For many companies, threat intelligence means only indicators of compromise data and information on specific cybercriminal tools. But in fact, threat intelligence implies a much deeper knowledge about threat actors, including tracking their activity on the network. Sometimes this information allows you to not only to show more ...
get an idea of the criminal methods and tactics, but also to prevent a cybercrime. A vivid example is the recent case of a Latin American countrys central bank. What happened While studying cybercriminal activity, our experts learned that one group managed to access the banks network. Investigators immediately notified the victim, contacted Interpol and jointly conducted a thorough investigation into the incident. As a result, they managed to eliminate vulnerabilities in corporate infrastructure and prevent real financial losses. Unfortunately, we ?annot share the details of the incident and describe how the attackers penetrated the banks network. How our experts managed to detect the activity of intruders Not all cybercriminals are responsible for a full attack cycle — from initial studying the target to the final move (which is usually data or money exfiltration, or ransomware infection). There are groups that specialize exclusively in gaining access to the infrastructure of companies: having successfully penetrated the network, they try to sell access to those who can organize an attack on the dark web or on hacker forums. Moreover, there are so-called Initial Access Brokers that buy access and then resell it to other cybercriminals. While studying the activities of completely different criminals, our researchers discovered that someone is looking for partners to attack the bank in order to perform some kind of cyberfraud. They shared some information as a proof of access to the banks infrastructure, and it helped our experts to identify the victim and prevent the crime. How threat intelligence can help a particular company? In this case our experts were not searching for signs of an attack on a particular bank. This bank wasnt even our client. However, our instruments can allow you to track threats for a specific organization. Our Threat Intelligence portfolio includes a Digital Footprint Intelligence service that allows you to create a dynamic digital portrait of an organization, and then to track dangerous symptoms through open sources on the dark web and deep web. Sometimes this allows you to prevent quite serious cyber incidents. In addition, to protect against sophisticated attacks, we recommend using services such as Managed Detection and Response. It allows your cybersecurity team to employ the help of external experts to detect and stop complex attacks on company infrastructure at an early stage.
Security researchers with Qualys have discovered several vulnerabilities affecting Canonical's Snap software packaging and deployment system and urged users to apply patches.
Intel has released software and firmware updates to address many vulnerabilities found in the company’s products. It released 22 security advisories, including seven with a severity rating of “high.”
Updates have been released for UpdraftPlus, a WordPress plugin with over 3 million installations, after a vulnerability was discovered by security researcher Marc Montpas.
One company, stage, or process with insufficient security makes the entire chain more vulnerable to hackers and can open up a huge amount of risk when we consider the size and value of global chains.
Malicious hackers are targeting Office 365 users with a spare of ‘MFA fatigue attacks’, bombarding victims with 2FA push notifications to trick them into authenticating their login attempts.
A researcher last week noted that Brave had blocked a Chrome extension called L.O.C. out of concern it exposed the user's Facebook data to a third-party server without any notice or permission prompt.
A total of 28,695 vulnerabilities were disclosed in 2021, according to a report from Risk Based Security. It puts the amount of risk that organizations and security teams face on full display.
Extend Fertility was hit with ransomware in the month of December 2021. The clinic hired third-party digital forensic specialists to determine the incident's nature and scope.
Researchers diligently tracked the dramatic rise in ransomware, recording an astounding 318.6 million more ransomware attacks than 2020, a 105% increase. Ransomware volume has risen 232% since 2019.
When the victim downloads the payload, it leads to the installation of multiple malware payloads on the victim's system, allowing the threat actor to establish backdoors and/or steal user information.
Cisco devices are used throughout the DoD, the defense industrial base, and national security systems, and any unsecured credentials on these devices could lead to entire networks getting compromised.
Windows machines located in South Korea have been targeted by a botnet tracked as PseudoManuscrypt since at least May 2021 by employing the same delivery tactics of another malware called CryptBot.
A group of researchers published “Face-Mic,” the first work examining how voice command features on virtual reality headsets could lead to major privacy leakages, known as eavesdropping attacks.
Tracked as CVE-2022-24087, the issue is rated 9.8 on the CVSS vulnerability scoring system and relates to an "Improper Input Validation" bug that could result in the execution of malicious code.
The Cofense Phishing Defense Center (PDC) has observed a new phishing campaign that harvests Microsoft credentials by impersonating Power BI emails as its a trusted software.
The affiliate program offers cybersecurity solution providers a critical head-start in incorporating the center’s research and development (R&D) resources into their product or service offerings.
Researchers at cybercrime and adversarial disruption company Advanced Intelligence noticed that in 2021 Conti had become the only beneficiary of TrickBot’s supply of high-quality network accesses.
The master decryption keys for Maze, Egregor, and Sekhmet ransomware victims were released, as claimed, by one of the developers of the three ransomware. The poster on the forum said that this was a planned leak and did not have any relation to law enforcement operations. Though, experts suspect that the release of keys could be an attempt to trick law enforcement agencies.
Check Point disclosed that an updated version of the TrickBot malware is targeting customers of 60 financial and technology firms primarily located in the U.S. Researchers believe that the actual victims are not the brands themselves but their customers. The malware stands as a priority threat, requiring continuous monitoring and tracking by the security community around the globe.
SentinelOne observed the potentially destructive Iran-linked APT group TunnelVision actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers.
Element Vape's website was found loading a malicious JavaScript file from a third-party website that appears to contain a credit card stealer, as reported by BleepingComputer.
Palo Alto Networks unearthed an ongoing email campaign by Emotet operators, which now propagates through malicious Excel files while also implementing other obfuscation techniques. For this, attackers have used email thread hijacking and some other attack tactics. Experts revealed they have been delivering an Excel file with an obfuscated Excel 4.0 macro via socially engineered emails since December 2021.
SonarSource researchers, who discovered the bugs, noted that Zabbix is a high-profile target for threat actors due to its popularity, features, and its privileged position in most company’s networks.
The vulnerability is tracked as CVE-2022-22945 and it has a CVSS score of 8.8. VMware described it as a CLI shell injection vulnerability affecting the product’s NSX Edge appliance component.
Ubuntu Security Notice 5295-1 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered a race condition in the Unix domain socket show more ...
implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
WordPress MasterStudy LMS plugin version 2.7.5 suffers from a missing access control allowing an unauthenticated party the ability to create an administrative account.
Ubuntu Security Notice 5292-3 - USN-5292-1 fixed several vulnerabilities in snapd. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue show more ...
to expose sensitive information. Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions. The Qualys Research Team discovered that snapd did not properly validate the location of the snap-confine binary. A local attacker could possibly use this issue to execute other arbitrary binaries and escalate privileges. The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing a private mount namespace for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.
Ubuntu Security Notice 5292-2 - USN-5292-1 fixed vulnerabilities in snapd. This update provides the corresponding update for the riscv64 architecture. James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information.
Ubuntu Security Notice 5294-1 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Szymon Heidrich discovered that the USB Gadget subsystem in the show more ...
Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5292-1 - James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local show more ...
attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions.
Red Hat Security Advisory 2022-0580-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a traversal vulnerability.
A "potentially destructive actor" aligned with the government of Iran is actively exploiting the well-known Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware. Cybersecurity firm SentinelOne dubbed the group "TunnelVision" owing to their heavy reliance on tunneling tools, with overlaps in tactics observed to that of a broader group tracked under the moniker Phosphorus
These days, businesses all around the world have come to depend on cloud platforms for a variety of mission-critical workflows. They keep their CRM data in the cloud. They process their payrolls in the cloud. They even manage their HR processes through the cloud. And all of that means they're trusting the bulk of their privileged business data to those cloud providers, too. And while most major
Cisco has released security updates to contain three vulnerabilities affecting its products, including one high-severity flaw in its Email Security Appliance (ESA) that could result in a denial-of-service (DoS) condition on an affected device. The weakness, assigned the identifier CVE-2022-20653 (CVSS score: 7.5), stems from a case of insufficient error handling in DNS name resolution that could
Adobe on Thursday updated its advisory for an actively exploited zero-day affecting Adobe Commerce and Magento Open Source to patch a newly discovered flaw that could be weaponized to achieve arbitrary code execution. <!--adsense--> Tracked as CVE-2022-24087, the issue – like CVE-2022-24086 – is rated 9.8 on the CVSS vulnerability scoring system and relates to an "Improper Input Validation" bug
Multiple security vulnerabilities have been disclosed in Canonical's Snap software packaging and deployment system, the most critical of which can be exploited to escalate privilege to gain root privileges. Snaps are self-contained application packages that are designed to work on operating systems that use the Linux kernel and can be installed using a tool called snapd. <!--adsense--> Tracked
Microsoft has warned of emerging threats in the Web3 landscape, including "ice phishing" campaigns, as a surge in adoption of blockchain and DeFi technologies emphasizes the need to build security into the decentralized web while it's still in its early stages. The company's Microsoft 365 Defender Research Team called out various new avenues through which malicious actors may attempt to trick
Numerous Windows machines located in South Korea have been targeted by a botnet tracked as PseudoManuscrypt since at least May 2021 by employing the same delivery tactics of another malware called CryptBot. "PseudoManuscrypt is disguised as an installer that is similar to a form of CryptBot, and is being distributed," South Korean cybersecurity company AhnLab Security Emergency Response Center (
A new tool makes crystal clear that it's a big mistake to redact text by pixelating it.. or indeed blurring it, or even applying a "swirl" filter. Read more in my article on the Hot for Security blog.