Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

For the 238th episode of the Transatlantic Cable, Dave, Jeff and Ahmed peruse some of the more interesting cyber-related stories of the week. They start by looking at a light-hearted story around Facebooks metaverse, weddings and Covid. From there, they focus on two cryptocurrency stories. The first one looks at a   show more ...

notorious influencer who allegedly scammed his followers out of $500,000 via a rug-pull, and now wont return the funds. The second story is perhaps a little more light-hearted as it looks at recent research that suggests having crypto or NFT in your dating profile gives you the edge in the dating scene – call me sceptical on this one. The last two stories look at North Korea. The first is an interview with an alleged hacker who says they took down North Koreas internet (all of it); and the second, from the BBC, looks at a UN report suggesting the Democratic Peoples Republic of Korea (DPRK) is using stolen crypto to fund their nuclear missile program. If you like what you heard, please consider subscribing! My big fat digital wedding: Couple plan Indias first metaverse marriage Notorious YouTube Streamer Stole $500,000 From Fans In Crypto Scheme Owning cryptocurrency may make you more desirable on the dating scene One American Hacker Suddenly Took Down North Koreas Internet North Korea: Missile programme funded through stolen crypto

image for Update iOS! There is ...

 Threats

Apple has released an urgent update for iOS and iPadOS that fixes the CVE-2022-22620 vulnerability. They recommend updating devices as soon as possible, as the company have reason to believe that the vulnerability is already being actively exploited by unknown actors. Why vulnerability CVE-2022-22620 is dangerous As   show more ...

usual, Apple experts do not disclose the details of the vulnerability until the investigation is completed, and the majority of users have the patches installed. At the moment, they only say that the vulnerability belongs to the Use-After-Free (UAF) class, therefore it is related to incorrect use of dynamic memory in applications. Its exploitation allows the attacker to create malicious web content, the processing of which can lead to arbitrary code execution on the victims device. Simply put, the most likely attack scenario is an infection of an iPhone or iPad device after visiting a malicious web page. Which devices and apps are vulnerable to CVE-2022-22620 exploitation Judging by the description of the bug, the vulnerability was found in the WebKit engine used in many applications for macOS, iOS and Linux. In particular, all browsers for iOS and iPadOS are based on this open source engine — that is, not only iPhones default Safari, but also Google Chrome, Mozilla Firefox and any others. So even if you do not use Safari, this vulnerability still affects you directly. Apple released updates for iPhones 6s and newer; all models of iPad Pro, iPad Air version 2 and newer, iPad starting with the 5th generation, iPad mini starting with 4th generation, and iPod touch media player starting with the 7th generation. How to stay safe The patches that Apple released on February 10 changes memory management mechanisms and thus prevents exploitation of CVE-2022-22620. So in order to protect your device, it should be enough to install iOS 15.3.1 and iPadOS 15.3.1 updates. Your device needs to be connected to a Wi-Fi network to install the patch. If your device does not yet show a notification that the update is ready for installation, you can force your system into updating a little bit quicker: go to the system settings yourself (Settings -> General -> Software update) and check the availability of software updates. In order to get alerts about the latest cyberthreats directly related to your devices and apps, we recommend using the Kaspersky Security Cloud, available for Windows, macOS, Android and iOS operating systems. When a new vulnerability in the software you use, or a data leak on the website you visit is discovered, you will get a notification with advice on how to protect yourself.

 Breaches and Incidents

The online student portal was down for 17 days, and Ohlone College’s phone and email systems were knocked offline for 10 days. A separate student information system was also impacted.

 Expert Blogs and Opinion

No one outside the IT department cares about the vulnerability metrics, or they shouldn’t, anyway. They care more about the efficacy of the program. And traditional stats don’t show that.

 Trends, Reports, Analysis

During an attack on Texan cities, the decision not to pay ransom had a surprising knock-on effect: it forced a notorious ransomware gang, the Russia-based REvil, to rethink how it did business.

 Threat Actors

Researchers from Proofpoint spotted a new phishing campaign that targeted multiple Middle Eastern governments, foreign-policy think tanks, and a state-affiliated airline, with the new NimbleMamba trojan. NimbleMamba is believed to share some similarities with Molerats’ previous executable LastConn that was first reported in June 2021.

 Security Culture

Cybersecurity training and certification provider SANS Institute is partnering with Historically Black Colleges and Universities to launch a new nationwide cybersecurity education scholarship program.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the   show more ...

broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

 Feed

Red Hat Security Advisory 2022-0507-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as   show more ...

multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. This Service Pack release of Red Hat JBoss Data Virtualization 6.4.8.SP2 serves as a replacement for Red Hat JBoss Data Virtualization 6.4.8 and Red Hat JBoss Data Virtualization 6.4.8.SP1, and mitigates the impact of the log4j CVE's referenced in this document by removing the affected classes from the patch. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

 Feed

The TRS web console allows an authenticated user to remotely manage the BTS and its configuration. Analysis discovered an authentication bypass vulnerability in the web management console. BTS TRS web console version FTM_W20_FP2_2019.08.16_0010 is affected.

 Feed

The call for papers for the 24th International Conference on Information and Communications Security (ICICS 2022) has been announced. It will take place at the University of Kent, Canterbury, UK on September 5th through the 8th, 2022.

 Feed

French data protection regulators on Thursday found the use of Google Analytics a breach of the European Union's General Data Protection Regulation (GDPR) laws in the country, almost a month after a similar decision was reached in Austria. To that end, the National Commission on Informatics and Liberty (CNIL) ruled that the transatlantic movement of Google Analytics data to the U.S. is not "

 Feed

Apple on Thursday released security updates for iOS, iPadOS, macOS, and Safari to address a new WebKit flaw that it said may have been actively exploited in the wild, making it the company's third zero-day patch since the start of the year. <!--adsense--> Tracked as CVE-2022-22620, the issue concerns a use-after-free vulnerability in the WebKit component that powers the Safari web browser and

 Feed

A previously unknown hacking group has been linked to targeted attacks against human rights activists, human rights defenders, academics, and lawyers across India in an attempt to plant "incriminating digital evidence." Cybersecurity firm SentinelOne attributed the intrusions to a group it tracks as "ModifiedElephant," an elusive threat actor that's been operational since at least 2012, whose

2022-02
Aggregator history
Friday, February 11
TUE
WED
THU
FRI
SAT
SUN
MON
FebruaryMarchApril