Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to work with fre ...

 Business

Working with freelancers has long become a routine for many managers. Even in a large organization, not all tasks can be solved within the team, not to mention small businesses, who usually cannot afford hiring an additional employee. But connecting an outsider to the digital workflow can introduce additional cyber   show more ...

risks, especially when you work with a person directly without an intermediary agency. Dangers in incoming e-mail You should start thinking about potential threats when searching for the right freelancer. It is unlikely that you will hire someone without looking at their portfolio. A freelancer can send you a document, an archive with set of works, or a link to a third-party site, and you probably will be forced to follow the link or open the file. But in fact, almost anything can be in that file or site. Researchers regularly discover vulnerabilities in browsers or office suites. More than once attackers have managed to seize control of corporate computers by inserting malicious scripts into a text document or by embedding an exploit pack in website code. But sometimes such tricks may not be necessary. Some employees are ready to click on a received file without looking at the extension and launch an executable. Keep in mind that an attacker can show an absolutely normal portfolio (not necessarily with their own works) and send a malicious file later as a result of a task. Furthermore, someone can take control of a freelancers computer or mailbox and use them to attack your company. After all, no one knows how their device or account is protected and your IT security has no control over what is happening there. You should not consider received files as trusted even if they came from a freelancer with whom you have been working for years. Countermeasures If you need to work with documents created outside of the company infrastructure, maintaining digital hygiene is of the utmost importance. All employees should be aware of the relevant cyberthreats, so it is worth to raise their level of security awareness. In addition, we can give some practical advice: Set strict rules for document exchange, inform freelancers, and do not open files if they do not comply with these rules. Self-extracting archive? No thanks. An archive with a password that is specified in the same letter? This may only be needed to bypass e-mail antimalware filters. Dedicate a separate computer, isolated from the rest of the network, or a virtual machine to work with files from external sources, or at least check them. This way you can significantly reduce any potential damage in the event of an infection. Be sure to equip this computer or virtual machine with the security solution to block the exploitation of vulnerabilities or clicking on a link to a malicious website. Access rights Lets assume that you found the needed external specialist. To collaborate on a project, freelancers often get access to the companys digital systems: file sharing platforms, project management systems, conferencing services, internal messengers, cloud services, and so on. Here you must avoid two mistakes — do not give the freelancer excessive rights and do not forget to revoke access after the work is completed. When it comes to granting rights, its best to follow the principle of least privilege. A freelancer should only have access to those resources that are needed for the current project. Unlimited access to file storage or even chat histories with can pose a threat. Do not underestimate the information stored even in auxiliary services. According to media reports, the Twitter hack of 2020 began when attackers got access into the organizations internal chat. There, using social engineering methods, they were able to convince a company employee to give them access to dozens of accounts. Revocation of rights after the end of the project is also not a formality. We are not saying that having completed the work, the freelancer will necessarily begin to hack your project management system. The very existence of an additional account with access to corporate data is not a good thing. What if the freelancer set a weak password or reused the password from their other accounts? In the event of a leak, theres an additional point of vulnerability in your corporate network. Countermeasures The most important thing is to delete or deactivate the freelancer account after the end of the employment relationship. Or at the very least, change the associated mail and password — this may be required in systems that delete all data associated with account. In addition, we recommend: Keeping a centralized record of who has access to which services. On the one hand, this will help you revoke all rights after the end of the project, and on the other hand, it can be useful when investigating an incident. Requiring contractors to maintain good digital hygiene and use security solutions (at least free ones) on the devices they use to connect to company resources. Enforcing two-factor authentication in all cloud systems wherever possible. Setting up a separate infrastructure for the freelancers and subcontractors projects and files, if possible. Scanning all files uploaded to the cloud storage or corporate server for malware.

 Companies to Watch

Foresite Cybersecurity, a cyber security innovator, today announced the acquisition of Cyber Lantern into its security monitoring, management, and assessment solutions portfolio.

 Malware and Vulnerabilities

Do you remember the Oski malware that suddenly disappeared in July 2020? Anyway, it is back in the form of Mars Stealer, which is a new and powerful version of Oski. As the name suggests, Mars Stealer steals information from all renowned web browsers, various cryptocurrency wallets and extensions, and 2FA plugins.

 Companies to Watch

The acquisition enhances Keeper Security's continued evolution in the identity and access cybersecurity space, particularly in enabling hyper-secure access to remote resources.

 Trends, Reports, Analysis

In the survey, involving 279 executives from US financial institutions, 26% of respondents ranked cybersecurity threats and 21% cited recruiting/retaining employees as their top issues in 2022.

 Govt., Critical Infrastructure

The new initiative is one in a string of many by the Biden administration to push public and private collaboration in addressing cyber threats such as Log4j vulnerabilities.

 Malware and Vulnerabilities

Morphisec identified a new sophisticated campaign using a phishing tactic with an HTML attachment to deliver AsyncRAT for around five months. Moreover, the malware campaign has one of the lowest detection rates, according to VirusTotal. This calls upon the organizations to regularly audit and upgrades their security posture to stay protected.

 Identity Theft, Fraud, Scams

Experts exposed Dark Herring subscription fraud campaign that infected 105 million devices worldwide via 500 malicious apps to steal hundreds of millions of dollars from unsuspecting users. The names of some malicious apps are Smashex, Upgradem, Stream HD, Vidly Vibe, and Cast It. This indicates that sometimes downloading apps from genuine stores does not guarantee the safety of users. 

 Trends, Reports, Analysis

In an industry that operates in anonymity, trust is everything -- but recent accusations of ransomware actors working with or being law enforcement is threatening that work model.

 Threat Intel & Info Sharing

Microsoft said today that a Russian hacking group known as Gamaredon has been behind a streak of spear-phishing emails targeting Ukrainian entities and organizations related to Ukrainian affairs since October 2021.

 Feed

CA Technologies is alerting customers to a vulnerability in CA Harvest Software Change Manager. A vulnerability exists that can allow a privileged user to perform CSV injection attacks and potentially execute arbitrary code or commands. Note that this vulnerability is specific to the Harvest Workbench and Eclipse   show more ...

Plugin interfaces. CA published solutions to address this vulnerability and recommends that all affected customers implement these solutions. The vulnerability occurs due to insufficient input validation. A privileged user can potentially execute arbitrary code or commands. Versions affected include 13.0.3, 13.0.4, 14.0.0, and 14.0.1.

 Feed

This Metasploit module exploits privilege escalation in Servisnet Tessa triggered by the add new sysadmin user flow with any user authorization. An API request to "/data-service/users/[userid]" with any low-authority user returns other users' information in response. The encrypted password information is included here, but privilege escalation is also possible with the active sessionid value.

 Feed

Ubuntu Security Notice 5264-1 - It was discovered that graphviz contains null pointer dereference vulnerabilities. Exploitation via a specially crafted input file can cause a denial of service. It was discovered that graphviz contains a buffer overflow vulnerability. Exploitation via a specially crafted input file can cause a denial of service or possibly allow for arbitrary code execution.

 Feed

Ubuntu Security Notice 5030-2 - USN-5030-1 addressed vulnerabilities in Perl DBI module. This update provides the corresponding updates for Ubuntu 16.04 ESM. It was discovered that the Perl DBI module incorrectly opened files outside of the folder specified in the data source name. A remote attacker could possibly use this issue to obtain sensitive information.

 Feed

Ubuntu Security Notice 5262-1 - The potential for an out of bounds write due to a missing bounds check was discovered to impact the sgdisk utility of GPT fdisk. Exploitation requires the use of a maliciously formatted storage device and could cause sgdisk to crash as well as possibly allow for local privilege escalation.

 Feed

Red Hat Security Advisory 2022-0438-02 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is an update for JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. All users of Red Hat JBoss   show more ...

Enterprise Application Platform 6.4 are advised to upgrade to this updated package. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

This Metasploit module exploits an MQTT credential disclosure vulnerability in Servisnet Tessa. The app.js is publicly available which acts as the backend of the application. By exposing a default value for the "Authorization" HTTP header, it is possible to make unauthenticated requests to some areas of the   show more ...

application. Even MQTT (Message Queuing Telemetry Transport) protocol connection information can be obtained with this method. A new admin user can be added to the database with this header obtained in the source code. The module tries to log in to the MQTT service with the credentials it has obtained and reflects the response it receives from the service.

 Feed

Red Hat Security Advisory 2022-0435-03 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0439-02 - Log4j is a tool to help the programmer output log statements to a variety of output targets. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0437-03 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is an update for JBoss Enterprise Application Platform 6.4. All users of Red Hat JBoss Enterprise Application Platform 6.4 are   show more ...

advised to upgrade to this updated package. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

This Metasploit module exploits an authentication bypass in Servisnet Tessa, triggered by add new sysadmin user. The app.js is publicly available which acts as the backend of the application. By exposing a default value for the "Authorization" HTTP header, it is possible to make unauthenticated requests to   show more ...

some areas of the application. Even MQTT (Message Queuing Telemetry Transport) protocol connection information can be obtained with this method. A new admin user can be added to the database with this header obtained in the source code.

 Feed

Red Hat Security Advisory 2022-0434-05 - This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Issues addressed include a memory exhaustion vulnerability.

 Feed

Red Hat Security Advisory 2022-0436-03 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0421-02 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

 Feed

Red Hat Security Advisory 2022-0422-02 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

 Feed

Red Hat Security Advisory 2022-0431-06 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes a bug fixes, security patches and new feature enhancements.

 Feed

Red Hat Security Advisory 2022-0430-03 - Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 7.3.9 replaces Data Grid 7.3.8 and   show more ...

includes bug fixes and enhancements. Find out more about Data Grid 7.3.8 in the Release Notes [3]. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0420-02 - Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday published an Industrial Controls Systems Advisory (ICSA) warning of multiple vulnerabilities in the Airspan Networks Mimosa equipment that could be abused to gain remote code execution, create a denial-of-service (DoS) condition, and obtain sensitive information. "Successful exploitation of these vulnerabilities could

 Feed

A threat actor, likely Chinese in origin, is actively attempting to exploit a zero-day vulnerability in the Zimbra open-source email platform as part of spear-phishing campaigns that commenced in December 2021. The espionage operation — codenamed "EmailThief" — was detailed by cybersecurity company Volexity in a technical report published Thursday, noting that successful exploitation of the

 Feed

A number of India-based call centers and their directors have been indicted for their alleged role in placing tens of millions of scam calls aimed at defrauding thousands of American consumers. The indictment charged Manu Chawla, Sushil Sachdeva, Nitin Kumar Wadwani, Swarndeep Singh, Dinesh Manohar Sachdev, Gaje Singh Rathore, Sanket Modi, Rajiv Solanki and their respective call centers for

 Feed

The Russia-linked Gamaredon hacking group attempted to compromise an unnamed Western government entity operating in Ukraine last month amidst ongoing geopolitical tensions between the two countries. Palo Alto Networks' Unit 42 threat intelligence team, in a new report publicized on February 3, said that the phishing attack took place on January 19, adding it "mapped out three large clusters of

 Feed

Most security practitioners are now aware of the Log4Shell vulnerability discovered toward the end of 2021. No one knows how long the vulnerability existed before it was discovered. The past couple of months have had security teams scrambling to patch the Log4Shell vulnerability found in Apache Log4j, a Java library widely used to log error messages in applications. Beyond patching, it's helpful

 Feed

A now-patched security vulnerability in Apple iOS that was previously found to be exploited by Israeli company NSO Group was also separately weaponized by a different surveillance vendor named QuaDream to hack into the company's devices. The development was reported by Reuters, citing unnamed sources, noting that "the two rival businesses gained the same ability last year to remotely break into

2022-02
Aggregator history
Friday, February 04
TUE
WED
THU
FRI
SAT
SUN
MON
FebruaryMarchApril