Google security researchers uncover a massive hacking campaign that most likely originated with Russian state cybercriminals and targeted government officials in several European countries. A new investigation by Google shows that some of the common LinkedIn spam can be quite dangerous. Hackers with possible show more ...
connections to the Russian government sent fraudulent LinkedIn messages to various officials from European countries with links aimed to exploit vulnerabilities in Windows and iOS. It is not yet known how many LinkedIn users were targeted in this hacking campaign and how many of them were ultimately hacked. Google believes that the cybercriminal gang responsible for the hacking campaign is most likely backed by the Russian government. This was disclosed on Wednesday by Google's Threat Analysis Group, unveiling numerous new hacking tactics that make us... (read more)
Kaspersky cybersecurity researchers examined Android instant messaging apps to determine their level of risk to users. Cybercriminals have been known to exploit the popularity of chat apps to launch phishing attacks and scams. An average of 480 phishing and similar detections occurred per day worldwide. The three show more ...
countries where the most phishing attacks originate were India (7%), Brazil (17%), and Russia (46%). WhatsApp is the most popular instant messaging app, and hackers use it the most in their cybercrime activities. The study found that WhatsApp is used in about 89.6% of phishing attacks carried out via instant messages. The reason for this is actually quite obvious, since almost everyone who owns a smartphone uses WhatsApp. Furthermore, we can see that Telegram is in second place, followed by
According to a Senate staffer who spoke candidly on conditions of anonymity, many federal agencies have taken various defensive and offensive actions through a yet-to-be-named task force, Politico says. Countries working to combat ransom payments made through cryptocurrencies are also developing procedures to block show more ...
those payments, as well as working with allies overseas to do so, an aide said. He added that the task force can launch cyberattacks on ransomware operators to combat them. Yesterday, Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, gave members of Congress a 35-minute briefing on the upcoming executive order. The announcement that a task force has been established to combat ransomware operators comes at the same time when lawmakers and cyber experts are calling on President Joe Biden to do more in res... (read more)
Researchers from Kaspersky Lab have discovered a large-scale superior persistent risk (APT) marketing campaign that involved multiple victims from Southeast Asia, as well as government agencies in Myanmar and the Philippines. According to Kaspersky, there is a moderate to a high degree of confidence that this APT show more ...
exercise cluster, dubbed LuminousMoth, was employed by HoneyMyte, a Chinese language-speaking cybercriminal gang. The LuminousMoth cyberespionage attacks against different Asian government agencies have been going on since at least October 2020. It's worth mentioning that so far Kaspersky analysts have found more than 100 victims in Myanmar and more than 1,400 victims in the Philippine. Unfortunately, they were unable to assess the real scale of the assaults. The links discovered include ties to various forms of community infrastructure comparable to the command-and-control s... (read more)
Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods of The Atlantic Council about the risks of embracing autonomous driving technology too quickly. The post Encore Podcast: Is Autonomous Driving Heading for a show more ...
Crash? appeared first on The...Read the whole entry... » Related StoriesEpisode 216: Signed, Sealed and Delivered: The Future of Supply Chain SecurityEpisode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream MonopolyEpisode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware
It suggests that many firms don't have the cybersecurity capabilities required to prevent ransomware attacks, such as the ability to detect phishing emails, RDP compromise, or other common techniques.
An HTTP request smuggling vulnerability in Apache Tomcat, an open-source Java servlet container, has been present “since at least 2015”, the project maintainers have warned.
Anyone using SRA 4600/1600 (EOL 2019), SRA 4200/1200 (EOL 2016), or SSL-VPN 200/2000/400 (EOL 2013/2014) should disconnect their appliances immediately and change all associated passwords.
The suspects were arrested last week, had their house searched, and devices seized for investigation during raids part of an operation that authorities named Aguas Vivas (Living Waters).
These malware are the most predominant malware in macOS, also with a history of evading and bypassing the built-in Xprotect, Gatekeeper, Notarization, and File Quarantine security features of macOS.
Thousands of PlayStation 4 gaming consoles have been seized by Ukraine's Security Service after their discovery in an old warehouse, used to illicitly mine for cryptocurrency.
Secure email gateway (SEG) evasion is key for a phishing campaign’s payload to have maximum impact, and an increasing trend of nested files is being used to help with this goal.
Cybersecurity companies and organizations are banding together to create a first responder credentialing program designed to support both large and small organizations dealing with cyber incidents.
While the most well-known application of crypto in the criminal realm is when ransomware payments are made, more covertly, cryptocurrency mining is also a threat that is driven by price changes.
Cybersecurity startup Virsec Systems Inc. disclosed today that it has raised $100 million in new funding to hire more people, meet product demand and build out its customer support model.
As per research by Positive Technologies, the number of attacks increased by 17% compared to Q1 2020, with 77% being targeted attacks, and incidents with individuals accounting for 12% of the total.
The Biden administration is promoting efforts to help agencies go on defense and offense against hackers whose economically paralyzing attacks pose a growing threat to the U.S.
A cryptojacking gang that’s likely based in Romania is using a never-before-seen SSH brute-forcer dubbed “Diicot brute” to crack passwords on Linux-based machines with weak passwords.
Trend Micro released new research urging organizations to focus patching efforts on the vulnerabilities that pose the greatest risk to their organization, even if they are years old.
It turns out that the recent hack wasn’t the first major cybersecurity problem to hit Kaseya and its core product, which IT teams use to remotely monitor and administer workplace systems.
Google security researchers shared more information on four security vulnerabilities, also known as zero-days, unknown before they discovered them being exploited in the wild earlier this year.
On July 13, Ohio Lieutenant Governor John Husted announced the introduction of the Ohio Personal Privacy Act, a comprehensive privacy framework following in the footsteps of several other states.
As with other ransomware attacks, Mespinoza originates through exposed RDP servers, eliminating the need to craft phishing emails, perform social engineering, or exploit software vulnerabilities.
Iranian state-aligned threat actor TA453 hacked a website pertaining to the University of London, to steal information of journalists, professors, and think tanks, under a campaign dubbed SpoofedScholars. The APT group is continuously innovating and developing new ways of attacking users. Organizations must have a robust security strategy in place to stay protected.
The U.S. on Thursday offered up to $10 million for information that can identify or locate malicious cyber actors working at the behest of a foreign government to target critical U.S. infrastructure.
Stytch raised $30 million in its Series A funding led by Thrive Capital, which also included participation from Coatue Management and existing backers Benchmark and Index.
Forefront Dermatology S.C, a dermatology practice with affiliated offices in 21 states plus Washington, D.C., is notifying 2.4 million patients, employees and clinicians of a recent hacking incident.
In the fiscal year 2020, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a risk assessment of 37 attack techniques mapped to six infection stages across multiple stakeholders in different sectors.
Cisco Talos recently discovered multiple vulnerabilities in the Advantech R-SeeNet monitoring software. The vulnerabilities exist in various scripts inside of R-SeeNet's web applications.
Cybereason, a U.S.-Israeli late-stage cybersecurity startup that provides extended detection and response (XDR) services, has secured $275 million in Series F funding led by Liberty Strategic Capital.
"Beginning in M94, Chrome will offer HTTPS-First Mode, which will attempt to upgrade all page loads to HTTPS and display a full-page warning before loading sites that don't support it." Google said.
Microsoft has tracked an increase in consent phishing emails that abuse OAuth request links in an attempt to trick recipients into granting attacker-owned apps permissions to access sensitive data.
The backdoor that was recently removed had been, according to the author, present in all versions of KiwiSDR devices for the purposes of remote administration and debugging.
Red Hat Security Advisory 2021-2743-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Gentoo Linux Security Advisory 202107-35 - A buffer overflow in OpenSCAD might allow remote attacker(s) to execute arbitrary code. Versions less than 2021.01 are affected.
Gentoo Linux Security Advisory 202107-36 - Multiple vulnerabilities have been found in urllib3, the worst of which could result in a Denial of Service condition. Versions less than 1.26.5 are affected.
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
Red Hat Security Advisory 2021-2742-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Gentoo Linux Security Advisory 202107-34 - A vulnerability was found in FluidSynth that could result in remote code execution. Versions less than 2.2.0 are affected.
Tor suffers from an issue where half-closed connection tracking ignores layer_hint and due to this, entry/middle relays can spoof RELAY_END cells on half-closed streams, which can lead to stream confusion between OP and exit.
Red Hat Security Advisory 2021-2741-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.
Red Hat Security Advisory 2021-2740-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.
osCommerce version 2.3.4.1 remote code execution exploit. This is a variant of the original discovery of code execution in this version by Simon Scannell in March of 2018.
Red Hat Security Advisory 2021-2758-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
Ubuntu Security Notice 5010-1 - Lei Sun discovered that QEMU incorrectly handled certain MMIO operations. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. Wenxiang Qian discovered that QEMU incorrectly handled certain ATAPI commands. An attacker show more ...
inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 21.04. Various other issues were also addressed.
Ubuntu Security Notice 5009-1 - Qiuhao Li discovered that libslirp incorrectly handled certain header data lengths. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10. It was discovered that libslirp show more ...
incorrectly handled certain udp packets. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. Various other issues were also addressed.
Red Hat Security Advisory 2021-2755-01 - These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base, so no changes to the EAP XP2 code base. Issues addressed include bypass, code execution, cross site scripting, and information leakage vulnerabilities.
Threat intelligence researchers from Google on Wednesday shed more light on four in-the-wild zero-days in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year. What's more, three of the four zero-days were engineered by commercial providers and sold to and used by government-backed actors, contributing to an
A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research. Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a
Zero Trust is increasingly being adopted as the best strategy to maintain application security and prevent data breaches. To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators – without the overhead of processing or storing user data. Before we show you how it
Networking equipment maker SonicWall is alerting customers of an "imminent" ransomware campaign targeting its Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware. The warning comes more than a month after reports emerged that remote access vulnerabilities in SonicWall SRA 4600 VPN appliances (CVE-2019-7481) are being
The United States Department of State is offering a reward of up to $10 million for information leading to the identification of anyone, working for a foreign government, who participates in a cybercriminal attack against American critical infrastructure. Read more in my article on the Tripwire State of Security blog.
How did investigators ask a romance scammer out on a date, how are smart homes continuing to play dumb, and is it time for social media sites to do more about racist football fans? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by BBC technology reporter Zoe Kleinman.