Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Trump

 Security

Gettr, the new social media network was hacked not once, but twice. Apart from releasing customers' data online, hackers enjoyed themselves by flooding the platform with Sonic the Hedgehog-themed pornography and tampering with users' profiles, according to Threat Post.  Gettr can be described as another   show more ...

Twitter alternative that focuses on posts regarding the current topics. The organization describes itself as "a non-bias social network for people all over the world." When Gettr was first launched, cybersecurity professionals recognized that the APIs were poorly written and full of vulnerabilities. Ashkan Soltani, a security researcher, uncovered a flaw that allows a threat actor to launch a brute-force attack targeting the API by giving it a list of emails and receiving a response listing the ones muted or blacklisted.  One of the first blows against Trump's conserv... (read more)

image for Rebekah Koffler: Rus ...

 Security

It seems that Biden Administration's foreign policy contains unachievable objectives, according Rebekah Koffler, a former Defense Intelligence Agency officer cited by Fox News. Biden's naive approach involves pleading with Russia's leader, Vladimir Putin, to cooperate in combating Russian cybercrime. By   show more ...

insisting on an overly controlled situation and demanding that Russian hackers refrain from using cyberattacks on a regular basis, Joe Biden and his team of advisors are sending a weak message to a Russian president who is not interested in stability and sees cyberattacks as useful weapons.  Despite President Biden's silly attitude that led him to pass a list of “do not attack” vital infrastructure targets to Putin during a meeting in June, Russia was undeterred in continuing its cyber warfare campaign.   Putin believes that Russia's so-called low grade cyber ... (read more)

image for Law Firm Gets Court  ...

 Security

Following the hack of 4 New Square Chambers, the company won a court order preventing the hackers from publishing stolen data from a prior cyberattack, according to The Register.  The attack carried on June 12 is essentially a breach that stole private data from the company. As expected, the cybercriminals threatened   show more ...

to make public all information gathered. The plot twists is that judge Mrs. Justice Steyn issued a provisional injunction prohibiting the cybercriminals from using, publishing, or communicating to any party regarding the stolen data or sections of it.  Despite the fact that the injunction return deadline is this Friday, no data appears to have been disclosed on the dark web hacker forums yet. This type of response has never occurred before, and it will be very fascinating to watch if it sets a precedent. While highly unlikely, everyone is curious if h... (read more)

image for Why we use AI in Kas ...

 Products

Here at Kaspersky, we’ve been using AI in our mobile security solution for some time now. At the recent Mobile World Congress in Barcelona, Viktor Chebyshev of our Global Research and Analysis Team (GReAT) talked about why — and what we’ve achieved with the technology. A brief history of mobile malware   show more ...

evolution First, a bit of background on the evolution of malicious apps for Android. The operating system appeared back in 2007, and the first Android smartphone, the HTC Dream, became available in 2008. Malware writers quickly got to know the new platform, and by 2009 the world saw the first malicious programs for Android. True, there weren’t many at first: Back in 2009, Kaspersky was detecting about three new Android threats a month, a number Chebyshev, armed with only a simple signature-based antivirus engine, could manage on his own. In 2009, we detected three new samples of Android malware per month on average Very soon, however, the number of threats snowballed, and by 2010 our monthly detections of new Android malware had shot up to 20,000. The signature-based engine still managed, but far more time was spent on analyzing the malicious files. As the operating system’s popularity soared, the amount of new Android malware swelled. In 2012, we were detecting an average of 467,515 samples per month, our team of mobile threat analysts had grown to four, and heuristic analysis and statistical methods supplemented the signature-based engine — but that wasn’t enough. Fttkit provides a striking example of how mobile threats have evolved. The creators of this Trojan dropper call it an “automated service to protect Android apps,” but it actually helps fellow malware writers evade antivirus detection. It works by using obfuscation to trick security solutions and then installing other malware, usually banking Trojans. We know of more than 360,000 unique versions of Fttkit, and the figure continues to grow. AI for mobile security To pick through that number of malware samples manually would require an ever-expanding team, and, more important, would take a lot of time (during which users could pick up new malware). That’s where machine-learning technologies come in and can save significant amounts of time and resources. However, such technologies are quite resource-intensive, meaning that doing all of the necessary work right on a user’s device can reduce performance and battery life. To minimize the impact, we use a hybrid option, with the smartphone performing less-resource-intense operations and then sending data to the cloud for the heavy lifting. This model ensures reliable protection and quick responses to new threats with minimal impact on smartphone performance and battery life. Here’s what we achieved by implementing machine learning in Kaspersky Internet Security for Android: The verdict delivered by the machine-learning technologies in our solution for Android — DangerousObject.AndroidOS.GenericML — is currently on the Top-3 list, accounting for 6.63% of all malware for this operating system detected by our products. This verdict from our machine-learning technologies is among the three most common Most significantly, our mobile products detect around 33% of all new Android threats using AI. This is made possible by a combination of factors. First, we have an extensive mobile threat database, which we have maintained since 2009. Second, our team of mobile threat researchers has unique expertise in the field. Third, we have a team of machine-learning experts who effectively integrate this technology into our products. All this combined helps our mobile security solutions consistently top independent tests in terms of both protection and performance.

image for Microsoft Issues Eme ...

 Latest Warnings

Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release,   show more ...

and follows the publishing of exploit code showing would-be attackers how to leverage the flaw to break into Windows computers. At issue is CVE-2021-34527, which involves a flaw in the Windows Print Spooler service that could be exploited by attackers to run code of their choice on a target’s system. Microsoft says it has already detected active exploitation of the vulnerability. Satnam Narang, staff research engineer at Tenable, said Microsoft’s patch warrants urgent attention because of the vulnerability’s ubiquity across organizations and the prospect that attackers could exploit this flaw in order to take over a Windows domain controller. “We expect it will only be a matter of time before it is more broadly incorporated into attacker toolkits,” Narang said. “PrintNightmare will remain a valuable exploit for cybercriminals as long as there are unpatched systems out there, and as we know, unpatched vulnerabilities have a long shelf life for attackers.” In a blog post, Microsoft’s Security Response Center said it was delayed in developing fixes for the vulnerability in Windows Server 2016, Windows 10 version 1607, and Windows Server 2012. The fix also apparently includes a new feature that allows Windows administrators to implement stronger restrictions on the installation of printer software. “Prior to installing the July 6, 2021, and newer Windows Updates containing protections for CVE-2021-34527, the printer operators’ security group could install both signed and unsigned printer drivers on a printer server,” reads Microsoft’s support advisory. “After installing such updates, delegated admin groups like printer operators can only install signed printer drivers. Administrator credentials will be required to install unsigned printer drivers on a printer server going forward.” Windows 10 users can check for the patch by opening Windows Update. Chances are, it will show what’s pictured in the screenshot below — that KB5004945 is available for download and install. A reboot will be required after installation. Friendly reminder: It’s always a good idea to backup your data before applying security updates. Windows 10 has some built-in tools to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once. Microsoft’s out-of-band update may not completely fix the PrinterNightmare vulnerability. Security researcher Benjamin Delpy posted on Twitter that the exploit still works on a fully patched Windows server if the server also has Point & Print enabled — a Windows feature that automatically downloads and installs available printer drivers. Delpy said it’s common for organizations to enable Point & Print using group policies because it allows users to install printer updates without getting approval first from IT. This post will be updated if Windows users start reporting any issues in applying the patch.

 Companies to Watch

The transaction values Zerto at just over twice the funding raised by it. Zerto will be placed into the HPE Storage business unit, reporting to Tom Black, Senior Vice President and General Manager.

 Malware and Vulnerabilities

The latest zero-day entails an attack chain that allows an unauthenticated intruder to execute code as root and install a permanent backdoor on the vendor’s network-attached storage NAS devices.

 Malware and Vulnerabilities

Cybersecurity researchers have spotted a new Mirai-inspired botnet, mirai_ptea, abusing an undisclosed vulnerability in KGUARD's Digital Video Recorders (DVR). Mirai’s source code was leaked several years ago, and since then multiple variants are still getting spotted on the threat landscape.

 Feed

Ubuntu Security Notice 5006-1 - It was discovered that PHP incorrectly handled certain PHAR files. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service, or possibly obtain sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was   show more ...

discovered that PHP incorrectly handled parsing URLs with passwords. A remote attacker could possibly use this issue to cause PHP to mis-parse the URL and produce wrong data. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. Various other issues were also addressed.

 Feed

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged   show more ...

the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

 Feed

Red Hat Security Advisory 2021-2668-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2021-2465-01 - This release of Red Hat build of Eclipse Vert.x 4.1.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include a traversal vulnerability.

 Feed

Red Hat Security Advisory 2021-2663-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Ubuntu Security Notice 5007-1 - Eric Sesterhenn discovered that libuv incorrectly handled certain strings. An attacker could possibly use this issue to access sensitive information or cause a crash.

 Feed

Red Hat Security Advisory 2021-2664-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

 Feed

Gentoo Linux Security Advisory 202107-9 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 89.0 are affected.

 Feed

Red Hat Security Advisory 2021-2658-01 - The linuxptp packages provide Precision Time Protocol implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces offered by the Linux kernel.

 Feed

Ubuntu Security Notice 5008-1 - Thomas Kremer discovered that Avahi incorrectly handled termination signals on the Unix socket. A local attacker could possibly use this issue to cause Avahi to hang, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. It was   show more ...

discovered that Avahi incorrectly handled certain hostnames. A local attacker could possibly use this issue to cause Avahi to crash, resulting in a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu 21.04. Various other issues were also addressed.

 Feed

Microsoft has shipped an emergency out-of-band security update to address a critical zero-day vulnerability — known as "PrintNightmare" — that affects the Windows Print Spooler service and can permit remote threat actors to run arbitrary code and take over vulnerable systems. Tracked as CVE-2021-34527 (CVSS score: 8.8), the remote code execution flaw impacts all supported editions of Windows.

 Feed

A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded malware toolset to strike both Windows and macOS operating systems, symbolizing an expansion in both its targets and its strategy around distributing threats. Russian cybersecurity firm attributed the attacks to an advanced persistent threat (APT) it tracks as

 Feed

An analysis of off-the-shelf packages hosted on the NuGet repository has revealed 51 unique software components to be vulnerable to actively exploited, high-severity vulnerabilities, once again underscoring the threat posed by third-party dependencies to the software development process. In light of the growing number of cyber incidents that target the software supply chain, there is an urgent

 Feed

Security teams whose organizations are outside the Fortune 500 are faced with a dilemma. Most teams will have to choose between deploying either a network traffic analysis (NTA) or network detection and response (NDR) tool or an endpoint detection and response (EDR) tool to supplement their existing stacks. On the other hand, some organizations are getting the best of both options by switching

 Feed only

Many thanks to the great team at Recorded Future, who are sponsoring my website this week. Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the web. And now, with its FREE Cyber Daily email all IT security   show more ...

professionals can access information about the … Continue reading "Join over 45,000 others, and get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily"

2021-07
Aggregator history
Wednesday, July 07
THU
FRI
SAT
SUN
MON
TUE
WED
JulyAugustSeptember