Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Interview with Gabri ...

 Special Projects

Gabriel loves to play football (soccer!) and electric guitar, and hes a fan of all things blockchain technology and the NFT ecosystem. But life hasnt been easy for him: he had to leave his parents in Venezuela and immigrate to Spain, where he started working at Kaspersky in the middle of the covid lockdown. In this   show more ...

interview, Gabriel tells us about his journey to cybersecurity. – Growing up in Venezuela, how was it? We often see news about the crisis in your home country… – My childhood was good; I loved sports, and played football a lot with my friends. Both of my parents are petroleum engineers. They worked for the oil industry until the political situation started affecting us — both of them lost their jobs and we had it hard for a while. I had to keep getting excellent grades in school to get scholarship; it was quite tough. After high school I decided to become an engineer like my parents, but I found that Materials Engineering was more interesting for me. Studying at a university isnt easy during a bad economic situation. However, in 2018 I received my degree in Materials Engineering from Universidad Simón Bolívar, one of the most prestigious universities in the country. – Near Moscow State University, where I often walk with my kids, theres a memorial monument to Simón Bolívar. What should I tell my kids about him? – Simón Bolívar is one of the main heroes in Latin America history. From 1500 to 1830, most countries in Latin America were part of the Spanish empire. Bolivar was the guy who liberated many countries, including Bolivia, Colombia, Ecuador, Panama, Peru, and of course Venezuela — after all he was Venezuelan! – Why did you move to Spain? – Well, in crisis times many people go to other countries, looking for a better life. In fact, my father is a son of Italian immigrants who moved to Venezuela after World War II. So Im part European, and I decided to start afresh in Europe. I chose Spain because of the language, and besides, some of my friends also migrated to Spain. – How different is your new country? Whats better, and whats strange? – Spain is beautiful. Here in Madrid Im living my life, not just surviving. And Spanish girls are very nice, especially in the south! My girlfriend is from down there (Andalusia), weve been together for three years now and were going to get married! As to strange feelings, yes, I dont feel that its my culture. Spanish and Venezuelan people both speak Spanish, but theres still a cultural barrier, and some words have different meanings. But its alright. Its great to have the feeling of developing a new life, but feeling alone throughout the process can be tricky. Its hard to lose someone close — not being able to be with them in their last moments. I sadly lost my grandma when I was already living here. I didnt say goodbye to her. And I miss being with my parents. I miss them every day. – You said you had a degree in Materials Engineering. But its quite far from cybersecurity. What was your reason to go to Kaspersky? – Ive known about Kaspersky since I bought my first laptop back in 2014. It came in a bundle with a one-year subscription for Kaspersky Internet Security, and for exactly one year my laptop worked perfectly. Then the license expired. I changed antivirus: mistake! Sure enough my laptop got messed up. I should have known better back then! While at university, I tried to study computer engineering first, for a few semesters, but I found it wasnt for me. I was more interested in physics and chemistry at that time. However, Ive been always passionate about IT. So when I finished my first internship at a plastic parts factory, I started working for a cryptocurrency company. Thats when I realized that I liked the world of business and corporate sales. So I came to Spain to study for an MBA and to combine both of my passions — business and tech. I was lucky to be selected for the internship in Kaspersky while finishing my MBA degree. – You started working at Kaspersky during lockdown in Spain. How did the restrictions influence your work? – Yes, at the beginning it was a bit awkward when youre not meeting every day with your colleagues in the office. It was comfortable in some ways, but also there was the fear that it would be difficult to collaborate and learn. I started as Sales Intern for the SMB channel in Iberia. Basically, I had to be the main sales support for all the channel and territory managers, to manage a bunch of stuff related to our CRM, to be in touch with partners, customers and distributors, to do onboarding of new partners, and to solve problems that they might have with the partner portal. Sure, covid restrictions made my work more difficult, but those restrictions also helped me develop a sense of responsibility, as well as communication skills and the ability to multitask. I learned a lot from my colleagues remotely. And when I finally met my coworkers during our event for partners in Barcelona, it was a bit funny to see them for the first time in person after working together almost a year! – What are the most common questions that people ask about Kaspersky products when you present these products to them? Did their attitudes change after the Ukrainian conflict started? – Theres a little bit of everything. There are lots of people who are interested in security technologies: they mostly have questions about product features. Many of them recognize Kaspersky as a market leader — this makes my work easier. Their main concerns are mostly the same: what if the service stops working or they suffer from some attack, and they need access to support to solve their problems. Unfortunately, now some people are just scared of the bad reputation that comes along due to the Ukrainian conflict. Some of them say they love our product but their bosses dont want to be involved with any Russian company. Its sad to hear because this kind of Russophobia makes no sense. – Did you ever think your life would be happier if you chose a different company to work for — not a Russian one — for your career? – Not once! I can say that my Russian colleagues are some of the nicest people Ive worked with. Since starting work here Ive felt understood. From the very beginning, they were always helping me learn quick so I could become more productive. Its something about the organizational culture. Theres no toxic competition — only collaboration and team work. Ive been welcomed not just to a company but to a warm family. Without a doubt its the best company Ive worked for in my experience so far. And I hope I can stay here and develop my career for many years.

 Trends, Reports, Analysis

Brazil has seen an improvement in its data breach situation, with an 80% decrease in the number of cases seen in the first three months of 2022, according to new research by cybersecurity company Surfshark.

 Geopolitical, Terrorism

The report late on Sunday said Iran thwarted the attacks that planned to target the infrastructure of more than 100 public sector agencies. It did not elaborate on specific examples of the public sector agencies.

 Identity Theft, Fraud, Scams

The text claims to be from “FOD”. This is the Federale Overheidsdienst Financien in Belgium. The suspect URL includes a domain registered just this month (often a red flag), in India, rather than Belgium.

 Incident Response, Learnings

In a proposed class-action lawsuit filed on Friday, the plaintiff claimed he and potentially others fell victim to a sophisticated phishing attack in which their Trezor cryptocurrency wallets were unlawfully accessed and funds siphoned.

 Incident Response, Learnings

An attack on the country's Finance Ministry impacted several processes, including tax collection, the payment of public employees, and the importation and exportation of goods through Costa Rica’s customs agency.

 Threat Actors

TeamTNT hackers’ shell scripts were found disabling cloud security tools to attack AWS and Alibaba Cloud. Its payloads include credential stealers, cryptocurrency miners, persistence, and lateral movement. Organizations are suggested to continue taking the right measures to protect your systems from such threats.

 Malware and Vulnerabilities

Cybersecurity analysts have detected yet another info-stealer malware infection, named Prynt Stealer, offering powerful capabilities and extra keylogger and clipper modules. The developer of the stealer claims the recent version of the stealer is undetectable. Users are suggested to use a strong password with 2FA and avoid third-party download sources.

 Malware and Vulnerabilities

Researchers from SentinelLabs claimed that Nokoyawa is clearly a variant of Nemty (Karma) ransomware. Previously, Trend Micro had highlighted similarities in the attack chain between Nokoyawa and Hive ransomware.

 Trends, Reports, Analysis

Researchers released a report on BlackByte ransomware describing new variants written in Go and DotNET, with one variant written with a mix of Go and C languages. The ransomware actors were observed making changes to the registry in an attempt to escalate privileges. Organizations are suggested to stay protected by deploying robust anti-ransomware solutions.

 Feed

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant   show more ...

to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

 Feed

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The   show more ...

clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

 Feed

Ubuntu Security Notice 5388-2 - It was discovered that OpenJDK incorrectly verified ECDSA signatures. An attacker could use this issue to bypass the signature verification process. It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly   show more ...

use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service.

 Feed

Ubuntu Security Notice 5388-1 - It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled converting certain object arguments into their   show more ...

textual representations. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly validated the encoded length of certain object identifiers. An attacker could possibly use this issue to cause a denial of service.

 Feed

Ubuntu Security Notice 5387-1 - Douglas Mendizábal discovered that Barbican incorrectly handled access restrictions. An authenticated attacker could possibly use this issue to consume protected resources and possibly cause a denial of service.

 Feed

Gitlab versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.7 prior to 14.7.7 suffer from a bypass vulnerability due to having set a hardcoded password for accounts registered using an OmniAuth provider.

 Feed

Ubuntu Security Notice 5376-2 - USN-5376-1 fixed vulnerabilities in Git. This update provides the corresponding updates for Ubuntu 22.04 LTS. 俞晨东 discovered that Git incorrectly handled certain repository paths in platforms with multiple users support. An attacker could possibly use this issue to run arbitrary commands.

 Feed

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant   show more ...

to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

 Feed

An Iranian-linked threat actor known as Rocket Kitten has been observed actively exploiting a recently patched VMware vulnerability to gain initial access and deploy the Core Impact penetration testing tool on vulnerable systems. Tracked as CVE-2022-22954 (CVSS score: 9.8), the critical issue concerns a case of remote code execution (RCE) vulnerability affecting VMware Workspace ONE Access and

 Feed

A state-backed threat actor with ties to the Democratic People's Republic of Korea (DRPK) has been attributed to a spear-phishing campaign targeting journalists covering the country with the ultimate goal of deploying a backdoor on infected Windows systems. The intrusions, said to be the work of Ricochet Chollima, resulted in the deployment of a novel malware strain called GOLDBACKDOOR, an

 Feed

The threat actor behind the prolific Emotet botnet is testing new attack methods on a small scale before co-opting them into their larger volume malspam campaigns, potentially in response to Microsoft's move to disable Visual Basic for Applications (VBA) macros by default across its products. Calling the new activity a "departure" from the group's typical behavior, ProofPoint alternatively 

 Feed

The infamous ransomware group known as Conti has continued its onslaught against entities despite suffering a massive data leak of its own earlier this year, according to new research. Conti, attributed to a Russia-based threat actor known as Gold Ulrick, is one of the most prevalent malware strains in the ransomware landscape, accounting for 19% of all attacks during the three-month-period

2022-04
Aggregator history
Tuesday, April 26
FRI
SAT
SUN
MON
TUE
WED
THU
AprilMayJune