Users have never been particularly fond of the CAPTCHA mechanism. There is always room for error: accidentally clicking the wrong image, missing a fire hydrant lurking in the background, missing a character in the jumble of letters and numbers. Even if nothing goes wrong, the CAPTCHA process is UX-negative — that is, it disturbs the flow and detracts from the user experience. Also, CAPTCHA farms are not CAPTCHA-focused scammers’ only tools. Some, for example, are still trying to create an AI capable of solving such riddles. As imperfect as it is, CAPTCHA mechanisms represent one more layer of protection and therefore using them seems sensible. But nothing is ever that simple. CAPTCHA alternatives CAPTCHAs no longer reliably protect against intruders, and they annoy real users. All in all, it’s probably time to abandon this outmoded mechanism. Fortunately, however, CAPTCHAs are not the only automated means to determine whether a human or a machine is trying to access the system. For a better option, look to Kaspersky Fraud Prevention‘s Advanced Authentication, which eliminates unnecessary authentication steps and creates a seamless user experience. Thanks to machine-learning technologies, Advanced Authentication uses extensive user behavior analysis, passive biometric indicators, data about the device from which someone is requesting authentication, their environment, and more to decide quickly and correctly whether to allow the user to log in, perform additional verification, or restrict access. At its heart, the technology accurately determines whether the service is being accessed by a person or a machine. More details about the solution are available here.

image for Episode 215-1: Jerem ...

 Business

Jeremy O’Sullivan, co-founder of the IoT analytics company, Kytch brings us the cautionary tale of his company’s travails with the commercial ice cream machine manufacturer, Taylor, whose equipment is used by the likes of Burger King and McDonalds. The post Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech   show more ...

Serving McDonald’s Ice Cream...Read the whole entry... » Related StoriesEpisode 214: Darkside Down: What The Colonial Attack Means For The Future of RansomwareEpisode 207: Sara Tatsis of Blackberry on finding and Keeping Women in CyberEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent Pipeline

 Malware and Vulnerabilities

Several versions of JSWorm were released as part of each “rebranded” variant that altered different aspects of the code, renamed file extensions, cryptographic schemes, and encryption keys.

 Geopolitical, Terrorism

In the past, Moscow has faced numerous allegations of cyberattacks that resulted in multiple sanctions and the expulsion of its diplomats. The term "hacker" has almost become synonymous with Russia.

 Malware and Vulnerabilities

Pulse Secure issued a workaround for a critical RCE vulnerability in its Pulse Connect Secure VPNs that may allow an unauthenticated, remote attacker to execute code as a user with root privileges.

 Malware and Vulnerabilities

Decade-old botnets continue to adapt to the current threat landscape, as seen in the case of wide-ranging malicious activities of the resilient Phorpiex botnet. Though, for many years, the Phopiex botnet has had the same internal infrastructure with C2 mechanisms and source code.

 Malware and Vulnerabilities

Microsoft is warning against a malware campaign by STRRAT, a RAT first spotted in June 2020. It camouflages as ransomware and supports various features such as logging keystrokes, collecting browser passwords, and running remote commands and PowerShell. Organizations should stay alert and offer training to their employees to spot phishing emails.

 Trends, Reports, Analysis

Does the CodeCov supply chain attack has echoes of SolarWinds? More victims surface with time in yet another months-long ripple effect of a supply chain attack. Users of Codecov are suggested to perform a thorough scan of their CI-CD pipelines and change their secret keys and passwords.

 Trends, Reports, Analysis

In the first quarter of 2021, the number of DDoS attacks dropped by 29% compared to the same period in 2020, but increased by 47% compared to the fourth quarter in 2020, says a Kaspersky report.

 Malware and Vulnerabilities

Insecure data storage is the most common security flaw in Android apps. Recently, security analysts listed down 23 Android applications leaking personal data of over 100 million users due to misconfigurations in third-party cloud services.

 Feed

The QImageReader class can read out-of-bounds when converting a specially-crafted TIFF file into a QImage, where the TIFF tile length is inconsistent with the tile size. This could potentially allow an attacker to determine values in memory based of the QImage pixels, if QT is used to process untrusted images.

 Feed

Red Hat Security Advisory 2021-2104-01.tt - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP request smuggling, HTTP response splitting, denial of service, and information leakage vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2099-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks. "Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during

 Feed

Apple on Monday rolled out security updates for iOS, macOS, tvOS, watchOS, and Safari web browser to fix multiple vulnerabilities, including an actively exploited zero-day flaw in macOS Big Sur and expand patches for two previously disclosed zero-day flaws.  Tracked as CVE-2021-30713, the zero-day concerns a permissions issue in Apple's Transparency, Consent, and Control (TCC) framework in macOS

 Feed

Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an authenticated remote attacker to execute arbitrary code with elevated privileges. "Buffer Overflow in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user,"

2021-05
SAT
SUN
MON
TUE
WED
THU
FRI
MayJuneJuly