Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Russian Hackers Disg ...

 Security

Google security researchers uncover a massive hacking campaign that most likely originated with Russian state cybercriminals and targeted government officials in several European countries.  A new investigation by Google shows that some of the common LinkedIn spam can be quite dangerous. Hackers with possible   show more ...

connections to the Russian government sent fraudulent LinkedIn messages to various officials from European countries with links aimed to exploit vulnerabilities in Windows and iOS.  It is not yet known how many LinkedIn users were targeted in this hacking campaign and how many of them were ultimately hacked. Google believes that the cybercriminal gang responsible for the hacking campaign is most likely backed by the Russian government.  This was disclosed on Wednesday by Google's Threat Analysis Group, unveiling numerous new hacking tactics that make us... (read more)

image for Kaspersky Unveils th ...

 Security

Kaspersky cybersecurity researchers examined Android instant messaging apps to determine their level of risk to users. Cybercriminals have been known to exploit the popularity of chat apps to launch phishing attacks and scams.   An average of 480 phishing and similar detections occurred per day worldwide. The three   show more ...

countries where the most phishing attacks originate were India (7%), Brazil (17%), and Russia (46%).  WhatsApp is the most popular instant messaging app, and hackers use it the most in their cybercrime activities. The study found that WhatsApp is used in about 89.6% of phishing attacks carried out via instant messages. The reason for this is actually quite obvious, since almost everyone who owns a smartphone uses WhatsApp. Furthermore, we can see that Telegram is in second place, followed by

image for Biden Administration ...

 Security

According to a Senate staffer who spoke candidly on conditions of anonymity, many federal agencies have taken various defensive and offensive actions through a yet-to-be-named task force, Politico says.  Countries working to combat ransom payments made through cryptocurrencies are also developing procedures to block   show more ...

those payments, as well as working with allies overseas to do so, an aide said. He added that the task force can launch cyberattacks on ransomware operators to combat them.  Yesterday, Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, gave members of Congress a 35-minute briefing on the upcoming executive order. The announcement that a task force has been established to combat ransomware operators comes at the same time when lawmakers and cyber experts are calling on President Joe Biden to do more in res... (read more)

image for APT Campaign by Chin ...

 Security

Researchers from Kaspersky Lab have discovered a large-scale superior persistent risk (APT) marketing campaign that involved multiple victims from Southeast Asia, as well as government agencies in Myanmar and the Philippines.  According to Kaspersky, there is a moderate to a high degree of confidence that this APT   show more ...

exercise cluster, dubbed LuminousMoth, was employed by HoneyMyte, a Chinese language-speaking cybercriminal gang.  The LuminousMoth cyberespionage attacks against different Asian government agencies have been going on since at least October 2020. It's worth mentioning that so far Kaspersky analysts have found more than 100 victims in Myanmar and more than 1,400 victims in the Philippine. Unfortunately, they were unable to assess the real scale of the assaults.  The links discovered include ties to various forms of community infrastructure comparable to the command-and-control s... (read more)

image for Encore Podcast: Is A ...

 automobile

Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods of The Atlantic Council about the risks of embracing autonomous driving technology too quickly. The post Encore Podcast: Is Autonomous Driving Heading for a   show more ...

Crash? appeared first on The...Read the whole entry... » Related StoriesEpisode 216: Signed, Sealed and Delivered: The Future of Supply Chain SecurityEpisode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream MonopolyEpisode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware

 Malware and Vulnerabilities

These malware are the most predominant malware in macOS, also with a history of evading and bypassing the built-in Xprotect, Gatekeeper, Notarization, and File Quarantine security features of macOS.

 Laws, Policy, Regulations

On July 13, Ohio Lieutenant Governor John Husted announced the introduction of the Ohio Personal Privacy Act, a comprehensive privacy framework following in the footsteps of several other states.

 Threat Actors

Iranian state-aligned threat actor TA453 hacked a website pertaining to the University of London, to steal information of journalists, professors, and think tanks, under a campaign dubbed SpoofedScholars. The APT group is continuously innovating and developing new ways of attacking users. Organizations must have a robust security strategy in place to stay protected.

 Govt., Critical Infrastructure

The U.S. on Thursday offered up to $10 million for information that can identify or locate malicious cyber actors working at the behest of a foreign government to target critical U.S. infrastructure.

 Threat Intel & Info Sharing

In the fiscal year 2020, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a risk assessment of 37 attack techniques mapped to six infection stages across multiple stakeholders in different sectors.

 Feed

Red Hat Security Advisory 2021-2743-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

Red Hat Security Advisory 2021-2742-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.

 Feed

Tor suffers from an issue where half-closed connection tracking ignores layer_hint and due to this, entry/middle relays can spoof RELAY_END cells on half-closed streams, which can lead to stream confusion between OP and exit.

 Feed

Red Hat Security Advisory 2021-2741-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2740-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.12.0 ESR. Issues addressed include out of bounds write and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2758-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

 Feed

Ubuntu Security Notice 5010-1 - Lei Sun discovered that QEMU incorrectly handled certain MMIO operations. An attacker inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. Wenxiang Qian discovered that QEMU incorrectly handled certain ATAPI commands. An attacker   show more ...

inside the guest could possibly use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 21.04. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 5009-1 - Qiuhao Li discovered that libslirp incorrectly handled certain header data lengths. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10. It was discovered that libslirp   show more ...

incorrectly handled certain udp packets. An attacker inside a guest could possibly use this issue to leak sensitive information from the host. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-2755-01 - These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base, so no changes to the EAP XP2 code base. Issues addressed include bypass, code execution, cross site scripting, and information leakage vulnerabilities.

 Feed

Threat intelligence researchers from Google on Wednesday shed more light on four in-the-wild zero-days in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year. What's more, three of the four zero-days were engineered by commercial providers and sold to and used by government-backed actors, contributing to an

 Feed

A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research. Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a

 Feed

Zero Trust is increasingly being adopted as the best strategy to maintain application security and prevent data breaches. To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators – without the overhead of processing or storing user data.  Before we show you how it

 Feed

Networking equipment maker SonicWall is alerting customers of an "imminent" ransomware campaign targeting its Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware. The warning comes more than a month after reports emerged that remote access vulnerabilities in SonicWall SRA 4600 VPN appliances (CVE-2019-7481) are being

 Facebook

How did investigators ask a romance scammer out on a date, how are smart homes continuing to play dumb, and is it time for social media sites to do more about racist football fans? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by BBC technology reporter Zoe Kleinman.

2021-07
Aggregator history
Thursday, July 15
THU
FRI
SAT
SUN
MON
TUE
WED
JulyAugustSeptember