Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Unpatched Fortinet B ...

 Security

FortiWeb, Fortinet's web application firewall (WAF), is vulnerable to an unpatched command-injection security vulnerability that permits privilege escalation as well as device takeover, according to Rapid7. FortiWeb is a cybersecurity defense platform designed to defend business-critical online applications from   show more ...

unforeseen vulnerabilities and is regularly updated to keep up with new online APIs. Then again, nothing is safe nowadays, as the FortiWeb management interface, versions 6.3.11 and earlier seem to be exposed. According to Rapid7 researcher, William Vu, a remote, authorized attacker can perform arbitrary commands on the system due to a new vulnerability identified. Essentially, a threat actor can use the flaw to take full control and install harmful software, crypto miners or a permanent shell. For the attack to succeed, the threat actor must fir... (read more)

image for Hacker Receives Job  ...

 Security

After the largest heist in the history of decentralized financial systems, PolyNetwork decided to use an original approach by offering the attacker a job and allowing him to keep a small portion of the loot, according to NDTV.  PolyNetwork, a platform that allows users to move tokens between multiple blockchains,   show more ...

has been recently dispossessed of $610. The hacker stated that the assault was carried out to prevent the project from being shut down. Consequently, he committed to repaying the stolen cash and has already supplied approximately half of the total amount due.  After the attack, PolyNetwork raved about the hacker, whom the company referred to as Mr. White Hat, a term that refers to ethical hackers who identify vulnerabilities in computer networks and inform companies or organizations how to fix them. The identity... (read more)

image for Fake Cryptomining Ap ...

 Security

Several fake cloud-mining apps have been identified in Google Play Store that mostly focus on delivering expensive subscription services, according to Trend Micro. The applications address users new to cryptomining and were designed to get people to invest in cloud mining operations. The apps did not perform actual   show more ...

mining activities, but rather simulated mining activities by using a local  module, as it was clearly specified in an app's Terms of Use. Needless to say that some contained malware like FakeMinerAd and FakeMinerPay.  The following apps are currently banned from Google Play Store:  Ethereum (ETH) - Pool Mining Cloud  Bitcoin 2021  MineBit Pro – BTC Miner & Crypto Cloud Mining  C... (read more)

image for CISA Issues Ransomwa ...

 Security

Following a series of disruptive and headline-grabbing ransomware attacks on corporations in the United States over the past several months, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has released a list of suggestions to prevent and respond to these sorts of   show more ...

attacks.  The information sheet called Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches contains numerous recommendations. In addition, the paper advises companies not to pay a ransom if they are the target of a ransomware attack.  The fact sheet reads “Ransomware is a serious and increasing threat to all government and private sector organizations, including critical infrastructure organizations. In response, the U.S. government launched... (read more)

image for BadAllow Flaw Endang ...

 Security

Older versions of BlackBerry's QNX Real-Time Operating System (RTOS) are vulnerable to a significant vulnerability allowing threat actors to take complete control and damage a wide range of devices, including industrial equipment, medical equipment, and cars.  More than 195 million BlackBerry QNX-based vehicles   show more ...

and integrated systems are being used in a wide range of sectors worldwide, including aircraft, military, commercial vehicles, medical, cars, heavy machinery, industrial controls, rail, and robotics.  The vulnerability in question has the tracking identifier CVE-2021-22156 and a CVSS score of 9.0, according to BlackBerry. So far, we know it is part of BadAlloc, a broader collection of vulnerabilities first discovered by Microsoft in April, and can open a backdoor into affected devices, allowing attackers to disrupt normal operations or execute malicious comm... (read more)

image for Antiphishing measure ...

 Business

Security solutions for businesses are constantly improving, forcing cybercriminals to spend more time and money on breaking into corporate networks — and, increasingly, relying on social engineering. Exploiting the human factor and making use of readily available contact info (such as for HR and PR staff), crooks   show more ...

can extract login credentials from unsuspecting employees without having to worry about those ever-improving cybersecurity solutions. Unfortunately, there is no magic bullet to protect companies from phishing; the problem requires both organizational and technical measures. Here’s how to implement such protection in practice. Protect your mail server Browsers and some e-mail clients have their own security filters, but cybercriminals have many techniques to bypass them. Some, for example, use e-mail marketing services. Preventing phishing e-mails from reaching employees’ mailboxes at all is a strong starting point. Use a security solution at the mail gateway level such as Kaspersky Security for Mail Server, which not only checks links in incoming mail, but also detects threats in sent files. Protect Microsoft Office 365 services These days, instead of deploying their own mail servers, many companies use cloud services, primarily MS Office 365. Microsoft Office account data, which potentially gives attackers access to services such as OneDrive and SharePoint that may store confidential information and contact details, is a frequent and unsurprising target of phishing attacks.  Even if an employee knows in theory that they need to check messages carefully, they might still click a link or forward a message to colleagues if they’re in a hurry. Microsoft has its own, imperfect security technologies, which you can — and should — strengthen with additional layers of protection. For example, Kaspersky Security for Microsoft Office 365 prevents the spread of threats through Office services, guards against spam and phishing, and removes malicious attachments. Train employees Today’s cybercriminal bag of tricks includes malicious links hidden in e-mails, attached Trojans disguised as documents, misleading text messages and phone calls, and more. Phishing messages can even come from a hosting provider or a partner company if one of its employees’ accounts is compromised. Employees must be aware of these schemes and be able to spot suspicious e-mails. Staff cybersecurity awareness training can come from your own IT department or outside experts. Additionally, online tools such as Kaspersky Automated Security Awareness Platform help employees learn in a convenient, on-the-job format. Send test phishing e-mails Testing employees by sending them relevant phishing e-mails enables — or forces — employees to apply their knowledge in practice and prepare for real incidents. Testing also highlights people and areas in need of improvement. Provide contact info for someone who can help check suspicious e-mails After basic cybersecurity training, employees will be able to spot most phishing e-mails by noting visual cues such as unknown sender address, wrong company logo, and typos. In some cases, however, determining whether a message is safe may require the help of an expert. Include your company’s best contact for evaluating suspicious messages in the onboarding guide and prominently on the corporate portal. Protect workstations Even experienced and sharp-eyed employees make mistakes. Phishing links may appear in an employee’s personal e-mail or come in through a messaging app — channels your security systems do not control. Therefore, installing a security solution on every Internet-connected workstation is crucial. That way, even if a phishing link reaches the target and gets clicked, the redirect will be blocked. Protect mobile devices Employees use smartphones to view mail and financial documents, and they chat in messaging apps. Mobile devices have always posed a threat to corporate security, and do so even more in this era of mass remote work. To thwart phishing attacks on mobile devices, secure those devices as well, with Kaspersky Endpoint Security for Business, which protects both workstations and mobile phones. Stay ahead of criminals Phishers are forever coming up with new schemes, such that even the savviest pro might one day unwittingly hand over the keys to their mail or other account. With a few commonsense requirements, you can ensure cybercriminals get their hands on as little confidential information as possible. Enable two-factor authentication Turn on two-factor authentication for all online corporate services. With 2FA enabled, even if attackers discover the credentials for a corporate account or an e-mail password, they won’t be able to get in. Require unique passwords Instruct employees to use unique passwords for each work service or device. Then, even if phishers get one password, no other resources will be at risk. Adhere to the principle of least privilege If employees have access rights only to the servers, cloud storage, and other valuable assets that they truly need, cybercriminals will not be able to inflict too much damage, even if they gain control of a corporate account. Action plan By following these simple tips, you can protect your employees — and thus your business — from the phishing menace. In brief: Protect your mail server; Protect your Microsoft Office services; Train employees; Simulate phishing attacks to reinforce training; Give staff a way to contact someone who can help check suspicious e-mails; Protect workstations; Secure mobile devices; Enable two-factor authentication wherever possible; Use reliable security solutions.

 Threat Actors

InkySquid ensnared one of the top North Korea-focused news sites, the Daily NK, to launch a watering hole attack and infect visitors with malware. The group is abusing old vulnerabilities in IE and Microsoft Edge and using legitimate-looking code.

 Malware and Vulnerabilities

IISerpent is executed as a malicious extension for Internet Information Services (IIS) web servers. It uses dubious tactics to manipulate Search Engine Result Pages (SERPs).

 Trends, Reports, Analysis

The mysterious cybercriminal who stole more than $600 million in cryptocurrencies from Poly Network has been offered the role of Chief Security Advisor at the Chinese blockchain platform.

 Govt., Critical Infrastructure

As states look to modernize outdated systems used to process claims, cybersecurity is a key concern, said Matt Pincus, the director of government affairs at the National Association of State CIOs.

 Malware and Vulnerabilities

Microsoft decided to address this EoP bug, reaching out to Project Zero to let the researchers know that it had decided to work on the issue despite initially stating that it was “out of scope.”

 Feed

This Metasploit module exploits a vulnerability on Microsoft Exchange Server that allows an attacker to bypass the authentication, impersonate an arbitrary user, and write an arbitrary file to achieve remote code execution. By taking advantage of this vulnerability, you can execute arbitrary commands on the remote   show more ...

Microsoft Exchange Server. This vulnerability affects Exchange 2013 CU23 versions before 15.0.1497.15, Exchange 2016 CU19 versions before 15.1.2176.12, Exchange 2016 CU20 versions before 15.1.2242.5, Exchange 2019 CU8 versions before 15.2.792.13, and Exchange 2019 CU9 versions before 15.2.858.9.

 Feed

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

 Feed

A critical vulnerability in Cisco Small Business Routers will not be patched by the networking equipment giant, since the devices reached end-of-life in 2019. Tracked as CVE-2021-34730 (CVSS score: 9.8), the issue resides in the routers' Universal Plug-and-Play (UPnP) service, enabling an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart

 Feed

Mozi, a peer-to-peer (P2P) botnet known to target IoT devices, has gained new capabilities that allow it to achieve persistence on network gateways manufactured by Netgear, Huawei, and ZTE, according to new findings. "Network gateways are a particularly juicy target for adversaries because they are ideal as initial access points to corporate networks," researchers at Microsoft Security Threat

 Feed

A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme. "The sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then they would be paid $1 million in bitcoin, or 40% of the

 Feed

Web infrastructure and website security company Cloudflare on Thursday disclosed that it mitigated the largest ever volumetric distributed denial of service (DDoS) attack recorded to date. The attack, launched via a Mirai botnet, is said to have targeted an unnamed customer in the financial industry last month. "Within seconds, the botnet bombarded the Cloudflare edge with over 330 million

 Feed

ShadowPad, an infamous Windows backdoor that allows attackers to download further malicious modules or steal data, has been put to use by five different Chinese threat clusters since 2017. "The adoption of ShadowPad significantly reduces the costs of development and maintenance for threat actors," SentinelOne researchers Yi-Jhen Hsieh and Joey Chen said in a detailed overview of the malware,

2021-08
Aggregator history
Friday, August 20
SUN
MON
TUE
WED
THU
FRI
SAT
AugustSeptemberOctober