Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to protect teens ...

 Tips

We recently observed World Mental Health Day, an international holiday that highlights the importance of mental health in an effort to bring about positive change. Adolescents’ mental health deserves extra attention in our era of social media, about which questions have been raised over psychological addiction   show more ...

and other problems. Social media anxiety A recent Facebook study found that Instagram can harm the psyche of teens, especially girls. Thirty-two percent of teenage girls said that when they felt bad, Instagram made them feel even worse. Among the frequently cited causes of stress were unrealistic standards of beauty and feelings of inadequacy about their standard of living compared to those shown on the screen. Instagram is trying to deal with some of these problems by introducing various functions to do things like hiding the likes counter or prohibiting filters that demonstrate unrealistic beauty standards. There are also simple steps users can take: Unsubscribe from accounts that make you feel sad, inadequate, unconfident or upset. Try to reduce the amount of time you spend online. Take small breaks and digitally detox to escape from social networks, relax and focus on yourself. Kaspersky has launched a digital CyberSpa space, to help you do this. Cyberbullying Cyberbullying is another well-known issue that can affect a teen’s mental health. Whenever it happens, it should not be tolerated or ignored. If a teen is being bullied online, the first step is to seek help from parents or other trusted adults like a school counselor, sports coach or teacher. If the victim is uncomfortable telling friends about the problem, they can contact a helpline and talk to a professional consultant. Today, social networks, including Instagram, actively use AI to combat abusive comments under pictures and videos. Each social platform also has tools to customize who can comment on or view your posts, as well as to block users and report cases of bullying or intimidation. It can also sometimes be useful to collect evidence in the form of screenshots to confirm what is happening. Facebook Facebook has developed an Anti-Bullying Center for Teens. To fight against bullying on Facebook you can: Track who tags you on their content. This can be done in the Chronicle & Tags settings. Check already published materials with your tags, and, if necessary, remove them from materials you do not want to be associated with, using the Activity Log. Remove the aggressors from your friends list so that they will not have the opportunity to contact you. And if deleting them does not help, you can block users. Remember they will not be notified of this. Blocking will prevent abusers from finding your profile and tagging your content. In addition, they will not be able to add you as a friend and track your actions. Be sure to report offending materials to the support service. You can complain about content next to a post, photo or comment — this will draw the attention of Facebook moderators. Instagram Instagram tracks the content posted by users. If the platform sees possible violations, it will notify the user that they are about to publish information that crosses the boundaries. Others steps Instagram users can take include: Use a restrictive tool to protect your account without notifying the dangerous users. Moderate comments under your posts. Change the privacy setting on your account to choose who can watch and comment on your content. Twitter Twitter also has an Online Bullying help center offering help and advice. Here are steps Twitter users can take to fight bullying: Use Twitter’s expanded notification filters. These allow you to filter the accounts from which you receive notifications. For example, you may not receive notifications from users without a profile picture. Twitter has a mute and notification option that you can customize to suit your needs. For instance, you can turn off notifications for keywords or entire phrases. You can turn off notifications for a day, a month, or indefinitely. One effective step is also the option to block users. This will prevent blocked accounts from posting, seeing your tweets, and reading your feed. If you are a victim of bullying, you should also report offending content. This will allow Twitter to act and block the user or content. TikTok TikTok is also creating various tools that allow users to limit unwanted attention. The company has produced a guide that helps to identify bullying behavior and take measures against it. Here are some features teens can use: Configure video privacy settings on a personal account, to choose who can view each video and restrict the upload of personal videos. The unwanted comments filter allows you to create a list of unwanted keywords that will be blocked in the comments on videos or during live broadcasts to protect users from bullying. User filter allows you to choose who can add the Duet to a user video. Blocking users makes it possible to block bullies who violate the community rules and notify the platform about their actions. Family settings keep teens safe and support them in their creative endeavors without breaking personal boundaries. In its relatively short history, we’ve learned that social media may not always be beneficial for our mental health, even while it has other benefits. But by taking advantage of some of the tools at our disposal we can take matters into our own hands and help guide teens on a healthier path.

 Govt., Critical Infrastructure

According to the MoJ, the working group will publish a final report listing proposals for combatting online fraud. The group is also due to meet with the National Data Protection Authority.

 Malware and Vulnerabilities

CrowdStrike discovered multiple vulnerabilities affecting libvncclient. In some widely used desktop environments, such as GNOME, these vulnerabilities can be triggered in a one-click fashion.

 Security Culture

CyberVetsUSA exists as a public-private partnership between non-profit and Veteran Service Organizations (VSOs), tech employers, institutions of higher education, and local government agencies.

 Malware and Vulnerabilities

Whether it’s using the file to hide malware, redirect search engines to other sites with blackhat SEO tactics, hide backdoors, inject content, modify php.ini values; the possibilities are endless.

 Threat Actors

A connection was established between the TrickBot gang and the TA551 threat group as a major similarity was found in their tools and TTPs. They use Bazabackdoor and deploy the Cobalt Strike beacon on the compromised system and add scheduled tasks for persistence. The recent collaborations prove how effectively groups can really operate as a team.

 Malware and Vulnerabilities

According to researchers from Kaspersky, in the first seven months of 2021, the number of users affected by the QBot, which was first discovered in 2007, jumped to 65% compared to the previous year.

 Threat Actors

The infamous North Korea state-sponsored Lazarus APT was recently found targeting IT supply chains. Now, the group has been discovered attempting to hack security researchers again.

 Trends, Reports, Analysis

DDoS attacks started being used as an intimidation tactic in Q3. The criminals sent company-wide emails stating that their resources were being used in DDoS attacks and they could face legal consequences.

 Malware and Vulnerabilities

QAKBOT is a prevalent information-stealing malware that was first discovered in 2007. In recent years, its detection has become a precursor to many critical and widespread ransomware attacks.

 Feed

Ubuntu Security Notice 5145-1 - Jacob Champion discovered that PostgreSQL incorrectly handled SSL certificate verification and encryption. A remote attacker could possibly use this issue to inject arbitrary SQL queries when a connection is first established.

 Feed

This Metasploit module exploits local file inclusion and log poisoning vulnerabilities (CVE-2020-16152) in Aerohive NetConfig, version 10.0r8a build-242466 and older in order to achieve unauthenticated remote code execution as the root user. NetConfig is the Aerohive/Extreme Networks HiveOS administrative webinterface.   show more ...

Vulnerable versions allow for LFI because they rely on a version of PHP 5 that is vulnerable to string truncation attacks. This module leverages this issue in conjunction with log poisoning to gain remote code execution as root. Upon successful exploitation, the Aerohive NetConfig application will hang for as long as the spawned shell remains open. Closing the session should render the application responsive again. The module provides an automatic cleanup option to clean the log. However, this option is disabled by default because any modifications to the /tmp/messages log, even via sed, may render the target (temporarily) unexploitable. This state can last over an hour. This module has been successfully tested against Aerohive NetConfig versions 8.2r4 and 10.0r7a.

 Feed

Red Hat Security Advisory 2021-4531-01 - The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. This release of the Red Hat build of OpenJDK 17 for Windows serves as the initial Windows release of OpenJDK 17. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2021-4532-01 - The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. This release of the Red Hat build of OpenJDK 17 for portable Linux serves as the initial portable Linux release of OpenJDK 17. For further information, refer to the release notes linked to in the References section.

 Feed

Ubuntu Security Notice 5144-1 - It was discovered that OpenEXR incorrectly handled certain EXR image files. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

 Feed

Jann Horn discovered that the tty subsystem of the Linux kernel did not use consistent locking in some situations, leading to a read-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). De4dCr0w of 360 Alpha Lab   show more ...

discovered that the BPF verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker could use this to expose sensitive information (kernel memory) or possibly execute arbitrary code. Various other vulnerabilities were also addressed.

 Feed

Red Hat Security Advisory 2021-4618-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private   show more ...

cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, out of bounds read, and path sanitization vulnerabilities.

 Feed

Red Hat Security Advisory 2021-4621-01 - FreeRDP is a free implementation of the Remote Desktop Protocol, released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

 Feed

Researchers from Qihoo 360's Netlab security team have released details of a new evolving botnet called "Abcbot" that has been observed in the wild with worm-like propagation features to infect Linux systems and launch distributed denial-of-service (DDoS) attacks against targets. While the earliest version of the botnet dates back to July 2021, new variants observed as recently as October 30

 Feed

Google researchers on Thursday disclosed that it found a watering hole attack in late August exploiting a now-parched zero-day in macOS operating system and targeting Hong Kong websites related to a media outlet and a prominent pro-democracy labor and political group to deliver a never-before-seen backdoor on compromised machines. "Based on our findings, we believe this threat actor to be a

 Feed

Threat actors are increasingly banking on the technique of HTML smuggling in phishing campaigns as a means to gain initial access and deploy an array of threats, including banking malware, remote administration trojans (RATs), and ransomware payloads. Microsoft 365 Defender Threat Intelligence Team, in a new report published Thursday, disclosed that it identified infiltrations distributing the 

2021-11
Aggregator history
Friday, November 12
MON
TUE
WED
THU
FRI
SAT
SUN
NovemberDecemberJanuary