Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for NATO Warns That Cybe ...

 Security

NATO may operate in a similar approach to a traditional military assault in response to cyberattacks on member countries, says CPO Magazine.   According to NATO Secretary General Jens Stoltenberg, a cyberattack on a member may lead to an international military response.  The alliance previously said that it saw the   show more ...

cyber domain as a legitimate combat environment and they may use Article 5 to protect allies. Stoltenberg stated that NATO makes no distinction between cyberattacks and other types of assaults. He warned that cyber warfare is seen in the article as an act of aggression against the whole alliance, and collective military response is demanded.  “In a way,... (read more)

image for More than 700M Linke ...

 Security

Cybercriminals are selling the data of 700 million LinkedIn users on a hacking forum. A very similar selling occurred in April, when the data of around 500 million LinkedIn members was marketed on a hacking platform, according to Threat Post.  Security experts analyzed data extracted from free samples provided by   show more ...

hackers and discovered email addresses, gender, full names, industry information, and even phone numbers. They believe the data was obtained via scraping public LinkedIn profiles since this was the technique employed in the April sale.  The hacker community where the advertisement was posted is called RaidForums, and the cybercriminal who posted it goes by the name of "GOD User TomLiner." According to experts at Privacy Sharks, the proof is provided by a sample of one million records.  According to Privacy Shark's blog

image for Information security ...

 Business

An information security guide can help minimize related errors, but writing one from scratch is quite challenging. To that end, we offer a general plan, a basic guide to which you can add points specific to your company and its rules and regulations. In our opinion, this is a standard; it includes the necessities and   show more ...

needs only personalization. Once you’ve tweaked it as needed, don’t just file it away: Show it to all new employees and bring it to the attention of established staff as well. Access to corporate systems and services Use strong passwords for all accounts — at least 12 characters long, containing no words in the dictionary, and including special characters and numerals. Attackers can brute-force simple passwords easily. Create a unique password for every account. If you reuse passwords, then a leak in one service could compromise the others. Keep passwords secret, without exception. Do not write them down, do not save them in a file, and do not share them with colleagues. A random office visitor or a dismissed colleague could use your password to harm the company, for an obvious danger, but the possibilities for damage are practically limitless. Enable two-factor authentication for every service that allows it. Using 2FA helps prevent an attacker from gaining access to the service even in the event of a password leak. Personal data Shred documents for disposal instead of simply throwing them away. Personally identifiable information in a trash can guarantees attention from regulators and hefty fines. Use secure channels to exchange files containing personal data (for example, share Google Doc documents with specific colleagues, not via “anyone with the link” option). Google, for example, indexes documents that anyone on the internet can vie0077, meaning they can appear in search results. Share clients’ personal data with colleagues on a strict need-to-know basis. Beyond causing trouble with regulators, sharing data increases the risk of data leakage. Common cyberthreats Check links in e-mails carefully before clicking, and remember that a convincing sender name is no guarantee of authenticity. Among cybercriminals’ many tricks for getting people to click on phishing links, they may tailor messages to your business specifically or even use a colleague’s hijacked account. For budget managers: Never transfer money to unknown accounts solely based on an e-mail or direct message. Instead, directly contact the person who supposedly authorized the transfer to confirm it. Leave unknown flash drives alone; don’t connect found media to a computer. Attacks through infected flash drives are not just the stuff of science fiction — cybercriminals can and have planted malicious devices in public and in offices. Before opening a file, check to make sure it is not executable (attackers often disguise malicious files as office documents). Do not open and run executable files from untrusted sources. Emergency contacts Whom to contact — name and phone number — in case of suspicious e-mail, weird computer behavior, a ransomware note, or any other questionable issues. That might be a security officer, a system administrator, even the business owner. Those are the very basics — the stuff everyone at every company needs to know. For greater awareness of modern cyberthreats, however, we recommend special training.

 Laws, Policy, Regulations

So far, four states have five pending pieces of legislation that would either ban paying a ransom or substantially restrict paying it. This includes New York, North Carolina, Pennsylvania, and Texas.

 Malware and Vulnerabilities

NVIDIA GeForce Experience, bundled with the chipmaker’s popular GTX GPU, contained a flaw that can enable a remote attacker to steal or manipulate data on a vulnerable Windows computer.

 Trends, Reports, Analysis

Ransomware operators are resorting to different extortion tactics to intensify the stress on victims for greater ransom payouts. There are four new extortion tactics observed by the Hong Kong CERT Coordination Centre. 

 Malware and Vulnerabilities

Lil’ Skim is a simple web skimmer that is fairly easy to identify and differs from other Magecart scripts. The threat actor impersonates internet companies and also the victim sites it goes after.

 Malware and Vulnerabilities

CrowdStrike recently observed a ransomware sample borrowing implementations from previous HelloKitty and FiveHands variants and using a Golang packer compiled with the most recent version of Golang.

 Breaches and Incidents

A variant of Ursnif Trojan is being used in the wild to target online banking users in Italy. As a part of the attack, the trojan tricks desktop users into downloading an app from a fake Google Play page to infect their mobile device with the Cerberus malware. Users are recommended to avoid clicking on URLs received via SMS or email messages.

 Trends, Reports, Analysis

As 5G networks roll out, security may become a key issue for enterprises. A new survey released at Mobile World Congress shows that major gaps persist in security capabilities among mobile operators.

 Malware and Vulnerabilities

Avast stumbled across the Crackonosh malware operation that helped cybercriminals yield at least $2 million in illegal Monero mining by compromising over 222,000 systems worldwide. Therefore, users are recommended to use genuine software to prevent any cyber-incidents.

 Breaches and Incidents

Networking equipment vendor Zyxel has emailed customers to alert them about a cyberattack targeting its high-end enterprise-focused firewall and VPN server products. Attacks against firewalls, VPN servers, and load balancers have become common. Such attacks are becoming prominent and being carried out by both cyberespionage and financially motivated groups.

 Threat Actors

Cobalt Strike is a legitimate penetration testing tool used by security professionals to emulate malicious activity in a network. However, threat actors are increasingly abusing the tool.

 Feed

Red Hat Security Advisory 2021-2599-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include bypass and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2563-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2021-2561-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This   show more ...

release of Red Hat JBoss Web Server 5.5.0 serves as a replacement for Red Hat JBoss Web Server 5.4.2, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a remote SQL injection vulnerability.

 Feed

Red Hat Security Advisory 2021-2562-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This   show more ...

release of Red Hat JBoss Web Server 5.5.0 serves as a replacement for Red Hat JBoss Web Server 5.4.2, and includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a remote SQL injection vulnerability.

 Feed

Red Hat Security Advisory 2021-2500-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include code execution and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2499-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.36. Issues addressed include a denial of service vulnerability.

 Feed

Online account creation poses a challenge for engineers and system architects: if you put up too many barriers, you risk turning away genuine users. Make it too easy, and you risk fraud or fake accounts. The Problem with Identity Verification The traditional model of online identity – username/email and password – has long outlived its usefulness. This is how multi-factor or two-factor

 Feed

Google on Monday announced new measures for the Play Store, including requiring developer accounts to turn on 2-Step Verification (2SV), provide an address, and verify their contact details later this year. The new identification and two-factor authentication requirements are a step towards strengthening account security and ensuring a safe and secure app marketplace, Google Play Trust and

 Feed

An unpatched security vulnerability affecting Google's Compute Engine platform could be abused by an attacker to take over virtual machines over the network. "This is done by impersonating the metadata server from the targeted virtual machine's point of view," security researcher Imre Rad said in an analysis published Friday. "By mounting this exploit, the attacker can grant access to themselves

2021-06
Aggregator history
Tuesday, June 29
TUE
WED
THU
FRI
SAT
SUN
MON
JuneJulyAugust