Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Malware and Vulnerabilities

After PoC exploits were published online, several botnets are now abusing the RCE vulnerability in Atlassian Confluence Server and Data Center installs to infect Linux servers. The botnets Kinsing, Hezb, and Dark[.]IoT have been identified to be targeting exposed Linux servers and delivering backdoors and cryptominers. Admins are suggested to update their servers as soon as possible to avoid infection.

 Malware and Vulnerabilities

Symbiote, a new kind of Linux malware, was found to be almost undetectable by operating as a userland-level rootkit, making detection challenging for several security solutions. Its main targets include the financial sector in Latin America and the Federal police of Brazil. Experts suggest admins use network telemetry to identify anomalous DNS requests.

 Threat Actors

Aoqin Dragon, a previously unknown Chinese-speaking threat actor, was found conducting cyberespionage against the government, telecom, and education sectors in Australia and Southeast Asia, since at least 2013. It obtains initial access via document exploits and fake removable devices. SentinelLabs observed two different backdoors used by the threat group, Mongall and a modified version of Heyoka. 

 Identity Theft, Fraud, Scams

Researchers laid bare a massive phishing scam that abused Facebook and Messenger to trick millions of users into blurting out their account credentials while forcing them to see advertisements. The phishing messages used genuine URL generation services, through legitimate apps, which are hard to block using security products. To stay safe, users are suggested to stay vigilant and enable two-factor authentication.

 Geopolitical, Terrorism

The US has acknowledged it assisted Ukraine to shore up its cyber defences, conducted information operations, and took offensive actions during Russia's illegal invasion.

 Expert Blogs and Opinion

Water may be the greatest vulnerability in our national infrastructure, said Samantha Ravich, chair of CCTI. Much of the problem lies in just how decentralized water systems are, she explained.

 Trends, Reports, Analysis

Researchers from Wiz, who previously found a series of four serious flaws in Azure's Open Management Infrastructure (OMI) agent dubbed "OMIGOD."Wiz has published a list of 12 agents installed secretly, just like OMI, on Azure, AWS, and Google Cloud.

 Security Culture

The Coalition to Reduce Cyber Risk (CR2) announced this week that it has been joined by 37 organizations across eight countries in signing a pledge to improve cyber resilience and combat threats such as ransomware.

 Security Tips and Advice

The bad practices highlighted by CISA include the use of unsupported or end-of-life software, the use of known/fixed/default credentials, and the use of single-factor authentication for remote or administrative access.

 Malware and Vulnerabilities

Three PyPI packages were found to contain a backdoor due to a malicious dependency within certain versions, thereby exposing users to supply chain attacks. The threat included with the ‘Keep’ package is pretty high as it particularly receives over 8,000 downloads per week on average. Even if PyPI did remove   show more ...

the request package, there are chances that many mirror sites did not entirely remove it, thus there is a threat that it could still be installed.

 Feed

The Iranian state-sponsored threat actor tracked under the moniker Lyceum has turned to using a new custom .NET-based backdoor in recent campaigns directed against the Middle East. "The new malware is a .NET based DNS Backdoor which is a customized version of the open source tool 'DIG.net,'" Zscaler   show more ...

ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a report published last week. "

 Feed

Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts. "Unlike other ransomware groups, this ransomware family doesn't have an active leak site; instead it prefers to direct the impacted victim to negotiations through Tox chat and onion-based

 Feed

A technically sophisticated threat actor known as SeaFlower has been targeting Android and iOS users as part of an extensive campaign that mimics official cryptocurrency wallet websites intending to distribute backdoored apps that drain victims' funds. Said to be first discovered in March 2022, the cluster of activity "hint[s] to a strong relationship with a Chinese-speaking entity yet to be

 Feed

A Chinese advanced persistent threat (APT) known as Gallium has been observed using a previously undocumented remote access trojan in its espionage attacks targeting companies operating in Southeast Asia, Europe, and Africa. Called PingPull, the "difficult-to-detect" backdoor is notable for its use of the Internet Control Message Protocol (ICMP) for command-and-control (C2) communications,

 Feed

Cybersecurity researchers have disclosed details of two medium-security flaws in Mitel 6800/6900 desk phones that, if successfully exploited, could allow an attacker to gain root privileges on the devices. Tracked as CVE-2022-29854 and CVE-2022-29855 (CVSS score: 6.8), the access control issues were discovered by German penetration testing firm SySS, following which patches were shipped in May

 Feed

BPFDoor isn't new to the cyberattack game — in fact, it's gone undetected for years — but PwC researchers discovered the piece of malware in 2021. Subsequently, the cybersecurity community is learning more about the stealthy nature of malware, how it works, and how it can be prevented. What's BPFDoor? BPFDoor is a piece of malware associated with China-based threat actor Red Menshen that has hit

 Featured Posts

The transition to a digital-first world enables us to connect, work and live in a realm where information is available at our fingertips. The children of today will be working in an environment of tomorrow that is shaped by hyperconnectivity. Operating in this environment means our present and future generations need   show more ...

to understand the importance of being aware of the benefits and risks of an interconnected world. Establishing a cyber resilient mindset is the first step towards navigating and thriving in this digital-first world. Cyber resilience is the continuous access to personal and business information, even in an era of unprecedented cyber threats. This mindset is especially relevant for children, given their ongoing interaction with the online world through existing and emerging social media platforms, gaming sites and learning avenues. As the usage and reliance on technology to educate and entertain increases, so too does the risk of being exposed to threats. That’s why it’s so important for families to develop good cyber resilience habits while engaging online. Cyber Resilience patch program To help instill cyber awareness, the Girl Scouts of Greater Chicago and Northwest Indiana (GSGCNWI) and OpenText have collaborated to create a Cyber Resilience patch program to empower the Girl Scouts of today for leadership in a digital world tomorrow. This partnership will help raise awareness of the dangers that exist online and the importance of becoming cyber resilient. The Cyber Resilience patch program provides Girl Scouts with the opportunity to engage in fun and educational hands-on activities that ignite awareness and create better online behaviors. The aim of the program is to educate Girl Scouts through lessons that focus on simulations of existing and emerging threats, how to safely preserve important files and memories and what to look out for when browsing online. General tips for children and parents Staying resilient against ongoing threats means adopting important ways of protecting our personal information. Password integrity: Develop a password that is difficult to predict. Use a password generator, enable two-factor authentication (2FA) as much as possible and don’t reuse passwords from multiple logins. Back up personal data: Your photos and videos are precious. If you don’t secure them, you may lose them. Backing up your files means having a second copy available if something happens to your laptop, tablet or phone. Enable a Virtual Private Network (VPN): Protect your connection and location from malicious hackers, targeted ads and others who try to spy and track your every move online. Invest in security awareness training: Engaging in real-world simulations will help increase your cyber know-how. Building a better future through cyber resilience Creating leaders of tomorrow who are empowered and cyber aware begins with establishing cyber resilience today. Families and children should be working towards a better, more agile understanding of the risks to our personal information. Protecting the photos, videos and files that matter to us is important. Keeping our personal identities safe is vital. OpenText remains committed to not only helping organizations find value in their data but also bolstering female leadership and diversity. The partnership between OpenText and GSGCNWI will help instill the importance of developing cyber safe behaviors now and for the future. The post Girl Scouts and OpenText empower future leaders of tomorrow with cyber resilience appeared first on Webroot Blog.

2022-06
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust