Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for $2 million CS:GO inv ...

 News

What the hack?! On June 21, a Twitter user who goes by the name of ohnePixel reported that $2,000,000+ worth of CS:GO skins have been stolen from a hacked account. The stolen items include such rarities as seven Souvenir AWP Dragon Lores, a no-star Karambit, Blue Gems and more. Its worth mentioning that a Souvenir AWP   show more ...

Dragon Lore is the most expensive skin that CS:GO players can own, easily costing tens or even hundreds of thousands of dollars! $2,000,000+ in CS:GO skins have been hacked and stolen (some items getting moved/sold as we speak) this is the most expensive inventory all-time, containing the most legendary items in CS:GO history (7x souvenir dragon lores, no-star karambit, #1 blue gems)@CSGO @Steam pic.twitter.com/d80miZorNh — ohnePixel (@ohnePixel) June 21, 2022 The alleged inventory has been private for the last three years. After the hack, the players started noticing the items in the inventory going public, and thats when they knew something was up! According to the above-mentioned ohnePixel, the e-mail and password of the inventory owners Steam account were changed a week ago, but the hack went unnoticed. Some streams even caught the process live on Twitch! Estimates of how much the stolen inventory could be worth vary from two to over four million dollars. Skins and cosmetics in CS:GO are one of the most expensive items in the world of gaming due to the games huge popularity and long legacy. That said, the hacker either didnt know the actual worth of the stolen items he was selling, or, more likely, preferred to make some quick cash and therefore was selling cheap. Whatever the case, most of the items were sold for a fraction of the market price. Some of the stolen items seems to have been sold recently for a fraction of the normal asking price How to protect your CS:GO treasures Weve been noticing of late a rise in attacks and hacks on almost every popular online game, and its due to a rise in player numbers and investments in virtual items. This is why its crucial to follow a proper guide on protecting your Steam account against scammers and trolls. Weve seen a lot of gamers falling victim to scams and hacks due to a lack of security measures. Some players would rather not have active AV software while playing an online game — in fear of reducing the performance of their machines. However, industry-leading antivirus solutions have a special gaming mode, which ensures your performance isnt affected, notifications are muted, and at the same time your PC stays protected. So dont forget to install a trusted security solution — and dont disable it while playing.

image for Transatlantic Cable  ...

 News

Episode 256 of the Transatlantic Cable kicks off with discussions around NFTs, cryptocurrency and Bill Gates. From there, the team talk about news coming out of the United Kingdom around cookies. It seems that the UK government is keen to make some changes to current cookie legislation, but will this be a win for   show more ...

businesses or consumers? Following that, theres discussion around BidenCash – an underground site making waves by trying to give away stolen credit card information. In addition to this, Dave recently sat down with Boris Larin from Kaspersky GReAT to talk about his recent work modding Metal Gear Solid 2, allowing a true 3rd person perspective camera – something that wasnt possible in the original game. If you liked what you heard, please consider subscribing! Bill Gates says crypto and NFTs are 100% based on greater fool theory Can crumbling cookies sweeten UK data-protection plans? New BidenCash site sells your stolen credit card for just 15 cents

 Trends, Reports, Analysis

In one recent investigation, researchers found several malicious domains by validating the skimmer activity. The threat actor used three unique themes, named after JS libraries to hide the skimmer.

 Expert Blogs and Opinion

The use of artificial intelligence in security should be very focused on multiplying the efforts of security teams, especially considering the current shortage of security skills.

 Trends, Reports, Analysis

Threat actors are using email spam and malicious URLs to deliver LNK files to victims. These files instruct legitimate applications like PowerShell, CMD, and MSHTA to download malicious files.

 Malware and Vulnerabilities

Cisco warned customers of severals bugs affecting Secure Email and Web Manager, Email Security Appliance, Adaptive Security Device Manager, Adaptive Security Appliance, FirePOWER Software, and Enterprise Chat and Email.

 Trends, Reports, Analysis

The study, conducted by the Marsh McLennan Cyber Risk Analytics Center and based on an analysis of nearly 117,000 incidents, found that larger organizations were statistically more likely to have a greater preponderance of API-related incidents.

 Trends, Reports, Analysis

Organizations face three emerging threats that compromise identities, exploit the use of accomplices or insiders and evade current detection and defenses, according to security researcher Oliver Rochford.

 Malware and Vulnerabilities

Tracked as CVE-2022-31083 and issued a CVSS severity score of 8.6, the security issue is described as a scenario in which the authentication adapter for Apple Game Center’s security certificate is not validated.

 Identity Theft, Fraud, Scams

The scams work in a similar manner as on other platforms. Scammers create professional-looking fake profiles and attempt to strike up conversations with users using the in-built messaging feature.

 Malware and Vulnerabilities

According to Bitdefender researchers, the operators behind the RIG exploit kit have swapped the Raccoon Stealer malware with Dridex trojan as part of an ongoing campaign that commenced in January 2021.

 Feed

Red Hat Security Advisory 2022-5029-01 - This release of Red Hat build of Eclipse Vert.x 4.2.7 GA includes security updates. Issues addressed include denial of service and deserialization vulnerabilities.

 Feed

Ubuntu Security Notice 5487-2 - USN-5487-1 fixed a vulnerabilities in Apache. Unfortunately, that update introduced a regression when proxying balancer manager connections in some configurations on Ubuntu 14.04 ESM. This update reverts those changes till further fix. It was discovered that Apache HTTP Server   show more ...

mod_proxy_ajp incorrectly handled certain crafted request. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a denial of service. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a crash or expose sensitive information. Multiple other issues were also originally addressed.

 Feed

Red Hat Security Advisory 2022-5116-01 - An update for puppet-firewall is now available for Red Hat OpenStack Platform 16.2.3 (Train). An issue was address where unmanaged rules could leave the system in an unsafe state via duplicate a comment.

 Feed

Ubuntu Security Notice 5491-1 - Joshua Rogers discovered that Squid incorrectly handled the Gopher protocol. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service.

 Feed

QNAP, Taiwanese maker of network-attached storage (NAS) devices, on Wednesday said it's in the process of fixing a critical three-year-old PHP vulnerability that could be abused to achieve remote code execution. "A vulnerability has been reported to affect PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11 with improper nginx config," the hardware vendor said in an

 Feed

A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in Nim language to strike targets as part of a newly discovered campaign. The novel loader, dubbed Nimbda, is "bundled with a Chinese language greyware 'SMS Bomber' tool that is most likely illegally distributed in the Chinese-speaking web," Israeli cybersecurity

 Feed

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. "We're trying to do the right thing and that's more than other companies working in the industry," Chaim Gelfand, the   show more ...

company's general counsel and chief compliance officer, said, according to a report from Politico.

 Feed

When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline the detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report.  The survey report,

 Guest blog

The UK's National Health Service has warned the public about a spate of fake messages, sent out as SMS text messages, fraudulently telling recipients that they have been exposed to the Omicron variant of COVID-19. Read more in my article on the Tripwire State of Security blog.

 Data loss

Internet-connected jacuzzis find themselves in hot water, and a Google engineer claims that their AI has developed feelings. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

2022-06
Aggregator history
Thursday, June 23
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust