Gettr, the new social media network was hacked not once, but twice. Apart from releasing customers' data online, hackers enjoyed themselves by flooding the platform with Sonic the Hedgehog-themed pornography and tampering with users' profiles, according to Threat Post. Gettr can be described as another show more ...
Twitter alternative that focuses on posts regarding the current topics. The organization describes itself as "a non-bias social network for people all over the world." When Gettr was first launched, cybersecurity professionals recognized that the APIs were poorly written and full of vulnerabilities. Ashkan Soltani, a security researcher, uncovered a flaw that allows a threat actor to launch a brute-force attack targeting the API by giving it a list of emails and receiving a response listing the ones muted or blacklisted. One of the first blows against Trump's conserv... (read more)
It seems that Biden Administration's foreign policy contains unachievable objectives, according Rebekah Koffler, a former Defense Intelligence Agency officer cited by Fox News. Biden's naive approach involves pleading with Russia's leader, Vladimir Putin, to cooperate in combating Russian cybercrime. By show more ...
insisting on an overly controlled situation and demanding that Russian hackers refrain from using cyberattacks on a regular basis, Joe Biden and his team of advisors are sending a weak message to a Russian president who is not interested in stability and sees cyberattacks as useful weapons. Despite President Biden's silly attitude that led him to pass a list of “do not attack” vital infrastructure targets to Putin during a meeting in June, Russia was undeterred in continuing its cyber warfare campaign. Putin believes that Russia's so-called low grade cyber ... (read more)
Following the hack of 4 New Square Chambers, the company won a court order preventing the hackers from publishing stolen data from a prior cyberattack, according to The Register. The attack carried on June 12 is essentially a breach that stole private data from the company. As expected, the cybercriminals threatened show more ...
to make public all information gathered. The plot twists is that judge Mrs. Justice Steyn issued a provisional injunction prohibiting the cybercriminals from using, publishing, or communicating to any party regarding the stolen data or sections of it. Despite the fact that the injunction return deadline is this Friday, no data appears to have been disclosed on the dark web hacker forums yet. This type of response has never occurred before, and it will be very fascinating to watch if it sets a precedent. While highly unlikely, everyone is curious if h... (read more)
Here at Kaspersky, we’ve been using AI in our mobile security solution for some time now. At the recent Mobile World Congress in Barcelona, Viktor Chebyshev of our Global Research and Analysis Team (GReAT) talked about why — and what we’ve achieved with the technology. A brief history of mobile malware show more ...
evolution First, a bit of background on the evolution of malicious apps for Android. The operating system appeared back in 2007, and the first Android smartphone, the HTC Dream, became available in 2008. Malware writers quickly got to know the new platform, and by 2009 the world saw the first malicious programs for Android. True, there weren’t many at first: Back in 2009, Kaspersky was detecting about three new Android threats a month, a number Chebyshev, armed with only a simple signature-based antivirus engine, could manage on his own. In 2009, we detected three new samples of Android malware per month on average Very soon, however, the number of threats snowballed, and by 2010 our monthly detections of new Android malware had shot up to 20,000. The signature-based engine still managed, but far more time was spent on analyzing the malicious files. As the operating system’s popularity soared, the amount of new Android malware swelled. In 2012, we were detecting an average of 467,515 samples per month, our team of mobile threat analysts had grown to four, and heuristic analysis and statistical methods supplemented the signature-based engine — but that wasn’t enough. Fttkit provides a striking example of how mobile threats have evolved. The creators of this Trojan dropper call it an “automated service to protect Android apps,” but it actually helps fellow malware writers evade antivirus detection. It works by using obfuscation to trick security solutions and then installing other malware, usually banking Trojans. We know of more than 360,000 unique versions of Fttkit, and the figure continues to grow. AI for mobile security To pick through that number of malware samples manually would require an ever-expanding team, and, more important, would take a lot of time (during which users could pick up new malware). That’s where machine-learning technologies come in and can save significant amounts of time and resources. However, such technologies are quite resource-intensive, meaning that doing all of the necessary work right on a user’s device can reduce performance and battery life. To minimize the impact, we use a hybrid option, with the smartphone performing less-resource-intense operations and then sending data to the cloud for the heavy lifting. This model ensures reliable protection and quick responses to new threats with minimal impact on smartphone performance and battery life. Here’s what we achieved by implementing machine learning in Kaspersky Internet Security for Android: The verdict delivered by the machine-learning technologies in our solution for Android — DangerousObject.AndroidOS.GenericML — is currently on the Top-3 list, accounting for 6.63% of all malware for this operating system detected by our products. This verdict from our machine-learning technologies is among the three most common Most significantly, our mobile products detect around 33% of all new Android threats using AI. This is made possible by a combination of factors. First, we have an extensive mobile threat database, which we have maintained since 2009. Second, our team of mobile threat researchers has unique expertise in the field. Third, we have a team of machine-learning experts who effectively integrate this technology into our products. All this combined helps our mobile security solutions consistently top independent tests in terms of both protection and performance.
Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, show more ...
and follows the publishing of exploit code showing would-be attackers how to leverage the flaw to break into Windows computers. At issue is CVE-2021-34527, which involves a flaw in the Windows Print Spooler service that could be exploited by attackers to run code of their choice on a target’s system. Microsoft says it has already detected active exploitation of the vulnerability. Satnam Narang, staff research engineer at Tenable, said Microsoft’s patch warrants urgent attention because of the vulnerability’s ubiquity across organizations and the prospect that attackers could exploit this flaw in order to take over a Windows domain controller. “We expect it will only be a matter of time before it is more broadly incorporated into attacker toolkits,” Narang said. “PrintNightmare will remain a valuable exploit for cybercriminals as long as there are unpatched systems out there, and as we know, unpatched vulnerabilities have a long shelf life for attackers.” In a blog post, Microsoft’s Security Response Center said it was delayed in developing fixes for the vulnerability in Windows Server 2016, Windows 10 version 1607, and Windows Server 2012. The fix also apparently includes a new feature that allows Windows administrators to implement stronger restrictions on the installation of printer software. “Prior to installing the July 6, 2021, and newer Windows Updates containing protections for CVE-2021-34527, the printer operators’ security group could install both signed and unsigned printer drivers on a printer server,” reads Microsoft’s support advisory. “After installing such updates, delegated admin groups like printer operators can only install signed printer drivers. Administrator credentials will be required to install unsigned printer drivers on a printer server going forward.” Windows 10 users can check for the patch by opening Windows Update. Chances are, it will show what’s pictured in the screenshot below — that KB5004945 is available for download and install. A reboot will be required after installation. Friendly reminder: It’s always a good idea to backup your data before applying security updates. Windows 10 has some built-in tools to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once. Microsoft’s out-of-band update may not completely fix the PrinterNightmare vulnerability. Security researcher Benjamin Delpy posted on Twitter that the exploit still works on a fully patched Windows server if the server also has Point & Print enabled — a Windows feature that automatically downloads and installs available printer drivers. Delpy said it’s common for organizations to enable Point & Print using group policies because it allows users to install printer updates without getting approval first from IT. This post will be updated if Windows users start reporting any issues in applying the patch.
The lawsuit was based on the 2018 British Airways data breach, where the credit card details of 380,000 people were stolen thanks to a Magecart infection on its payment processing pages.
In most cases, the REvil ransomware group utilizes Cobalt Strike BEACON and RDP with previously compromised credentials to laterally move throughout compromised environments.
The transaction values Zerto at just over twice the funding raised by it. Zerto will be placed into the HPE Storage business unit, reporting to Tom Black, Senior Vice President and General Manager.
Users' names, profile descriptions, usernames, along with other non-public information such as email address, birth year, and location information, were among the leaked data.
The latest zero-day entails an attack chain that allows an unauthenticated intruder to execute code as root and install a permanent backdoor on the vendor’s network-attached storage NAS devices.
A researcher at Positive Technologies has described the potential impact of a recently addressed command injection vulnerability affecting SonicWall’s Network Security Manager (NSM) product.
In the past few weeks, ransomware groups targeted at least three North American insurance brokerages that offer policies to help others survive the very kind of attacks they themselves suffered.
The U.S. Innovation and Competition Act, passed by the Senate in June, includes two cyber-related acts – the Cyber Response and Recovery Act and the Safeguarding American Innovation Act.
Microsoft has shipped an emergency out-of-band security update to address a critical zero-day vulnerability — known as "PrintNightmare" — that affects the Windows Print Spooler service.
Threat actors are trying to exploit the Kaseya ransomware attack crisis by targeting potential victims in a spam campaign pushing Cobalt Strike payloads disguised as Kaseya VSA security updates.
Health care entities should review system inventories to find PACS and ensure all vulnerabilities are patched or protected from public access, according to a recent HHS alert.
The hacker group has been tied to Russia’s foreign intelligence service and has previously been accused of breaching the Democratic National Committee in 2016 and SolarWinds more recently.
An analysis of off-the-shelf packages hosted on the NuGet repository has revealed 51 unique software components to be vulnerable to actively exploited, high-severity vulnerabilities.
In a series of tweets from Malwarebytes, researchers have disclosed that a malspam campaign is taking advantage of the Kaseya ransomware attack to drop Cobalt Strike.
China has reportedly warned local companies it will tighten oversight of data security and overseas listings days after unveiling Didi has been subject to a government cybersecurity review.
Kaseya’s attempt to recover its SaaS services has suffered a setback. The recent breach has seen its VSA services offline since July 2nd and over 1,000 ransomware infections.
In its advisory, the healthcare provider said that the attackers made a copy of the datasets, which include patient names, dates of birth, SSNs, health insurance details, and medical record numbers.
Zimperium will continue to support current whiteCryption customers and will integrate whiteCryption’s solutions into Zimperium’s Mobile Application Protection Suite (MAPS).
The versioning system shows that the malware used by WildPressure is still under active development. Besides commercial VPS, this time the operators used compromised legitimate WordPress websites.
The big mistake made by KPM was using the current system time in seconds as the seed into a Mersenne Twister PRNG, meaning different instances will generate the same password at a given time.
The Daines/Whitehouse bill calls for DHS to perform a study on the viability of allowing private entities to take “proportional” actions against hackers under the oversight of a federal agency.
Cybersecurity researchers have spotted a new Mirai-inspired botnet, mirai_ptea, abusing an undisclosed vulnerability in KGUARD's Digital Video Recorders (DVR). Mirai’s source code was leaked several years ago, and since then multiple variants are still getting spotted on the threat landscape.
Cisco Talos said a recent surge in activity signals a boost in the APT's development of techniques, tactics, and tools, with multiple, new remote access trojans (RATs) and plugins now in play.
White House Press Secretary Jen Psaki added that the recent REvil ransomware attack on Florida-based IT company Kaseya is not yet attributed to anyone, specifically not to the Russian government.
In their investigation of the Charming Kitten group, IBM X-Force researchers investigated attackers' operational security errors to reveal the inner details of how they function and launch attacks.
A legal services firm, 4 New Square Chambers, hit by a ransomware attack has responded by getting a British High Court order demanding the criminals do not share stolen data.
Bogus cryptomining apps for Android available for download on Google Play are estimated to have scammed more than 93,400 victims to date, researchers said, stealing at least $350,000.
Given the mass migration to remote work, even more critical business data is being shared by email. Users receive hundreds of emails a day, and sifting through them is time-consuming and exhausting.
Ubuntu Security Notice 5006-1 - It was discovered that PHP incorrectly handled certain PHAR files. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service, or possibly obtain sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was show more ...
discovered that PHP incorrectly handled parsing URLs with passwords. A remote attacker could possibly use this issue to cause PHP to mis-parse the URL and produce wrong data. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. Various other issues were also addressed.
Gentoo Linux Security Advisory 202107-10 - A bug in TCG TPM2 Software Stack may result in information disclosure to a local attacker. Versions less than 2.4.3 are affected.
Red Hat Security Advisory 2021-2666-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged show more ...
the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.
Red Hat Security Advisory 2021-2668-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Gentoo Linux Security Advisory 202107-13 - Multiple vulnerabilities have been found in GLib, the worst of which could result in the arbitrary execution of code. Versions less than 2.66.8 are affected.
Gentoo Linux Security Advisory 202107-12 - Multiple vulnerabilities have been found in Schism Tracker, the worst of which could result in denial of service. Versions less than 20190805 are affected.
Red Hat Security Advisory 2021-2465-01 - This release of Red Hat build of Eclipse Vert.x 4.1.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include a traversal vulnerability.
Red Hat Security Advisory 2021-2663-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
Ubuntu Security Notice 5007-1 - Eric Sesterhenn discovered that libuv incorrectly handled certain strings. An attacker could possibly use this issue to access sensitive information or cause a crash.
Red Hat Security Advisory 2021-2664-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.
Gentoo Linux Security Advisory 202107-9 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 89.0 are affected.
Red Hat Security Advisory 2021-2658-01 - The linuxptp packages provide Precision Time Protocol implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces offered by the Linux kernel.
Ubuntu Security Notice 5008-1 - Thomas Kremer discovered that Avahi incorrectly handled termination signals on the Unix socket. A local attacker could possibly use this issue to cause Avahi to hang, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. It was show more ...
discovered that Avahi incorrectly handled certain hostnames. A local attacker could possibly use this issue to cause Avahi to crash, resulting in a denial of service. This issue only affected Ubuntu 20.10 and Ubuntu 21.04. Various other issues were also addressed.
Microsoft has shipped an emergency out-of-band security update to address a critical zero-day vulnerability — known as "PrintNightmare" — that affects the Windows Print Spooler service and can permit remote threat actors to run arbitrary code and take over vulnerable systems. Tracked as CVE-2021-34527 (CVSS score: 8.8), the remote code execution flaw impacts all supported editions of Windows.
A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded malware toolset to strike both Windows and macOS operating systems, symbolizing an expansion in both its targets and its strategy around distributing threats. Russian cybersecurity firm attributed the attacks to an advanced persistent threat (APT) it tracks as
An analysis of off-the-shelf packages hosted on the NuGet repository has revealed 51 unique software components to be vulnerable to actively exploited, high-severity vulnerabilities, once again underscoring the threat posed by third-party dependencies to the software development process. In light of the growing number of cyber incidents that target the software supply chain, there is an urgent
Security teams whose organizations are outside the Fortune 500 are faced with a dilemma. Most teams will have to choose between deploying either a network traffic analysis (NTA) or network detection and response (NDR) tool or an endpoint detection and response (EDR) tool to supplement their existing stacks. On the other hand, some organizations are getting the best of both options by switching
Many thanks to the great team at Recorded Future, who are sponsoring my website this week. Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the web. And now, with its FREE Cyber Daily email all IT security show more ...
professionals can access information about the … Continue reading "Join over 45,000 others, and get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily"
While the world continues to wait for Kaseya to issue an update to patch VSA installations against a vulnerability exploited by the REvil ransomware gang, security researchers spotted a malware campaign which is taking advantage of the vacuum.