Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Siemens PLCs New Sec ...

 Security

On Friday, Siemens released firmed updates to fix a serious vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs). Both could be exploited by a malicious actor to remotely gain access to protected memory areas and achieve unrestricted and undetected code execution, that researchers call   show more ...

the holy grail.  Claroty identified the memory protection bypass vulnerability, listed as CVE-2020-15782 (CVSS score: 8.1), by reverse-engineering the MC7 / MC7+ bytecode language used to execute PLC instructions in the microprocessor. There is no evidence that the flaw has been exploited in the wild.  Siemens stated in an alert that an unauthenticated, remote attacker with network access to TCP port 102 could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks. 

image for New Zeeland

 Security

The Reserve Bank of New Zealand has announced the findings of two independent investigations into an illegal data breach and the handling of sensitive information.  Reserve Bank Governor Adrian Orr states “The Bank accepts the findings and has, and will continue to, implement the recommendations”. “As signalled   show more ...

in our Statements of Intent, we are well advanced on multiyear investment initiatives related to our digital systems and data management. We have prioritised these initiatives consistent with the recommendations outlined in the reports".  The Reserve Bank was the victim of a cyber-attack on... (read more)

image for More Businesses Adop ...

 Security

As a new survey by Vanson Bourne shows, 32% of companies have seen an increase in device encryption in the past year, according to Helpnet Security.   In addition to that, 31% of companies said they now expect all data to be encrypted by default, whether at rest or in transit, and 24% require all data to be encrypted   show more ...

when stored on their systems or in the cloud.  Furthermore, 27% of IT decision-makers surveyed said their company has increased the use of encryption in several ways, up from zero in the 2020 study. The increase is due to companies being forced to operate in new work environments with increased remote working, requiring the implementation of new systems and controls.  According to Jon Fielding, Managing Director EMEA, Apricorn commented: “The pandemic upended business operations, with vast numbers thrown into remote working. Data traffic is no longer s... (read more)

image for JBS Foods Shuts Down ...

 Security

A cyberattack has brought Australia's largest meat and food processing industry to a standstill, raising fears about supplies to domestic and international markets.   According to The Sydney Morning Herald, the attack affected JBS Foods facilities in Australia as well as in the United States, Canada, and other   show more ...

nations. JBS-owned Primo Foods is Australia's largest producer of ham, bacon, salami, and sausages, and operates meat plants and beef fattening facilities.  Cattle and lamb production was halted Monday at all JBS meat plants in Australia after an attack on the company's information systems over the weekend. Farmers and grocers are uncertain how long JBS will be down, and thousands of meat workers are worried about losing their jobs.   The CEO of JBS Australia Brent Eastwood confirmed the cyberattack on the indus... (read more)

image for Danish Secret Servic ...

 Security

A European media investigation published on Sunday has revealed that Denmark's intelligence agency helped the US National Security Agency (NSA) spy on top European politicians, including German Chancellor Angela Merkel and President Frank-Walter Steinmeier, according to Deutsche Welle.  The revelation that the US   show more ...

spied on its allies first surfaced in 2013, but only now have journalists gained access to reports revealing Danish Defense Intelligence Service support for the NSA (FE).   Germany's close ally and neighbor collaborated with U.S. wiretapping activities against the chancellor and president, as the report notes.   According to the new research, Peer Steinbrueck, the then candidate for chancellor of the center-left party (SPD), was also a target.  The information was passed by intelligence sources to a team consisting of Danish... (read more)

image for Amazon Devices Will  ...

 Security

If you use Alexa, Echo, or any other Amazon device, you have just 10 days to opt out of an experiment that puts your personal privacy and security at risk.   On June 8, the retail, web hosting, and entertainment giant will automatically enroll the gadgets in Amazon Sidewalk. The new wireless mesh service will share a   show more ...

small portion of your Internet bandwidth with nearby neighbors who do not have a connection. Amazon products like Alexa, Echo, Ring, security cameras, outdoor lights, motion sensors, and Tile trackers are automatically added to the system. And since only a small percentage of people bother to change the default settings, millions are being added to the program whether they realize it or not. According to the Amazon page linked above, Sidewalk is currently only available in the United Stat... (read more)

 Threat Actors

Experts stumbled across a new threat actor that utilizes data-wiping malware to disrupt its victims’ IT infrastructure and demand a ransom posing as ransomware actors. In addition, it is focusing its attacks on a variety of organizations based in the Middle East.

 Malware and Vulnerabilities

The attackers use what appears to be a Google Tag Manager script, a popular service used on many websites, to hide their malicious content, while using base64 encoding for obfuscation.

 Innovation and Research

Scientists working at the University of Maryland developed a new adversarial attack that can force machine learning systems to slow down and cause critical failures. Although this technique is not yet harmful, more such devastating slowdown attacks can be discovered in the future.

 Malware and Vulnerabilities

Experts from Qihoo 360 NETLAB published details about a new backdoor, dubbed Facefish, which can be used by threat actors to steal login credentials and executing arbitrary commands on Linux systems.

 Malware and Vulnerabilities

Scammers have noted how subscriptions to online streaming services during the COVID-19 pandemic have skyrocketed. Proofpoint researchers expose a malspam campaign using a fake movie streaming service called BravoMovies.

 Govt., Critical Infrastructure

Officials described the cyberattack as “basic phishing” in which hackers used malware-laden emails to target the systems of U.S. and foreign government agencies, think tanks, and humanitarian groups.

 Malware and Vulnerabilities

A security researcher has discovered a bug in PatchGuard––a crucial Windows security feature––that can allow threat actors to load unsigned (malicious) code into the Windows operating system kernel.

 Feed

Ubuntu Security Notice 4968-2 - USN-4968-1 fixed a vulnerability in LZ4. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that LZ4 incorrectly handled certain memory operations. If a user or automated system were tricked into uncompressing a specially- crafted   show more ...

LZ4 file, a remote attacker could use this issue to cause LZ4 to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-2147-01 - GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Issues addressed include an integer overflow vulnerability.

 Feed

IPS Community Suite versions 4.5.4.2 and below suffer from a PHP code injection vulnerability. The vulnerability exists because the IPScmsmodulesfrontpages_builder::previewBlock() method allows to pass arbitrary content to the IPS_Theme::runProcessFunction() method, which will be used in a call to the eval() PHP   show more ...

function. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires an account with permission to manage the sidebar (such as a Moderator or Administrator) and the "cms" application to be enabled.

 Feed

The document in this archive illustrates using the included proof of concept exploit to achieve root on Ubuntu systems using a flaw in the OverlayFS file system. The exploit itself does not have author attribution as the proof of concept came through SSD Disclosures.

 Feed

Red Hat Security Advisory 2021-2144-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere.

 Feed

Siemens on Friday shipped firmed updates to address a severe vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs) that could be exploited by a malicious actor to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution, in what the researchers describe as an attacker's "holy grail." The memory protection bypass

 Feed

Starting June 8, Amazon will automatically enable a feature on your Alexa, Echo, or other Amazon device that will share some of your Internet bandwidth with your neighbors—unless you choose to opt out. Amazon intends to register its family of hardware devices that are operational in the U.S.—including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring

 Feed

Are you aware of how secure your domain is? In most organizations, there is an assumption that their domains are secure and within a few months, but the truth soon dawns on them that it isn't. Spotting someone spoofing your domain name is one way to determine if your security is unsatisfactory - this means that someone is impersonating you (or confusing some of your recipients) and releasing

2021-05
SAT
SUN
MON
TUE
WED
THU
FRI
MayJuneJuly