Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for The most effective a ...

 Products

How can you choose the best security solution for a business or home, considering that user reviews can be sketchy or biased, and ads are always batting for some developers team? Fortunately, theres also a reliable source of information in the shape of reputable labs that specialize in testing cybersecurity solutions.   show more ...

For one thing, they have the skills and experience necessary for an expert evaluation. For another, they are independent of the test participants. These labs regularly publish the results of their studies, and were here to help make sense of them. Instead of a thousand words There are many well-regarded test labs out there, each of which conducting dozens of studies every year. As a result, the amount of information available is considerable — enough to fairly drown the uninitiated. To make things easier, Kaspersky compiles its own annual summary of the tests carried out by AV-Test, AV-Comparatives, MRG Effitas, SE Labs and other major players. We cover both all-round and narrowly-focused studies — for example, how well different vendors solutions tackle ransomware or spyware. Having compiled all the results, we bring them together in our TOP3 chart. This infographic rates security developers on three criteria simultaneously: (i) how actively they took part in tests (horizontal axis), (ii) how many times they made the Top 3 (vertical axis), and (iii) how many times they took first place (diameter of the respective circle). Thus, the overall result is easy to discern: the bigger the circle with the vendor name, and the further to the right and higher it is — the better its products performed over the past year. In total, we participated in 75 independent tests in 2021; in 84% of them we placed in the top 3, and in 57 tests our products ranked first. The bigger the circle, the more often the companys solutions ranked first in independent tests In 2021, Kaspersky solutions were among the Top 3 most tested antivirus and security products. Our solutions achieved more podium finishes than any other. Kaspersky protection also claimed the highest number of top spots. This means that most specialized test labs recognize the high performance of our solutions — both corporate and home. Everything checked Another reason why we ensure our products participate in as many tests as possible is because cyberthreats have become too diverse for one all-round study. Here are just some of the specialized tests our security solutions have passed. Ransomware During the tests, the participating antiviruses face several families of ransomware in both corporate and home setups. These tests can be quite absorbing — so much so that we dedicated a separate article to one of them. Fileless Fileless attacks, as their name suggests, do away with files on user devices and are therefore hard to detect. The tests evaluate not only success rate, but also the time it takes to detect fileless attacks. Vulnerabilities and exploits Cybercriminals use exploits to attack a system through vulnerabilities, so the tests assess the speed of detecting and eliminating them. APT attacks To reach an important target, cybercriminals sometimes conduct multi-stage attacks and create unique tools. In APT defense testing, researchers test solutions ability to detect and block unfamiliar and brand-new threats. Phishing During phishing testing, experts simulate the behavior of average online users and evaluate how promptly and effectively protection kicks in against data thieves. Stalkerware Stalkerware refers to semi-legal tracking apps that anyone can buy online. People often covertly install them on the device of a partner or spouse to monitor their location, read their contacts and messages, look through their photos and so on. Because of their semi-legal status, stalkerware cannot formally be classified as malware. For this reason, some security developers prefer to turn a blind eye and not pay due attention to protection against this class of programs. But we disagree: we consider it important to protect our customers from tracking apps, and do our best to ensure that our products effectively detect stalkerware and warn the victims. False positives A good security solution not only eliminates threats, but also refrains from bothering the user over mere trifles. Dont underestimate how important this is: if your antivirus constantly cries wolf, youll stop taking it seriously. Also note that some security developers try to compensate for their less-than-perfect technologies by sounding the alarm at the slightest possibility of a threat. Therefore, the number of false positives is often a good indicator of the true quality of protection: the fewer, the better. As such, most independent tests typically list the number of false positives alongside threat detection capability. Expert opinion To recap, in 2021 Kaspersky products passed numerous tests with flying colors, and independent experts once again confirmed the companys leadership in the security solutions market. Of course, we have no intention of resting on our laurels, and shall continue to develop our technologies to keep your devices fully protected against all threats. Safe online surfing!

 Govt., Critical Infrastructure

The Bureau of Cyberspace and Digital Policy officially launched Monday at the State Department, with wide latitude to develop policy on diplomatic issues related to technology and the internet.

 Expert Blogs and Opinion

A standard approach to addressing spoofed domains is to compare them to a database of known domains and to look for differences. Since the traditional method is sometimes insufficient, researchers have turned to a method called biomimicry.

 Breaches and Incidents

Mailchimp has confirmed a miscreant gained access to one of its internal tools and used it to steal data belonging to 100-plus high-value customers. The clients were all in cryptocurrency and finance-related industries, according to Mailchimp

 Malware and Vulnerabilities

The threat actor(s) behind these campaigns have been using 3LOSH to generate the obfuscated code responsible for the initial infection process. The same operator is likely distributing a variety of commodity RATs, such as AsyncRAT and LimeRAT.

 Malware and Vulnerabilities

SocGholish has been around longer than BLISTER, having already established itself well among threat actors for its advanced delivery framework. Reports show that its framework of attack has previously been used by threat actors from as early as 2020.

 Malware and Vulnerabilities

Hive ransomware gang is using a new IPfuscation tactic to hide its payload wherein they hide 64-bit Windows executables in the form of an array of ASCII IPv4 addresses. Additionally, the researchers spotted additional IPfuscation variants using IPv6 instead of IPv4 addresses, UUIDs, and MAC addresses, all operating in almost the same way.

 Malware and Vulnerabilities

According to Fortinet, BeastMode attempts to infect TOTOLINK routers by exploiting several vulnerabilities. The threat actors added the exploits just a week after the PoCs were publicly released on GitHub.

 Feed

Ubuntu Security Notice 5365-1 - It was discovered that H2 was vulnerable to deserialization of untrusted data. An attacker could possibly use this issue to execute arbitrary code. It was discovered that H2 incorrectly handled some specially crafted connection URLs. An attacker could possibly use this issue to execute arbitrary code.

 Feed

Red Hat Security Advisory 2022-1186-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-1185-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2022-1174-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Issues addressed include bypass, crlf injection, and denial of service vulnerabilities.

 Feed

Email marketing service Mailchimp on Monday revealed a data breach that resulted in the compromise of an internal tool to gain unauthorized access to customer accounts and stage phishing attacks.  The development was first reported by Bleeping Computer. The company, which was acquired by financial software firm Intuit in September 2021, told the publication that it became aware of the incident

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added the recently disclosed remote code execution (RCE) vulnerability affecting the Spring Framework, to its Known Exploited Vulnerabilities Catalog based on "evidence of active exploitation." The critical severity flaw, assigned the identifier CVE-2022-22965 (CVSS score: 9.8) and dubbed "Spring4Shell", impacts Spring

 Feed

Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), on Tuesday announced the official takedown of Hydra, the world's largest illegal dark web marketplace that has cumulatively facilitated over $5 billion in Bitcoin transactions to date. "Bitcoins amounting to currently the equivalent of approximately €23 million were seized, which are attributed to the marketplace," the BKA

 Feed

A Chinese state-backed advanced persistent threat (APT) group known for singling out Japanese entities has been attributed to a new long-running espionage campaign targeting new geographies, suggesting a "widening" of the threat actor's targeting. The widespread intrusions, which are believed to have commenced at the earliest in mid-2021 and continued as recently as February 2022, have been tied

 Feed

With the growth in digital transformation, the API management market is set to grow by more than 30%  by the year 2025 as more businesses build web APIs and consumers grow to rely on them for everything from mobile apps to customized digital services. As part of strategic business planning, an API helps generate revenue by allowing customers access to the functionality of a website or computer

 Feed

The notorious cybercrime group known as FIN7 has diversified its initial access vectors to incorporate software supply chain compromise and the use of stolen credentials, new research has revealed. "Data theft extortion or ransomware deployment following FIN7-attributed activity at multiple organizations, as well as technical overlaps, suggests that FIN7 actors have been associated with various

 Feed

Between a series of recent high-profile cybersecurity incidents and the heightened geopolitical tensions, there's rarely been a more dangerous cybersecurity environment. It's a danger that affects every organization – automated attack campaigns don't discriminate between targets. The situation is driven in large part due to a relentless rise in vulnerabilities, with tens of thousands of

2022-04
Aggregator history
Tuesday, April 05
FRI
SAT
SUN
MON
TUE
WED
THU
AprilMayJune