Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Cyberincidents in ai ...

 Business

Protecting airport information systems from cyberincidents is no trivial task. Even a relatively minor glitch can lead to chaos, flight delays, and lawsuits from disgruntled passengers. As a good illustration of the phenomenon, the 2016 Delta Airlines computer system crash caused trouble for hundreds of thousands of   show more ...

people around the world. Facing massive expenses and operational dysfunction, airport administration scrambles to prevent chaos following an attack. It’s no wonder that airports represent such attractive targets for ransomware attacks. Another reason airports draw criminal attention is passenger information: Airport systems usually hold not only travel document data, but also payment information. And that’s an issue not only for customers, but for the airport itself; modern data protection laws give no quarter to organizations that are lax on data protection. For example, Heathrow Airport was fined £120,000 for the loss of a flash drive containing operating information, including the details of several security service employees. Famous airport cyberincidents You don’t have to look far to find examples of destructive cyberincidents affecting air transportation. In the summer of 2017, during the ExPetr (aka NotPetya/PetrWrap) global pandemic, the website and online departure board at Kiev’s Boryspil International Airport were taken down, causing a number of flights to be postponed; Another ransomware attack targeted Hartsfield-Jackson Atlanta International Airport. In March 2018, it was forced to disable parts of its website and advise passengers to check information directly with their airlines. The airport also had to turn off its Wi-Fi network to confine the infection, further inconveniencing passengers; During Christmas 2019, Albany International Airport experienced a ransomware attack. This time, the attack did not affect operations at the airport itself, nor, it seems, did any passenger data suffer — the cybercriminals encrypted internal documentation only (including backups). All the same, the administration agreed to the attackers’ demands and paid the ransom; In April 2020, unknown persons compromised two San Francisco International Airport websites and injected them with malicious code for stealing user credentials. The attackers’ goals were unclear (as was their degree of success), but airport employees were required to reset their mail and network passwords. How to protect airports from cyberattacks A modern airport is a gigantic structure brimming with information systems. More often than not, critical systems are isolated from office and public networks, but attackers do not need to attack critical infrastructure to wreak havoc. The functioning of airlines, as well as numerous marketplaces and services, depends on the normal operation of simpler IT systems. To protect all of that infrastructure, airport cybersecurity teams need real-time intelligence on the latest cyberthreats. To that end, Germany’s Munich Airport, which takes cybersecurity very seriously, contacted us recently. The airport authorities subscribed to Kaspersky Advanced Persistent Threat Intelligence Reporting service, which gives access to our investigative data and provides information about the methods, tactics, and tools modern cybercriminals employ, as well as indicators of compromise. In addition, the Munich team acquired access to our Threat Lookup service to get detailed data on detected threats, as well as to Kaspersky Threat Data Feeds, which can be connected to automated protection systems. Read more here about how we’re helping Munich Airport fight cyberthreats.

 Trends, Reports, Analysis

Security researchers compiled a list of flaws that have been abused by ransomware groups and their partners in previous and active attacks. Most of these listed vulnerabilities were leveraged by criminals to gain initial access to the victims' networks. While the list can help in the prevention of threats related   show more ...

to yet-unpatched flaws, do adhere to intel shared by national cybersecurity authorities for further defensive measures.

 Trends, Reports, Analysis

Symantec said it "observed" attempts by threat actors to install "legitimate remote control software" and tools on the targeted networks of several U.S. sectors, including energy and healthcare.

 Malware and Vulnerabilities

Multiple updates have happened since the start of the quarter, most notable among them being the addition of new “crypters.” Other updates include support for stealing several cryptocurrency wallets.

 Breaches and Incidents

Two ColdFusion 9 bugs patched by Adobe more than a decade ago are under active exploitation by threat actors. Criminals tried to drop Cringe ransomware on the target networks. The attacks originated from an internet address given to Green Floid (a Ukrainian ISP). Lest we forget, the first defense is always updating software and device firmware.

 Breaches and Incidents

An attacker to swindle $3 million in cryptocurrency from SushiSwap's MISO cryptocurrency platform by infecting Sushi’s private GitHub repository. The stolen amount was being transferred by an automobile company on MISO’s auction portal. Organizations must take utmost precaution to avoid DevSevOps incidents.

 Trends, Reports, Analysis

As per a study by Netskope, most (66.4%) of malware instances in Q2 2021 started with cloud storage apps. They were followed by collaboration apps and development tools at 8.5% and 7.8%, respectively.

 Feed

Red Hat Security Advisory 2021-3660-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2021-3658-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2021-3656-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and   show more ...

includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

 Feed

Apple on Thursday released security updates to fix multiple security vulnerabilities in older versions of iOS and macOS that it says have been detected in exploits in the wild, in addition to expanding patches for a previously plugged security weakness abused by NSO Group's Pegasus surveillance tool to target iPhone users. <!--adsense--> Chief among them is CVE-2021-30869, a type confusion flaw

 Feed

Networking equipment maker Cisco Systems has rolled out patches to address three critical security vulnerabilities in its IOS XE network operating system that remote attackers could potentially abuse to execute arbitrary code with administrative privileges and trigger a denial-of-service (DoS) condition on vulnerable devices. The list of three flaws is as follows - CVE-2021-34770 (CVSS score:

 Feed

A new as-yet unpatched weakness in Apple's iCloud Private Relay feature could be circumvented to leak users' true IP addresses from iOS devices running the latest version of the operating system. Introduced with iOS 15, which was officially released this week, iCloud Private Relay aims to improve anonymity on the web by employing a dual-hop architecture that effectively shields users' IP address

 Feed

Cybersecurity researchers have disclosed a novel technique adopted by threat actors to deliberately evade detection with the help of malformed digital signatures of its malware payloads. "Attackers created malformed code signatures that are treated as valid by Windows but are not able to be decoded or checked by OpenSSL code — which is used in a number of security scanning products," Google

2021-09
Aggregator history
Friday, September 24
WED
THU
FRI
SAT
SUN
MON
TUE
SeptemberOctoberNovember