Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Collateral Damage †...

 Products

In the last three weeks, the war in Ukraine has shattered the world we knew. Families, relations, partnerships, and ties were affected dramatically in Ukraine, Russia, Europe and the entire world. The avalanche of these tragic events catches us all. It has also caught my company, the worlds largest private   show more ...

cybersecurity business that proudly bears my name. This week the German Federal Office of Information Security (BSI) issued a warning about Kaspersky products, citing potential risks for IT security of those using Kaspersky products and solutions. Without going into details I can say that these claims are speculations not supported by any objective evidence nor offering technical details. The reason is simple. No evidence of Kaspersky use or abuse for malicious purpose has ever been discovered and proven in the companys twenty-five years history notwithstanding countless attempts to do so. Without such evidence, I can only conclude that BSIs decision is made on political grounds alone. It is sadly ironic that the organization advocating for objectivity, transparency, and technical competence — the very same values Kaspersky supported for years together with BSI and other European regulators and industry bodies — decided or was forced to drop its principles literally overnight. Kaspersky, the long-time partner and contributor of BSI and German cybersecurity industry, was given mere hours to address these bogus and unfounded allegations. This is not an invitation for dialogue — it is an insult. Despite continuous calls from Kaspersky to conduct a deep audit of our source code, updates, architecture and processes at Kaspersky Transparency Centers in Europe, BSI has never done so. This decision also conveniently omits the fact that Kaspersky has for years pioneered greater transparency with a multi-million euro effort of relocating the threat data of our European customers to Switzerland as a part of our Global Transparency Initiative. That is why I consider the BSI decision as an unwarranted and unjust attack on my company and specifically on Kaspersky employees in Germany and Europe. More importantly this is also an attack on the large consumer base in Germany trusting Kaspersky, which two weeks ago was awarded as the best security offering (by AV-Test). It is also an attack on the jobs of thousands of German IT security professionals, on law enforcement officers we have trained to combat cutting-edge cybercrime, on German computer science students we have helped obtain job-ready skills, on our partners in research projects in the most critical areas of cybersecurity, and on tens of thousands of German and European businesses of all sizes which we have been protecting from the whole spectrum of cyberattacks. The reputational and business damage of the BSI decision is already quite significant. The only question I have — to what end? Not having Kaspersky in Germany will not make Germany or Europe safer. Quite the contrary. The BSI decision means that German users are strongly advised to immediately uninstall the only antivirus that according to AV-Test, an independent German IT-Security Institute, guarantees 100% protection from ransomware. This means that the leading German industrial equipment manufacturers will no longer receive information about critical vulnerabilities in their software and hardware from Kaspersky ICS-CERT — an organization hailed for its responsible disclosure work by these very same manufacturers. This means that German automotive giants will remain oblivious to the bugs that may allow an attacker to overtake the entire on-board computer system and change its logic. This means a huge blind spot on the attack surface for European incident responders and SOC operators, who will no longer be able to receive threat data from across the globe — and from Russia in particular. My message to BSI, which now seems to be avoiding contacts with our German team, is simple: we consider this decision to be unfair and outright wrong. Nonetheless, we remain open to addressing any concerns you may have in an objective, technical, and honest manner. We are thankful to the European regulators and industry experts who have taken a more balanced approach by calling for additional technical analysis and scrutiny of security solutions and the IT supply chain, and I am fully committed to providing all the information and cooperation that is required from Kaspersky throughout this process. And to our German and European customers I want to say that we are immensely grateful for your choice of Kaspersky, and that we will continue to do what we do best — protecting you from all cyberthreats no matter where they are coming from, while being fully transparent with regard to our technology and operations. The war in Ukraine can only end through diplomacy, and we are all hoping for a cessation of hostilities and continuing dialogue. This war is a tragedy that has already brought suffering to innocent people and repercussions across our hyper-connected world. The global cybersecurity industry that has been built on the basis of trust and cooperation to protect the digital links connecting us with each other may well be its collateral damage — and thus leave everyone even less safe.

 Malware and Vulnerabilities

OpenSSL updates announced on Tuesday patch a high-severity DoS vulnerability related to certificate parsing. The flaw, tracked as CVE-2022-0778, was reported to the OpenSSL Project by Google vulnerability researcher Tavis Ormandy.

 Malware and Vulnerabilities

B1txor20 uses DNS Tunnel to establish C2 channel, support direct connection and relay, while using ZLIB compression, RC4 encryption, BASE64 encoding to protect the traffic of the backdoor.

 Companies to Watch

The inquiry into NortonLifeLock's proposed $8bn acquisition of rival antivirus provider Avast has now closed, with the regulator concluding that a tie-up could indeed reduce competition in the marketplace.

 Trends, Reports, Analysis

In 2021, 30% of known zero-day vulnerabilities targeted mobile devices, while there was a 466% rise in exploited zero-day vulnerabilities against mobile endpoints, according to Zimperium.

 Trends, Reports, Analysis

The recent leak of Conti source code, chat logs, and other sensitive records have unfolded several secrets of the group. Different researchers studied the findings and laid down their analysis. According to Chainanysis, Conti extorted an estimated $180m last year, making it the top gainer for ransomware operations in   show more ...

2021. The recent leak of Conti secrets turns out to be a blessing for security researchers tracking the group as it offers insights into the group’s activity.

 Breaches and Incidents

Recently, the BazarBackdoor malware was observed spreading via corporate website contact forms rather than its typical phishing email attack chain target firms. To avoid any possible security flag, the attackers use file-sharing services TransferNow and WeTransfer to send malicious files. Website admins are suggested to stay alert whenever receiving suspicious emails from unknown sources.

 Feed

Ubuntu Security Notice 5331-1 - It was discovered that tcpdump incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code. It was discovered that tcpdump incorrectly handled certain captured data. An attacker could possibly use this issue to cause a denial of service.

 Feed

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the   show more ...

broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

 Feed

The Windows Print Spooler has a privilege escalation vulnerability that can be leveraged to achieve code execution as SYSTEM. The SpoolDirectory, a configuration setting that holds the path that a printer's spooled jobs are sent to, is writable for all users, and it can be configured via SetPrinterDataEx()   show more ...

provided the caller has the PRINTER_ACCESS_ADMINISTER permission. If the SpoolDirectory path does not exist, it will be created once the print spooler reinitializes. Calling SetPrinterDataEx() with the CopyFiles registry key will load the dll passed in as the pData argument, meaning that writing a dll to the SpoolDirectory location can be loaded by the print spooler. Using a directory junction and UNC path for the SpoolDirectory, the exploit writes a payload to C:WindowsSystem32spooldriversx644 and loads it by calling SetPrinterDataEx(), resulting in code execution as SYSTEM.

 Feed

Red Hat Security Advisory 2022-0810-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.4. Issues addressed include a code execution vulnerability.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 Feed

Ubuntu Security Notice 5329-1 - It was discovered that tar incorrectly handled certain files. An attacker could possibly use this issue to cause tar to crash, resulting in a denial of service.

 Feed

Red Hat Security Advisory 2022-0889-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a double free vulnerability.

 Feed

Ubuntu Security Notice 5330-1 - It was discovered that LibreOffice incorrectly handled digital signatures. An attacker could possibly use this issue to create a specially crafted document that would display a validly signed indicator, contrary to expectations.

 Feed

Red Hat Security Advisory 2022-0896-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include a buffer overflow vulnerability.

 Feed

Ubuntu Security Notice 5328-2 - USN-5328-1 fixed a vulnerability in OpenSSL. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Tavis Ormandy discovered that OpenSSL incorrectly parsed certain certificates. A remote attacker could possibly use this issue to cause OpenSSH to stop responding, resulting in a denial of service.

 Feed

Ubuntu Security Notice 5328-1 - Tavis Ormandy discovered that OpenSSL incorrectly parsed certain certificates. A remote attacker could possibly use this issue to cause OpenSSH to stop responding, resulting in a denial of service.

 Feed

Ubuntu Security Notice 5327-1 - Hiroyuki Yamamori discovered that rsh incorrectly handled certain filenames. If a user or automated system were tricked into connecting to a malicious rsh server, a remote attacker could possibly use this issue to modify directory permissions.

 Feed

Researchers have disclosed seven new security vulnerabilities in an open-source database management system solution called ClickHouse that could be weaponized to crash the servers, leak memory contents, and even lead to the execution of arbitrary code. "The vulnerabilities require authentication, but can be triggered by any user with read permissions," Uriya Yavnieli and Or Peles, researchers

 Feed

The Irish Data Protection Commission (DPC) on Tuesday slapped Facebook and WhatsApp owner Meta Platforms a fine of €17 million (~$18.6 million) for a series of security lapses that occurred in violation of the European Union's GDPR laws in the region. "The DPC found that Meta Platforms failed to have in place appropriate technical and organizational measures which would enable it to readily

 Feed

Russian cybersecurity firm Kaspersky on Tuesday responded to an advisory released by Germany's Federal Office of Information Security (BSI) against using the company's security solutions in the country over "doubts about the reliability of the manufacturer." Calling that the decision was made on   show more ...

"political grounds," the company said it will "continue to assure our partners and customers of the

 Feed

The end of the year is coming, and it's time for security decision-makers to make plans for 2022 and get management approval. Typically, this entails making a solid case regarding why current resources, while yielding significant value, need to be reallocated and enhanced. The Definitive 2022 Security Plan PPT Template is built to simplify this task, providing security decision-makers with an

 Feed

A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting as a conduit for downloading and installing rootkits. Qihoo 360's Netlab security team called it B1txor20 "based on its propagation using the file name   show more ...

'b1t,' the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes." <!--adsense-->

 Feed

The maintainers of OpenSSL have shipped patches to resolve a high-severity security flaw in its software library that could lead to a denial-of-service (DoS) condition when parsing certificates. Tracked as CVE-2022-0778 (CVSS score: 7.5), the issue stems from parsing a malformed certificate with invalid explicit elliptic-curve parameters, resulting in what's called an "infinite loop." The flaw

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint advisory warning that Russia-backed threat actors hacked the network of an unnamed non-governmental entity by exploiting a combination of flaws. "As early as May 2021, Russian state-sponsored cyber actors took advantage of a misconfigured account set to default [

 Feed

Researchers have disclosed an unpatched security vulnerability in "dompdf," a PHP-based HTML to PDF converter, that, if successfully exploited, could lead to remote code execution in certain configurations. "By injecting CSS into the data processed by dompdf, it can be tricked into storing a malicious font with a .php file extension in its font cache, which can later be executed by accessing it

2022-03
Aggregator history
Wednesday, March 16
TUE
WED
THU
FRI
SAT
SUN
MON
MarchAprilMay