Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Customer Information ...

 Security

Following the data breach, Wegmans announces in a press release that two of its internal databases  were open to outside access due to an undetected configuration issue, according to Security Magazine.  The incident was first reported around April 19, 2021 by an outside security researcher. The leaked data includes   show more ...

the following types of customer information: phone numbers, names, addresses, shopper club numbers, birth dates, and email addresses along passwords to access accounts on their website. Luckily, Wegmans assures that all passwords were securely stored in a hashed and salted form and were not recorded in the databases. Moreover, critical data such as social security numbers, credit cards, or banking information, was not stolen as the company does not collect this type of ... (read more)

image for Data Stolen from Ohi ...

 Security

Medicaid's Ohio Department warned that an unknown individual accessed data in Maximus' care without authorization for two days in May. The organization apparently suffered a security incident that may have led to the theft of personal information, according to Info Security Magazine.  Counting about 30,000   show more ...

people worldwide, including about 10,000 at 11 call centers in nine U.S. states, Maximus had been contracted by the Health Department to manage Medicare data. Between May 17-19, someone tried and succeeded in accessing sensitive information. The company states "because the unauthorized activity was detected at a very early stage, Maximus believes our quick response limited potentially adverse impacts". Among t... (read more)

image for NVIDIA’s Jetson Ch ...

 Security

New vulnerabilities have been found in NVIDIA's Jetson SoC framework that affects millions of graphics cards. These vulnerabilities may allow hackers to perform denial-of-service attacks and data theft, according to Threat Post.   The chipmaker is patching 9 high-level vulnerabilities related to the manufacturing   show more ...

process of low-level encryption methods. Affected NVIDIA chipsets include those found in embedded machine learning systems, computing systems, and even standalone devices such as robots and drones. With the released the June security bulletin on Friday, NVIDIA wants to fix the bugs and NVIDIA has thanked bug hunter Frédéric Perriot of Apple Media Products RedTeam for reporting the vulnerabilities.  Some of the products affected by these new vulnerabilities are Jetson Nano devices (including Jetson Nano 2GB), Xavier NX/TX1, AGX Xavier, Jetson TX2 (including Je... (read more)

image for Ragnar Locker Publis ...

 Security

The hackers behind Ragnar Locker managed to steal more than 1.5TB from ADATA and published more than 700GB of it online. The data was uploaded in the form of 13 password-protected archives, says Security Affairs.  The cybercriminal gang says the 1.5TB stolen data contains sensitive information such as confidentiality   show more ...

agreements, financial documents, contracts, and other files. The chipmaker refused to pay the ransom demanded by hackers. Therefore, Ragnar Locker decided to make the data public. To prove possession, they of posted a few screenshots.  [ORIGIMG=2] This is the second batch of archives allegedly stolen from ADATA that were published online. Initially, Ragnar Locker posted the archive on the MEGA storage platform, but the company closed the organization's account and banned access to the group's shared files. Four small archives in 7... (read more)

image for How to turn off noti ...

 Tips

Getting pop-up notifications with important news or alerts may be convenient, but it can also be a nuisance when you’re trying to concentrate on your work or watch a movie. Over time, a lot of Windows 10 users develop an aversion to the bottom right corner of their computer screen, where something is always   show more ...

flying out. Fortunately, there’s an easy fix. Note: These instructions are for Windows 10 only. Microsoft has stopped updating previous versions of the operating system, making them vulnerable to viruses, Trojans, and other threats, so if you are still using Windows 7, 8.1, or an earlier version, we recommend upgrading to Windows 10 as soon as possible. Which notifications should you keep? How to turn off notifications in Windows 10 How to disable all notifications at once Configuring notifications for individual programs Pausing notifications with Focus Assist mode Peace and quiet Which notifications should you keep? Windows 10 users can disable almost all notifications, but we recommend leaving two categories active because they can affect the secure operation of your computer. Antivirus protection. You should know about any suspicious activity on your computer, even if you have to pause a TV show for it. System update. Operating system updates are important for security, fixing vulnerabilities that let attackers infect your computer with malware. Such updates sometimes arrive with little or no notice, particularly if malware is spreading actively through a newly discovered vulnerability. You need to install OS updates as soon as possible. How to turn off notifications in Windows 10 You can confidently silence and hide any other notifications you find inconvenient. In fact, you have several options: turn them off completely; disable those from the most annoying programs; or use Windows 10’s Focus Assist mode to pause them. How to disable all notifications at once This process spares notifications regarding system updates and messages from Windows Defender, which you can configure separately. It will disable messages from other apps, such as your e-mail client or games. Open the Start menu and choose Settings by clicking the gearwheel; Choose System and then Notifications & actions; Scroll down and turn off Get notifications from apps and other senders. You’ll find several other useful options here, such as: Hiding notifications from the lock screen (so random people can’t read your personal Facebook messages); Disabling Windows’ tips, tricks, and suggestions about setting up your device (which appear after you install updates or simply while the system is running). Configuring notifications for separate programs Suppose you don’t want to disable all notifications, just those that come from certain programs. In that case: Open the Start menu and choose Settings; Choose System, then Notifications & actions; Scroll down to Get notifications from these senders; Toggle the switches for the apps on the list — on for notifications, off for none — or select individual applications for more app-specific options: Toggle off the Play a sound when a notification arrives switch to disable the sound but keep the pop-up alert; Uncheck the boxes next to Show notification banners and Show notifications in action center to remove pop-up messages but keep the sound. If you explicitly allowed notifications such as those from websites — news alerts from media sites, promotions from online stores, and so on — you may find your browser spitting out new messages every minute. You’ll fix those notifications at the browser level; to learn how, see our instructions on managing browser notifications in Chrome, Firefox, Safari, Edge, and Opera. Focus Assist mode: Pausing notifications Windows 10 includes a mode called Focus Assist that lets you pause some or all notifications instead of disabling them altogether. Focus Assist options are located in the Settings menu, under System. To configure the notifications: Select Alarms only to hide all notifications except for alarms or countdown timers, or Select Priority only if you’re concerned about a set time period — such as during working hours — and want to receive notifications only from apps or contacts from your (customizable) priority list. Here’s how to configure your list of priority contacts and programs: Click Customize your priority list (right below Priority only); Select the types of notifications to allow — texts and incoming calls or reminders; Choose the contacts from whom notifications will appear in the Calling, Mail, or Skype apps; Customize the list of programs allowed to send you notifications when Focus Assist mode is active. For example, you might keep just your e-mail client or apps for remote working on this list. To remove unnecessary apps from the list, click on the app’s icon and then click Remove. You can also set up automatic rules for Focus Assist mode, for example to enable it automatically during a daily meeting and to hide nonurgent notifications when you’re duplicating your display, playing a game, or using any other app in full-screen mode. Using Focus Assist doesn’t mean you’ll never see notifications, only that they’ll remain hidden until you disable the mode. You can view those notifications anytime in the Action center, which opens with the button to the right of the system clock, at the bottom of the screen. Rather than having to comb through all notifications, you can get a quick summary by checking the Show me a summary of what I missed while focus assist was on box. That way, each time Focus Assist ends, the system will give you a brief report on what you missed. Peace and quiet Now, your computer won’t get in your way when you’re working, studying, or relaxing. We advise using caution when deciding on a notification strategy — you don’t want to miss a truly important notification, so leave them active at least for protection tools and system updates, which help ensure your computer’s continued operation. Windows 10 users aren’t the only ones who can tweak a few settings for more peaceful computing; Android, iPhone and iPad, and macOS users can also take advantage of detailed notification options. And to achieve even greater peace in our connected world, we recommend getting into your own Digital Comfort Zone.

 Threat Actors

Since its inception in August 2020, the DarkSide ransomware gang and its affiliates had launched a global crime spree affecting organizations in over 15 countries and different industry verticals. Recently, FireEye researchers revealed that UNC2465, one of the affiliates of the DarkSide ransomware group has shifted its focus to software supply attacks.

 Malware and Vulnerabilities

The Agent Tesla remote access trojan (RAT) is scurrying around the internet again, this time arriving via a phishing campaign that uses a COVID-19 vaccination schedule as a lure.

 Govt., Critical Infrastructure

The European Commission will present its plan on Wednesday to set up the "Joint Cyber Unit," which would allow national capitals hit by cyberattacks to ask for help from other countries and the EU.

 Companies to Watch

The endpoint security solution provider SentinelOne has filed a registration statement on Form S-1 with the U.S. SEC to offer 32,000,000 shares of its Class A common stock to the public.

 Laws, Policy, Regulations

A Senate bill, the International Cybercrime Prevention Act, would increase the criminal penalties for attackers who target U.S. critical infrastructure, such as power plants and hospitals.

 Trends, Reports, Analysis

When attackers gain access, they most often install cryptominer software or attempt to escape the container and compromise the host system, says Assaf Morag, lead data analyst at Aqua Security.

 Malware and Vulnerabilities

Experts uncovered an attack campaign that targets users of pirated software. The Vigilante malware blocks users' access to websites hosting pirated software. Users are requested to stay protected by avoiding the download of pirated software or clicking on links from unknown users.

 Malware and Vulnerabilities

DarkRadiation ransomware has started targeting Linux and Docker containers. It relies on messaging service Telegram for C2C communications. Experts suggest attackers are probably trying to use low-profile tools to stay hidden from security agencies.

 Breaches and Incidents

Nuclear energy and arms-related organizations are under attack from several other APT groups across the globe. A North Korean APT group recently breached the internal network of the Korea Atomic Energy Research Institute (KAERI), South Korea through a vulnerability in a VPN server last month.

 Threat Intel & Info Sharing

Cyberespionage campaigns spread across several years were linked to the Chinese military group PLA Unit 69010. Dubbed RedFoxtrot, the threat actor focused on gathering military intelligence from various countries. Learn how PLA-affiliated groups are operating and targeting victims.

 Malware and Vulnerabilities

Unlike the Windows version of the malware that targets any Windows endpoint, Darkside Linux version is mostly targeting ESXi servers and is believed to be deployed manually.

 Feed

Red Hat Security Advisory 2021-2523-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include integer overflow and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 4995-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, spoof the UI, bypass security   show more ...

restrictions, or execute arbitrary code. It was discovered that extensions could open popup windows with control of the window title in some circumstances. If a user were tricked into installing a specially crafted extension, an attacker could potentially exploit this to spoof a website and trick the user into providing credentials. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4996-2 - USN-4996-1 fixed several vulnerabilities in OpenEXR. This update provides the corresponding update for Ubuntu 16.04 ESM. It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker   show more ...

could cause a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-2522-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only   show more ...

the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include integer overflow and privilege escalation vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2519-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host   show more ...

virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include buffer overflow, integer overflow, and privilege escalation vulnerabilities.

 Feed

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

 Feed

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

 Feed

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

 Feed

Ubuntu Security Notice 4996-1 - It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 4994-2 - USN-4994-1 fixed several vulnerabilities in Apache. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Antonio Morales discovered that the Apache mod_auth_digest module incorrectly handled certain Digest nonces. A remote attacker could possibly use   show more ...

this issue to cause Apache to crash, resulting in a denial of service. Various other issues were also addressed.

 Feed

U.S. graphics chip specialist NVIDIA has released software updates to address a total of 26 vulnerabilities impacting its Jetson system-on-module (SOM) series that could be abused by adversaries to escalate privileges and even lead to denial-of-service and information disclosure. <!--adsense--> Tracked from CVE‑2021‑34372 through CVE‑2021‑34397, the flaws affect products Jetson TX1, TX2 series,

 Feed

Cybersecurity researchers have disclosed a new ransomware strain called "DarkRadiation" that's implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications. "The ransomware is written in Bash script   show more ...

and targets Red Hat/CentOS and Debian Linux distributions," researchers from Trend Micro said in

 Feed

Cybersecurity researchers have disclosed a critical unpatched vulnerability affecting Pling-based free and open-source software (FOSS) marketplaces for Linux platform that could be potentially abused to stage supply chain attacks and achieve remote code execution (RCE). "Linux marketplaces that are based on the Pling platform are vulnerable to a wormable [cross-site scripting] with potential for

 3rd Party Risk

Preventing breaches begins with understanding and protecting your attack surface. For most enterprises, their attack surface is huge. To help wrangle it, security professionals have struggled for years to use tools such as network mapper (nmap) or vulnerability scanners to discover and test the security of   show more ...

internet-exposed assets; these typically present a path of least […] The post How to Prevent Breaches by Protecting Your Attack Surface appeared first on Security Weekly.

2021-06
Aggregator history
Tuesday, June 22
TUE
WED
THU
FRI
SAT
SUN
MON
JuneJulyAugust