Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Password-Stealing Wi ...

 Security

A newly discovered malware sent to victims via ads displayed in search results is being used to steal passwords, install cryptocurrency miners, and run other Trojan infections, according to ZDNet.  The malware that is developed for Windows operating system, goes by the name MosaicLoader and infects victims around the   show more ...

world as those behind it try to hack as many devices as possible, according to Bitdefender. Unlike many viruses that are spread through phishing attacks or unpatched software, MosaicLoader is a virus that is promoted to potential victims. A variety of threats can be downloaded to compromised workstations via MosaicLoader, including Glupteba, a malware capable of developing a backdoor system to collect sen... (read more)

image for Home and Office Rout ...

 Security

French authorities  warned that a massive ongoing cyberattack on French organizations is underway targeting home and office routers, says Ars Technica.  According to FireEye the cybercriminal group APT31, also known as Panda and Zirconium, has conducted espionage campaigns against key institutions in the past,   show more ...

including the military, engineering, aviation, media, insurance, finance, construction, telecommunications, and even governments. National Cyber Security Center (NCSC) states that APT is one of three hacker groups backed by the Chinese government that was involved in a recent massive hac... (read more)

image for DDoS Attacks Are Bac ...

 Security

The findings of recent research into the security risks associated with Internet traffic were published by Telia Carrier recently. The statistics are extremely alarming, as they reveal that DDoS attacks surged by 50%, according to Help Net Security.   The difference is significant: 1.18 Tb (Terabytes) per second, or   show more ...

887 Megabits per second (Mpps) (Mega Packets Per Second). Last year alone, a whopping 57 Petabits of malicious information was cleaned, and the average size of a DDoS attack was 19 Gbps, with an average duration of 10 minutes.  Jorg Dekker, Head of Internet Services at Telia Carrier said “The rise of carpet bombing as a popular attack vector and a dramatic increase in peak attack traffic are two important reasons why organizations need to move to automatic threat mitigation techniques”. He added that it is increasingly common for cybercriminals to exploit the massi... (read more)

image for APT Gang Distributed ...

 Security

A cybercriminal gang associated with an advanced persistent threat (APT) has been found in connection with a new campaign that is distributing Android malware through the Syrian e-Government Web Portal, showing that the attacker has expanded his arsenal of tools for penetrating targets, according to The Hacker News.    show more ...

It is suspected that StrongPity, also referred to as Promethium by Microsoft, is allegedly active since 2012, typically focusing on targets in Syria and Turkey. In the mid-2020s, the threat actor was linked to a wave of operations that relied on watering-loop attacks and manipulated installers to infect targets with malware and abuse the popularity of genuine programs.  The last process is no different, as benign software was repackaged into Trojanized variant... (read more)

image for How to download Wind ...

 News

Microsoft hasn’t yet released Windows 11, but the new operating system is already available for download and preview. Cybercriminals, of course, are exploiting that, slipping malware to users who think they’re downloading Microsoft’s new operating system. Why download Windows 11 now? Microsoft   show more ...

actually claimed Windows 10 would be the last release of Windows, that the company would just issue updates from there on out. On June 24 this year, however, the company unveiled Windows 11. And even though under the hood it’s basically Windows 10, Windows 11 is still the OS’s biggest update in six years, with an impressive number of new features and interface modifications. Officially, Windows 11 will become available to the general public in 2021, but loads of people are trying it out early by installing a prerelease build. Some enthusiasts want to try the new system for its novelty; others, such as tech reporters, to inform users about the new features. As for software developers, they need the OS to perform compatibility testing with their own products and fix any issues before release day. Although Microsoft has made the process of downloading and installing Windows 11 from its official website fairly straightforward, many still visit other sources to download the software, which often contains unadvertised goodies from cybercriminals (and isn’t necessarily Windows 11 at all). How scammers fool Windows 11 downloaders The most straightforward way cybercriminals deceive users is by slipping in something extra (or else). One example involves an executable file called 86307_windows 11 build 21996.1 x64 + activator.exe. With a file size as large as 1.75GB, it certainly looks plausible. In fact, though, the bulk of that space consists of one DLL file that contains a lot of useless information. Opening the executable starts the installer, which looks like an ordinary Windows installation wizard. Its main purpose is to download and run another, more interesting executable. The second executable is an installer as well, and it even comes with a license agreement (which few people read) calling it a “download manager for 86307_windows 11 build 21996.1 x64 + activator” and noting that it would also install some sponsored software. If you accept the agreement, a variety of malicious programs will be installed on your machine. Kaspersky products have already defeated several hundred infection attempts that used similar Windows 11–related schemes. A large portion of that malware consists of downloaders, whose task is to download and run other programs. Those other programs can be very wide-ranging — from relatively harmless adware, which our solutions classify as not-a-virus, to full-fledged Trojans, password stealers, exploits, and other nasty stuff. Where and how to download Windows 11 safely Download Windows 11 from official sources only, as Microsoft advises. So far, Windows 11 is officially available only to participants in the Windows Insider program — that is, you have to register. You’ll also need a device with Windows 10 already installed. To upgrade your Windows 10 computer to Windows 11, go to Settings, click Update & Security, then select Windows Insider Program and activate Dev Channel to get the update. We don’t recommend running the update on your main computer; prebuilds can be unstable. We also advise you to use a reliable security solution and never disable it, so that cybercriminals cannot gain access to your computer through social engineering or vulnerabilities in the not-ready-for-primetime system.

 Malware and Vulnerabilities

In recent months Minerva Labs researchers have seen a spike in events associated with Taurus loader. Its spreading method allows it to generate new samples and infect new devices continuously.

 Malware and Vulnerabilities

The CISA warned against 13 malware samples found on exploited Pulse Secure devices that went largely undetected by antivirus products. These were reportedly targeting U.S. government agencies, critical infrastructure entities, and private sector organizations. The federal agency has released IoCs and TTPs for malware spotted on Pulse Secure devices.

 Malware and Vulnerabilities

The malware was found using legitimate password recovery tools on Windows systems. It is capable of providing additional access to camera and screen, file lookup, directory list, file upload, and shell command execution.

 Trends, Reports, Analysis

According to a recent report by Cloudian, the average financial cost of ransomware attacks was $400,000. The average ransom payment was $223,000 while 14% of victims paid a ransom of $500,000 or more.

 Threat Actors

Trend Micro attributed an Android malware sample to the StrongPity APT group, which was pilfering contact lists and collecting files with specific file extensions from Syrian e-Gov websites. Targeting a government’s application portal to bypass Android security signifies that the threat actor is focused, motivated, and has clear plans for achieving their objectives.

 Innovation and Research

Research from Copenhagen Business School finds designers of cookie banners can affect privacy choices by manipulating choice architecture and with simple changes can increase absolute consent by 17%.

 Companies to Watch

Cybereason announced the acquisition of empow, a security analytics company based in Tel Aviv. The acquisition of empow will enable the integration of empow prediction technology into Cybereason XDR.

 Breaches and Incidents

Cybercriminals try to take advantage of the Tokyo Olympics and researchers and security agencies are already warning of the possible cyberattacks on the event. It appears to be challenging for Tokyo to stay protected from expected attacks. Defenses need to be amped up to the tee.

 Govt., Critical Infrastructure

U.S. water treatment facilities are increasingly vulnerable to cyberthreats to their IT networks as well as their OT systems, according to experts who testified at a Senate committee hearing this week.

 Breaches and Incidents

Financial cybercrime gang FIN7 has resurged after the jailing of some members, launching a campaign that uses as a lure a legal complaint involving the liquor company that owns Jack Daniels whiskey.

 Trends, Reports, Analysis

Issues involving APIs didn’t hold businesses back just in terms of their plans to roll out new apps. They also cost valuable time and resources if an attack does happen eventually.

 Security Products & Services

According to GitHub, there are four main areas of improvement for supply chain security for Go modules, including its Advisory Database, dependency graph, Dependabot, and automatic pull requests.

 Feed

Ubuntu Security Notice 5021-1 - Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled TELNET connections when the -t option was used on the command line. Uninitialized data possibly containing sensitive information could be sent to the remote server, contrary to expectations. Harry Sintonen   show more ...

discovered that curl incorrectly reused connections in the connection pool. This could result in curl reusing the wrong connections. Various other issues were also addressed.

 Feed

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

 Feed

Apple Security Advisory 2021-07-21-6 - tvOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

 Feed

Apple Security Advisory 2021-07-21-5 - watchOS 7.6 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

 Feed

Apple Security Advisory 2021-07-21-4 - Security Update 2021-005 Mojave addresses code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.

 Feed

Apple Security Advisory 2021-07-21-3 - Security Update 2021-004 Catalina addresses buffer overflow, code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.

 Feed

Apple Security Advisory 2021-07-21-2 - macOS Big Sur 11.5 addresses buffer overflow, bypass, code execution, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

 Feed

Apple Security Advisory 2021-07-21-1 - iOS 14.7 and iPadOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

 Feed

Gentoo Linux Security Advisory 202107-52 - Multiple vulnerabilities have been found in Apache Velocity, the worst of which could result in the arbitrary execution of code. Versions less than 2.3 are affected.

 Feed

Gentoo Linux Security Advisory 202107-51 - Multiple vulnerabilities have been found in IcedTeaWeb, the worst of which could result in the arbitrary execution of code. Versions less than 1.8.4-r1 are affected.

 Feed

Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained a universal decryptor to unlock systems and help customers recover their data. <!--adsense--> "On July 21, Kaseya obtained a decryptor for victims of the REvil ransomware attack, and we're working to remediate customers impacted by the

 Feed

A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google Chrome and Telegram, as part of further "refinements in its tactics." XCSSET was uncovered in August 2020, when it was found targeting Mac developers using an unusual

 Feed

After more than 20 years in the making, now it's official: APIs are everywhere. In a 2021 survey, 73% of enterprises reported that they already publish more than 50 APIs, and this number is constantly growing. APIs have crucial roles to play in virtually every industry today, and their importance is increasing steadily, as they move to the forefront of business strategies. This comes as no

 Feed

Law enforcement authorities in the Netherlands have arrested two alleged individuals belonging to a Dutch cybercriminal collective who were involved in developing, selling, and renting sophisticated phishing frameworks to other threat actors in what's known as a "Fraud-as-a-Service" operation. The apprehended suspects, a 24-year-old software engineer and a 15-year-old boy, are said to have been

 Business + Partners

At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once.   show more ...

The global pandemic means more work is being conducted in the cloud, so this is no time to be lax with the security of cloud backups. Unless protection is redundant, organizations risk of losing mission-critical data – for minutes, days or permanently depending on the disaster – and putting their survival at risk. That’s why layered protection in the cloud is so critical to cyber resilience. Without it, any one failure can be catastrophic. So, how’s it done? Let’s start with endpoints For organizations managing hundreds or thousands of endpoints, backing each up to the cloud is important for keeping employees productive in the case of hardware failure, device theft, damage or malicious insiders. It’s easy to see how a laptop can be damaged, so it’s obvious for most that files stored locally should be backed up to the cloud. But it’s also important to recognize that work done in the cloud should also be backed up. For example, one of the world’s most popular productivity tools for office workers, Microsoft 365, increasingly carries out its core functions in the cloud. But it has some serious gaps in terms of backup capabilities. The average endpoint user may not know or care which important work files are stored, so long as they’re there when needed. This makes it important that Microsoft 365 data is backed up to the cloud – regardless of whether the user is aware if updates are being made locally or if the location is using its cloud capabilities. Finally, but in the other direction, cloud-based cybersecurity offers another form of data security from the cloud. This method avoids the risk of endpoints relying on out-of-date file definitions of known-bad files, instead relying on near real-time threat telemetry from the cloud. This allows for the near real-time protection of all endpoints using the solution once a threat is identified. But must also include servers It’s less obvious to many of us that servers are at risk of becoming ground zero for data loss as well. Hardware sometimes fails, power cords can be tripped over, or worse…natural disasters can strike data centers, wiping out servers through fires, floods or other types of damage. What good are endpoints without the servers that feed them information? Cloud computing technology offers a handful of flexible opportunities for backing up data housed on servers. On-premise servers – used to store data locally based a business’s preference, regulatory needs or other reasons – can and should still be backed up to the cloud in case of a localized outage. Usually this entails concentrating data within a single point of storage (a “vault”) that’s then bulk uploaded. This duplicated data can then be accessed in the event a physical location loses power or a fiber optic cable is severed by construction work, for example. Off-premise server banks also can and should be protected by cloud backups. Many of these servers may store their data in public clouds, which are normally but not always highly reliable. Public cloud outages do happen. When they do, it pays to have another cloud backup solution to failover to so the business can continue to run. Whether or not this data is stored in the cloud permanently or migrated there when needed, redundancy is established when on and off-premise server banks are backed up to the cloud. Rounding out the redundancy is a disaster recovery as a service (DRaaS) solution. This form of high-availability replication anticipates a worst-case scenario for server data loss. With DRaaS, byte-level replication of changes on an organization’s systems are sent to the cloud. In the event of a disaster, you Note that DRaaS is not to be confused with being a replacement for backup. These are two different solutions that can work perfectly well alongside each other. Backup should apply to every server in an environment and offers long term retention with flexible restore options.  DRaaS typically would be layered on top of backup, for the most mission critical servers, resulting in options to either restore from backup, or failover directly and rapidly to another cloud depending on the event that has rendered the production server or data inaccessible. Maintain uptime, all the time Threats to business data are all around us. Rates of ransomware are rising and remote workforces have ballooned since the outbreak of COVID-19. This is no time to trust in a single cloud as an organizational backup strategy. No single point of failure should keep users from accessing business-critical data. Luckily, there are many options for designed layered backup across clouds.   The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.

2021-07
THU
FRI
SAT
SUN
MON
TUE
WED
JulyAugustSeptember