Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What to do if antivi ...

 Products

The purpose of any security solution is to protect the system and inform users about threats. But what if your antivirus utility flags a harmless program as malware, or sounds the alarm during scanning, seemingly for no reason? There’s a name for that: false positive. As independent tests show, our solutions   show more ...

rarely cry wolf, but sometimes caution does prevail. If that happens to you, don’t disable protection — it’ll only put your computer at risk. Instead, designate the app as trusted or add it to the exclusions list. If you’re using a Kaspersky solution for home users, here’s what you should know. What’s the difference between trusted applications and adding programs to the exclusions list We want our programs to be easy to use. Therefore, the process for configuring exclusions is the same across our most popular solutions — Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud. But before proceeding to our detailed guide, let’s shed some light on what it is you are about to do. Modern security solutions employ a comprehensive approach to protection, not only checking for malicious items in program code by scanning programs before they run, but also monitoring installed programs for suspicious activity. The reason for such additional checks is that cybercriminals, trying to bypass protection, sometimes begin an attack with otherwise completely harmless apps that later download more dangerous programs onto victims’ computers. Some also create malware that lies low in the system for a long time before wreaking havoc. That’s why our developers separated the settings into two categories: To prevent the antivirus app from blocking a program when you’re trying to run it, make the blocked program a trusted application; To stop the antivirus app from flagging a program during a regular scan, add it as an exclusion. Now, here’s a detailed look at how and where to configure both options in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud. What to do if the antivirus app blocks a program As a rule, antivirus apps prevent other programs from starting if they see potentially dangerous behavior. If you’re completely sure an app is safe, use exclusions settings to add it to the trusted list: Open Kaspersky Internet Security’s (or Kaspersky Security Cloud’s) settings; Select Threats and Exclusions; Scroll down and click Specify trusted applications; The Trusted applications settings in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud Specify the path to the program you want to run; Selecting a trusted application Select which program actions the security solution should ignore. The general rule here is simple: the fewer the check marks, the better. We recommend experimenting with enabling and disabling the following three: Do not scan files before opening, Do not monitor application activity, Do not scan encrypted traffic. Well-behaved applications don’t need to interact with the solution interface, so don’t allow it. Permissible options when adding exclusions What to do if the antivirus app flags a program during a scan If a program prompts questions from the antivirus during scanning, or you added it to the trusted list but that didn’t help, you can try creating a scan exclusion. Here’s how to do that: Open Kaspersky Internet Security’s (or Kaspersky Security Cloud’s) settings; Select Threats and Exclusions; Scroll down and click Manage exclusions; Exclusion settings in Kaspersky Internet Security, Kaspersky Total Security, and Kaspersky Security Cloud In the window that opens, click Add; Adding a new exclusion Click Browse…; Select the file you want to add as an exclusion; Choosing the path to the exclusion file and selecting components to ignore Select the components you want ignored during scanning. Start by checking Scan and File Anti-Virus. If that doesn’t help, experiment with the other checkboxes, but don’t select all of them at once. Conclusion Now you know how to customize your antivirus utility so it won’t interfere with your work, but keep in mind that its purpose is to protect your computer. Don’t go wild and overuse the exclusions list or you might let a genuine threat slip through.

image for Does Your Organizati ...

 Security Tools

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being   show more ...

sold in the cybercrime underground. In a bid to minimize these scenarios, a growing number of major companies are adopting “Security.txt,” a proposed new Internet standard that helps organizations describe their vulnerability disclosure practices and preferences. An example of a security.txt file. Image: Securitytxt.org. The idea behind Security.txt is straightforward: The organization places a file called security.txt in a predictable place — such as example.com/security.txt, or example.com/.well-known/security.txt. What’s in the security.txt file varies somewhat, but most include links to information about the entity’s vulnerability disclosure policies and a contact email address. The security.txt file made available by USAA, for example, includes links to its bug bounty program; an email address for disclosing security related matters; its public encryption key and vulnerability disclosure policy; and even a link to a page where USAA thanks researchers who have reported important cybersecurity issues. Other security.txt disclosures are less verbose, as in the case of HCA Healthcare, which lists a contact email address, and a link to HCA’s “responsible disclosure” policies. Like USAA and many other organizations that have published security.txt files, HCA Healthcare also includes a link to information about IT security job openings at the company. Having a security.txt file can make it easier for organizations to respond to active security threats. For example, just this morning a trusted source forwarded me the VPN credentials for a major clothing retailer. Finding no security.txt file at the retailer’s site using gotsecuritytxt.com (which checks a domain for the presence of this contact file), KrebsonSecurity sent an alert to its “security@” email address for the retailer’s domain. Many organizations have long unofficially used (if not advertised) the email address security@[companydomain] to accept reports about security incidents or vulnerabilities. Perhaps this particular retailer also did so at one point, however my message was returned with a note saying the email had been blocked. KrebsOnSecurity also sent a message to the retailer’s chief information officer (CIO) — the only person in a C-level position at the retailer who was in my immediate LinkedIn network. I still have no idea if anyone has read it. Although security.txt is not yet an official Internet standard as approved by the Internet Engineering Task Force (IETF), its basic principles have so far been adopted by at least eight percent of the Fortune 100 companies. According to a review of the domain names for the latest Fortune 100 firms via gotsecuritytxt.com, those include Alphabet, Amazon, Facebook, HCA Healthcare, Kroger, Procter & Gamble, USAA and Walmart. There may be another good reason for consolidating security contact and vulnerability reporting information in one, predictable place. Alex Holden, founder of the Milwaukee-based consulting firm Hold Security, said it’s not uncommon for malicious hackers to experience problems getting the attention of the proper people within the very same organization they have just hacked. “In cases of ransom, the bad guys try to contact the company with their demands,” Holden said. “You have no idea how often their messages get caught in filters, get deleted, blocked or ignored.” GET READY TO BE DELUGED So if security.txt is so great, why haven’t more organizations adopted it yet? It seems that setting up a security.txt file tends to invite a rather high volume of spam. Most of these junk emails come from self-appointed penetration testers who — without any invitation to do so — run automated vulnerability discovery tools and then submit the resulting reports in hopes of securing a consulting engagement or a bug bounty fee. This dynamic was a major topic of discussion in these Hacker News threads on security.txt, wherein a number of readers related their experience of being so flooded with low-quality vulnerability scan reports that it became difficult to spot the reports truly worth pursuing further. Edwin “EdOverflow” Foudil, the co-author of the proposed notification standard, acknowledged that junk reports are a major downside for organizations that offer up a security.txt file. “This is actually stated in the specification itself, and it’s incredibly important to highlight that organizations that implement this are going to get flooded,” Foudil told KrebsOnSecurity. “One reason bug bounty programs succeed is that they are basically a glorified spam filter. But regardless of what approach you use, you’re going to get inundated with these crappy, sub-par reports.” Often these sub-par vulnerability reports come from individuals who have scanned the entire Internet for one or two security vulnerabilities, and then attempted to contact all vulnerable organizations at once in some semi-automated fashion. Happily, Foudil said, many of these nuisance reports can be ignored or grouped by creating filters that look for messages containing keywords commonly found in automated vulnerability scans. Foudil said despite the spam challenges, he’s heard tremendous feedback from a number of universities that have implemented security.txt. “It’s been an incredible success with universities, which tend to have lots of older, legacy systems,” he said. “In that context, we’ve seen a ton of valuable reports.” Foudil says he’s delighted that eight of the Fortune 100 firms have already implemented security.txt, even though it has not yet been approved as an IETF standard. When and if security.txt is approved, he hopes to spend more time promoting its benefits. “I’m not trying to make money off this thing, which came about after chatting with quite a few people at DEFCON [the annual security conference in Las Vegas] who were struggling to report security issues to vendors,” Foudil said. “The main reason I don’t go out of my way to promote it now is because it’s not yet an official standard.” Has your organization considered or implemented security.txt? Why or why not? Sound off in the comments below.

 Trends, Reports, Analysis

Telegram has exploded as a hub for cybercriminals looking to buy, sell, and share stolen data and hacking tools, new research shows, as the messaging app emerges as an alternative to the dark web.

 Trends, Reports, Analysis

The U.S. Department of Transportation (USDOT) was impersonated in a phishing campaign that went on for two days. The campaign leveraged a variety of tactics to evade detection. IT systems at South Africa’s Department of Justice were encrypted by a ransomware attack. The attack encrypted all information systems and rendered them unavailable internally as well as to the public.

 Trends, Reports, Analysis

Long-term cyberespionage operations and covert information heists are two characteristics often associated with China-backed threat actors. Experts believe that the threat actor is linked to Beijing.

 Threat Actors

In one of its first acts, Groove publicly leaked a set of nearly 500,000 VPN credentials on a new hacker forum named RAMP. The credentials were associated with some 87,000 Fortinet FortiGate SSL-VPN devices.

 Incident Response, Learnings

“Beginning in 2012, Fahd, 35, conspired with others to recruit AT&T employees at a call centre located in Bothell, Washington, to unlock large numbers of cellular phones for profit,” said the DOJ.

 Trends, Reports, Analysis

A recent study claims that an unnoticed threat—dangling DNS records—could be easily used for domain hijacking. According to the study, there are multiple types of dangling DNS records and several techniques to exploit them.

 Malware and Vulnerabilities

Researchers highlighted a new phishing email campaign, involving a new Dridex variant, that uses a specially crafted Excel document as an attachment. The Excel document in the email contains a message at the top of the document in bold letters urging them to enable macros. Victims opening attachments despite threat warning shows organizations’ lethargic approach toward security and a lack of employee training.

 Malware and Vulnerabilities

Apple has released a security patch update for its range of devices in the wake of a vulnerability exploited by invasive spyware built by NSO Group. The first flaw, tracked as CVE-2021-30860, which is an integer overflow discovered by Citizen Lab. The second flaw (CVE-2021-30858) is a use-after-free bug that was disclosed by an anonymous researcher.

 Feed

Red Hat Security Advisory 2021-3559-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability.

 Feed

BSides SF is soliciting papers and presentations for the 2022 annual BSidesSF conference. It will be located at City View at the Metreon in downtown San Francisco February 5th through the 6th, 2022.

 Feed

ZeroPeril Ltd has discovered two issues inside the amdpsp.sys (v4.13.0.0) kernel driver module that ships with the AMD Chipset Drivers package for multiple AMD chipsets. The first issue is an information disclosure type security vulnerability and the second is a memory leak type bug due to insufficient releasing of   show more ...

all associated allocated resources upon request. The researchers have verified both in the latest Revision Number (2.13.27.501) of the package that was released the 4th of February 2021.

 Feed

Google on Friday said it's bringing an Android 11 feature that auto-resets permissions granted to apps that haven't been used in months, to devices running Android versions 6 and above. The expansion is expected to go live later this year in December 2021 and enabled on Android phones with Google Play services running Android 6.0 (API level 23) or higher, which the company said should cover "

 Feed

A newly spotted banking trojan has been caught leveraging legitimate platforms like YouTube and Pastebin to store its encrypted, remote configuration and commandeer infected Windows systems, making it the latest to join the long list of malware targeting Latin America (LATAM) after Guildma, Javali, Melcoz, Grandoreiro, Mekotio, Casbaneiro, Amavaldo, Vadokrist, and Janeleiro. The threat actor

 Feed

Law enforcement agencies in Italy and Spain have dismantled an organized crime group linked to the Italian Mafia that was involved in online fraud, money laundering, drug trafficking, and property crime, netting the gang about €10 million ($11.7 million) in illegal proceeds in just a year. "The suspects defrauded hundreds of victims through phishing attacks and other types of online fraud such

 Feed

A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity remote access trojans (RATs) and geolocation filtering to avoid detection, according to new research. Cybersecurity firm Trend Micro attributed the attacks to an advanced persistent threat (APT) tracked as APT-C-36 (aka Blind Eagle), a suspected

 Application Security

Enterprises that integrate security testing into their CI/CD pipeline fix 91.4 percent of new issues, according to a progress report from ShiftLeft. Recent software supply chain attacks illustrate the growing risks businesses, their partners, and customers face. But a recent report suggests better outcomes for   show more ...

those who put security at the heart of app development. Data from […] The post Building a More Secure AppDev Process appeared first on Security Weekly.

2021-09
Aggregator history
Monday, September 20
WED
THU
FRI
SAT
SUN
MON
TUE
SeptemberOctoberNovember