Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 257 of the Transatlantic Cable kicks off with discussions about a concerning story of hacking airplanes and cargo ships – is it possible or just FUD? From there, the team discuss news about an office man in Japan (not much more is known about this mysterious gentleman) who went out for a drink after work and   show more ...

proceeded to lose a USB memory stick with data on over half a million city residents. Talk about a hangover. From there, the team discuss a new age-verification method for Instagram involving selfies and growing concerns for Covid tracking apps that are pivoting away from tracking diseases to broader health related topics. If you liked what you heard, please consider subscribing. Hackers can bring ships and planes to a grinding halt. Japanese man loses USB stick with entire citys personal details Instagram: Video selfies trial to verify age of teens How Covid Tracking Apps Are Pivoting for Commercial Profit

 Threat Actors

Russian hacker group Killnet told Reuters that it was continuing a major cyber attack on Lithuania on Tuesday in retaliation for Vilnius's decision to cease the transit of some goods under European Union sanctions to Russia's Kaliningrad exclave.

 Malware and Vulnerabilities

Threat actors are sharing malspam messages with the subject ‘Free Primary Legal Aid’ to disseminate the DarkCrystal RAT or DCRat onto victims’ systems. 

 Malware and Vulnerabilities

LockBit ransomware affiliates are sending fake copyright infringement emails to propagate the malware. The email contains a compressed file, containing an executable disguised as a PDF doc, which actually is an NSIS installer. Not just LockBit but, in the past, BazarLoader or the Bumblebee malware loader has also carried out similar operations.

 Trends, Reports, Analysis

Cisco Talos researchers developed three techniques to identify ransomware operators' dark websites hosted on public IPs, allowing them to uncover previously unknown infrastructure for the DarkAngels, Snatch, Quantum, and Nokoyawa ransomware groups.

 Incident Response, Learnings

Ukrainian “cyber-police” have arrested nine alleged members of a prolific phishing gang that made 100 million hryvnias ($3.4m) by luring locals with the promise of financial support from the EU.

 Feed

Ubuntu Security Notice 5497-1 - It was discovered that Libjpeg6b was not properly performing bounds checks when compressing PPM and Targa image files. An attacker could possibly use this issue to cause a denial of service. Chijin Zhou discovered that Libjpeg6b was incorrectly handling the EOF character in input data   show more ...

when generating JPEG files. An attacker could possibly use this issue to force the execution of a large loop, force excessive memory consumption, and cause a denial of service.

 Feed

Ubuntu Security Notice 5496-1 - Mike Stroyan discovered that cloud-init could log password hashes when reporting schema failures. An attacker with access to these logs could potentially use this to gain user credentials.

 Feed

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure   show more ...

costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

 Feed

A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate. Sebastien Vachon-Desjardins, who was extradited to the U.S. on March 10, 2022, is accused of conspiracy to commit computer fraud and wire fraud, intentional damage to a protected computer, and transmitting a demand in relation to

 Feed

The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022. The finding comes as Harmony confirmed that its Horizon Bridge, a platform that allows users to move cryptocurrency across different blockchains, had been breached last week.

 Feed

One of the commissioners of the U.S. Federal Communications Commission (FCC) has renewed calls asking for Apple and Google to boot the popular video-sharing platform TikTok from their app stores citing "its pattern of surreptitious data practices." "It is clear that TikTok poses an unacceptable national security risk due to its extensive data harvesting being combined with Beijing's apparently

 Feed

Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the way of them being able to do their jobs effectively. An old school phenomenon  Shadow IT is not new. There have been countless examples of

 Feed

Google's Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated by hack-for-hire groups from India, Russia, and the U.A.E. In a manner analogous to the surveillanceware ecosystem, hack-for-hire firms equip their clients with capabilities to enable targeted attacks aimed at corporates as well as activists, journalists, politicians, and

 Law & order

A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft's facial recognition tech no longer wants to know how you're feeling. All this and much more is discussed in the latest edition of the   show more ...

award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Thom Langford from The Host Unknown podcast. Plus don't miss our featured interview with Bitwarden founder and CTO Kyle Spearrin.

 Feed only

Graham Cluley Security News is sponsored this week by the folks at SolCyber. Thanks to the great team there for their support! If the bad guys don’t discriminate when it comes to who they are attacking, how can your business settle for anything less than the very best security? SolCyber has brought to market a … Continue reading "How to get Fortune 500 cybersecurity without the hefty price tag"

2022-06
Aggregator history
Thursday, June 30
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust