Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Malicious NPM Packag ...

 Security

A software package available in the official NPM repository turned out to be a front for a program aimed at stealing stored credentials from the Chrome web browser, according to The Hacker News. After being reported yesterday, the malicious package was removed from the repository.  The malicious package is called   show more ...

"nodejs net server" and has been downloaded more than 1,283 times since February 2019. One questionable detail is that the associated repository leads to non-existent locations on GitHub.  While the original version of the package was only released to test the NPM package publishing process, the developer, named Chrunlee, made revisions with the purpose of implementing a remote shell capability. Then a script ("hxxps:/chrunlee.cn/a.exe") was added to down... (read more)

image for France Examines Cybe ...

 Security

An emergency conference on cyber security was organized by French President Emmanuel Macron on Thursday to review the need for further government action in the area of cybersecurity strategies. This occurs in the wake of reports that spyware was planted on his cell phone and that government employees were also   show more ...

infected with the malware, says AP News.  According to Gabriel Attal, a government spokesperson, Macron swaps his phones on a regular basis and takes the issue very seriously. Following a report this week by an international media consortium, it was revealed that Pegasus espionage software developed by Israeli business NSO Group may have been used in multiple countries to target activists, journalists, and politicians.  As revealed by Le Monde, a member of the consortium, Macron's mobile phone and the mobile phones of 15 other former memb... (read more)

image for British Hacker Arres ...

 Security

Joseph O'Connor, a British citizen aged 22, was arrested on a US warrant in Estepona, Spain, for his alleged involvement in the Twitter hack in July 2020. According to The Hacker News, after the massive social media platform hack, 130 accounts of businesses, politicians, and celebrities were compromised.  The   show more ...

British man was charged due to a criminal complaint filed in the U.S. District Court for the Northern District of California, making extortive communications, obtaining information from a protected computer, and intentionally accessing a computer without authorization.  Beyond his involvement in the Twitter attack, O'Connor is suspected of being responsible for computer intrusions into various accounts of TikTok and Snapchat users.He is also suspected... (read more)

image for Biden to Convene Bus ...

 Security

President Joe Biden and senior officials of the state will meet with business sector leaders on Aug. 25 to discuss ways to improve cybersecurity, says Reuters. At this time, it is not yet known which CEOs from the business sector will attend the event.  According to a spokesperson for the White House National   show more ...

Security Council, members of the national security team and government officials would meet with executives from major companies to "discuss how we can work together to collectively improve the nation's cybersecurity," He continued, "Today more than ever, cybersecurity is an economic security and national security imperative, and both the federal government and the private sector play a critical role,"  The announcement of the meeting comes in the midst of high-profile ransomware attacks and the Biden administration's effor... (read more)

image for Transatlantic Cable  ...

 News

With Ahmed on vacation, the Kaspersky Transatlantic Cable podcast returns this week to its original lineup. Dave and I kick off this week’s episode with a look at the latest from REvil and its victims. (Spoiler alert: Despite the quiet, things are not great.) From there, we head to Southeast Asia, where   show more ...

LuminousMoth has been targeting government organizations. Instead of giving you our hot takes and thoughts on the APT action, we discuss the research and actor with senior Kaspersky security researcher Mark Lechtik. Following that, we discuss Amazon’s potential Alexa tracking device for kids. That calls for a change of topic, to a sneak peek of our new miniseries, Community Conversations. We will be interviewing members of organizations in the infosec community that are collaborating across borders to make a positive impact in the space. We will launch the series over the coming weekend. Following the preview, we discuss Twitter’s curious account verification practices: specifically, the case of a verified cat. Next, facial recognition in retail stores may be more prevalent than you think. To close out the episode, Dave and I discuss the pros and cons of buying a Cold War bunker — just ~$700K. If you liked what you heard, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below: What’s next for REvil’s victims? Ransomware giant REvil’s sites disappear LuminousMoth APT: Sweeping attacks for the chosen few Amazon considered developing Alexa tracking device for children Twitter verifies at least six fake accounts including this cat Retail stores are packed with unchecked facial recognition, civil rights organizations say You can bug-out to your own Cold War communications bunker for a cool $695,000

 Malware and Vulnerabilities

Oracle on Tuesday announced the availability of a total of 342 new security patches as part of its July 2021 Critical Patch Update (CPU), with more than half of the flaws allowing remote attacks.

 Malware and Vulnerabilities

First spotted in the wild in 2007, the earliest known version of the ZeuS Trojan was caught stealing sensitive information from systems owned by the United States Department of Transformation.

 Trends, Reports, Analysis

A report earlier this year revealed that 2020 marked a record-breaking year for cyberattacks against schools. The trend, however, continues this year; a barrage of attacks has already targeted several K-12 schools.

 Trends, Reports, Analysis

Zscaler analyzed 575 million device transactions, along with 300,000 IoT-specific malware attack attempts. This revealed that IoT malware has witnessed a rise of 700% as compared to pre-pandemic numbers.

 Laws, Policy, Regulations

The August meeting comes as the White House is scrambling to help companies protect against ransomware attacks from Russia-based criminal syndicates and as the administration also confronts an aggressive cybersecurity threat from China.

 Incident Response, Learnings

Leading US insurance company CNA Financial has provided a glimpse into how Phoenix CryptoLocker operators breached its network, stole data, and deployed ransomware payloads in a ransomware attack that hit its network in March 2021.

 Trends, Reports, Analysis

An investigation by Sophos researchers found that more than half of network traffic generated by malware uses TLS encryption, and 20 percent of that involved communication with legit online services.

 Threat Actors

Multiple threat actors originating from China are targeting multiple entities and businesses including government, education, politics, military, financial, and critical infrastructure firms to pilfer sensitive data. Despite repeated accusations, the frequency and aggression of these attacks have increased greatly.

 Malware and Vulnerabilities

Bitdefender took the wraps off of an ongoing worldwide attack campaign involving MosaicLoader malware packaged within pirated software and advertised via search engine results. One of the most recommended ways to avoid such threats being downloaded on your systems is to refrain from downloading cracked software. 

 Feed

Red Hat Security Advisory 2021-2866-01 - The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource   show more ...

management, live migrations, and virtual infrastructure provisioning. The ovirt-ansible-hosted-engine-setup package provides an Ansible role for deploying Red Hat Virtualization Hosted-Engine.

 Feed

Red Hat Security Advisory 2021-2865-01 - The ovirt-engine package provides the manager for virtualization environments. This manager enables admins to define hosts and networks, as well as to add storage, create VMs and manage user permissions. Issues addressed include code execution and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2021-2736-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only   show more ...

the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2021-2779-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes,   show more ...

and enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2021-2780-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2021-2777-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and   show more ...

enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2021-2778-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

 Feed

Gentoo Linux Security Advisory 202107-49 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 91.0.4472.164 are affected.

 Feed

Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system. Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that's remotely exploitable without

 Feed

A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts. Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish

 Feed

An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims. "To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of its attacks," Trend Micro researchers Zhengyu

 Feed

Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges.  This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, and password restrictions.  One of the most common areas where security may cause challenges for

 iOS

Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a “Freedom Phone” be trusted? And a ransomware-hit law firm demonstrates how not to keep its customers informed. All this and much more is discussed in the latest   show more ...

edition of the award-winning “Smashing … Continue reading "Smashing Security podcast #237: NuNa, NuNu, NaNa"

 Business email compromise

17 domains used in Business Email Compromise (BEC) scams have been seized by Microsoft's Digital Crimes Unit (DCU), following an investigation by the software giant into attacks that could have stolen millions of dollars from innocent firms. Read more in my article on the Hot for Security blog.

2021-07
Aggregator history
Thursday, July 22
THU
FRI
SAT
SUN
MON
TUE
WED
JulyAugustSeptember