Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Malware and Vulnerabilities

A security researcher demonstrated the possibility of poisoned pipeline attacks that can be triggered by abusing permissions in source code management (SCM) repositories. The pipelines that execute unreviewed code are more exposed to PPE attacks. Applications not developed with a security-first approach are deemed to face challenges related to PPE.

 Malware and Vulnerabilities

Hackers affiliated with the Chinese Ministry of State Security and the People's Liberation Army are increasingly deploying the ShadowPad advanced modular RAT against its targets. It can steal sensitive system information, interact with the file system and registry, and deploy new modules to propagate. Organizations should monitor for TTPs associated with the ShadowPad backdoor to stay protected.

 Identity Theft, Fraud, Scams

Cybercriminals are planting maldocs in chat threads on Microsoft Teams. Users accessing it might end up giving control of their systems to hackers. Organizations are suggested to deploy email gateway security that secures communication applications, and employees should contact IT whenever a suspicious file is observed.

 Feed

Researchers have detailed what they call the "first successful attempt" at decrypting data infected with Hive ransomware without relying on the private key used to lock access to the content. "We were able to recover the master key for generating the file encryption key without the attacker's private key, by using a cryptographic vulnerability identified through analysis," a group of academics

2022-02
Aggregator history
Sunday, February 20
TUE
WED
THU
FRI
SAT
SUN
MON
FebruaryMarchApril