Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to find out what ...

 Tips

First it was Minecraft and Fortnite. Then my youngest took a fancy to stunt scooters — spots, ramps and various brands and names of tricks appeared in his vocabulary, some of which were extremely hard for me to decipher. Example? Easy: try figuring out what 540 is. Now hes into graffiti. I hope that his pieces, tags   show more ...

and burners on the walls of derelict buildings eventually give way to the more serene realm of calligraphy and design. But for now I have to keep an eye on the cans and refills that leave a mark on my apartment too, as well as listen to my sons reflections on various kinds of markers, dabbers and street-art styles. Lots of new words. Sure, the best way to engage with a child and learn about their interests and problems is through joint activities. I myself love to draw, so finding a common language with my youngest isnt hard. But thats not always the case. The hobbies of todays kids are often wildly different from those of their parents. And its not easy to free up enough time for joint activities. Stressed at work, swamped with household chores, and now my daughter sheepishly hides her iPad screen from me, on which some snazzily dressed little figures with oversized heads are prancing around. What is it? Just some cartoon, or an online community that most certainly isnt for kids? Asking straight out is not the best strategy. At this age, teenagers are cagey about what theyre into, even if its all perfectly innocent. They want to have their own secrets in an adult-free zone. Its a different story if you show awareness and appreciation of the topic. Gacha Life? Sure, I know all about that! (having googled it after overhearing my daughter on the phone). And thats how we found a common language. Which led to constructive dialogue. Where to pick up such words In my case, the keyword came from my daughters own mouth. But how do you find out your childs interests if they never mention them out loud? One way is to look at what theyve been searching for online and research any unknown terms. If you have access to the browser your child uses, or if they use your computer, you can simply view the browsing history. Such surveillance, of course, will be unpleasant for your offspring if you get caught doing it — and theyll take steps to prevent it from happening again (they usually figure out things like that very quickly). Another option is parental control software that respects your childs privacy but can send you summarized reports about their online interests, as well as warnings if they start looking for something inappropriate. As before, you can use this information to google unknown words and use your newfound knowledge to broach the delicate subject of your childs interests. A third way is to read up on which kids searches are currently trending. For example, our Kaspersky Safe Kids report gives a rundown of the top crazes of the year. We know, of course, that your little Johnny is unique. But even the most perfect child is not immune to the lure of popular culture (admit it, neither are you). Therefore, armed with some trending words, youll likely be able to peer under the hood of your childs inner world. Even if the reply is: You what? Gacha?! Thats for babies. Im more into Nows your chance to engage…

 Identity Theft, Fraud, Scams

This email is being fired out to random addresses; it’s not a targeted attack. The phisher is simply hoping that of all the recipients, a few have an account with the service they’re imitating.

 Identity Theft, Fraud, Scams

“Evri” is a recent UK-specific rebrand of the German company “Hermes”, so that UK customers may very well still be getting used to the new look and feel of the rebranded website, and to the new domain name. This could favor the scammers.

 Trends, Reports, Analysis

Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to a study from MeriTalk and RSA Conference.

 Malware and Vulnerabilities

Researchers reported the high-severity bug in the Microsoft Office productivity suite that, if exploited, runs PowerShell commands using Microsoft Diagnostic Tool just by opening a Word document. It works without elevated privileges, bypasses Windows Defender, and runs binaries or scripts without enabling macros.   show more ...

Security experts suggest using defender ASR rules to block Office apps from creating child processes, a common malware strategy.

 Malware and Vulnerabilities

Described by Microsoft as a remote code execution flaw in the Microsoft Windows Support Diagnostic Tool (MSDT) and tracked as CVE-2022-30190, it impacts all Windows client and server platforms still receiving security updates.

 Security Tips and Advice

Healthcare has been proven to be a valuable target for cyber threat actors and medical devices are increasingly the targets of malicious cyberattacks, which result not only in data breaches but also in increased healthcare delivery costs.

 Trends, Reports, Analysis

Two prominent ransomware groups, Clop and REvil, had claimed to have shut down but there are some activities that suggest cybercriminals may have not gone completely. Clop had an unexpected return with a jump from the least active threat in March to the fourth most active in April. The so-thought-defunct REvil ransomware group claimed responsibility for a recent DDoS attack against a hospitality customer of Akamai.

 Threat Actors

Researchers reported a wave of DDoS attacks by the Russian Gamaredon APT group. Also, criminals have open-sourced code of a DDoS trojan called LOIC. Besides, experts observed attackers launch multiple attacks, such as phishing campaigns and malware attacks. Organizations are suggested to stay protected and follow agencies such as CERT-UA for recommendations and guidelines.

 Malware and Vulnerabilities

EnemyBot botnet expanded its attack scope to exploit critical vulnerabilities found in VMware, Android, and F5 BIG-IP. It is suspected to have some strong correlation with the LolFMe botnet in terms of having similar strings, structure, and patterns in the code. The botnet is under active development by its operators. Make sure to update and apply the latest security patches to devices in use.

 Emerging Threats

Researchers have warned against the increased use of free-to-use browser automation frameworks by attackers that can be abused in malicious activities. Researchers observed C2 IP addresses linked with malware such as BlackGuard, Bumblebee, and RedLine Stealer communicating with the subdomain of Bablosoft.   show more ...

Organizations are recommended to implement unique passwords and stop users from using compromised credentials.

 Feed

Ubuntu Security Notice 5456-1 - It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into opening a specially crafted image, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact.

 Feed

Ubuntu Security Notice 5457-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

 Feed

Ubuntu Security Notice 5443-2 - Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.   show more ...

Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions.

 Feed

Red Hat Security Advisory 2022-4860-01 - The Red Hat OpenShift Serverless Client kn 1.22.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.22.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.

 Feed

Ubuntu Security Notice 5454-2 - USN-5454-1 fixed several vulnerabilities in CUPS. This update provides the corresponding update for Ubuntu 16.04 ESM. Joshua Mason discovered that CUPS incorrectly handled the secret key used to access the administrative web interface. A remote attacker could possibly use this issue to open a session as an administrator and execute arbitrary code.

 Feed

Ubuntu Security Notice 5442-2 - Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.   show more ...

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux kernel contained in integer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

 Feed

Comma devices running Openpilot suffered from an insecure configuration when SSH is enabled where the private key is publicly known. Additional security hardening improvements have also been made in recent releases to address other concerns as well.

 Feed

An advanced persistent threat (APT) actor aligned with Chinese state interests has been observed weaponizing the new zero-day flaw in Microsoft Office to achieve code execution on affected systems. "TA413 CN APT spotted [in-the-wild] exploiting the Follina zero-day using URLs to deliver ZIP archives which contain Word Documents that use the technique," enterprise security firm Proofpoint said in

 Feed

An international law enforcement operation involving 11 countries has culminated in the takedown of a notorious mobile malware threat called FluBot. "This Android malware has been spreading aggressively through SMS, stealing passwords, online banking details and other sensitive information from infected smartphones across the world," Europol said in a statement. <!--adsense--> The "complex

 Feed

As many as 47,337 malicious plugins have been uncovered on 24,931 unique websites, out of which 3,685 plugins were sold on legitimate marketplaces, netting the attackers $41,500 in illegal revenues. The findings come from a new tool called YODA that aims to detect rogue WordPress plugins and track down their origin, according to an 8-year-long study conducted by a group of researchers from the

 Feed

An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to the latest research. "Now it is significantly harder to separate the wheat from the chaff and discover the real C&C servers among thousands of legitimate domains used by Xloader as a smokescreen," Israeli cybersecurity company

 Feed

A new unpatched security vulnerability has been disclosed in the open-source Horde Webmail client that could be exploited to achieve remote code execution on the email server simply by sending a specially crafted email to a victim. "Once the email is viewed, the attacker can silently take over the complete mail server without any further user interaction," SonarSource said in a report shared

2022-06
Aggregator history
Wednesday, June 01
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust