Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to protect corpo ...

 Business

IoT devices have long been an integral part of the technological and production processes of many modern companies. They are used in industrial facilities, in smart buildings, and in everyday office life. However, their safety has always raised concerns. Especially considering that many devices require access to   show more ...

remote systems via the Internet — for firmware updates, monitoring, or management. In fact, the introduction of IoT devices into corporate infrastructure greatly increases the attack surface, and there is no way to equip every device with protective technologies. What should IoT devices be protected from? In general, some unprotected network device can become a foothold for further attacks on corporate infrastructure. There are several search engines that can scan ranges of IP addresses according to given parameters (analogues of the Shodan system). In theory, these are the tools of researchers, but in fact they are also often used by cybercriminals, who can search for vulnerable or simply outdated IoT devices connected to the Internet. Then everything depends on the intentions of the attackers and the specific weaknesses of the IoT device — sometimes criminals try to seize control through the web interface, sometimes slip a fake firmware update, and sometimes they simply disable the device. IoT botnets are doing something similar, infecting many IoT devices and using them for further DDoS attacks. Another possible malicious use of IoT devices is spying. Last year, a group of hackers gained access to 150,000 IP cameras in companies, hospitals, schools, police stations and even prisons and released a number of videos. This incident shows well how easy it is to look into the premises of quite secret organizations. But espionage is not limited solely to cameras — attackers can try to intercept data streams from a variety of devices (for example, some kind of sensors). Industrial Internet of Things (IIoT) devices present an even more severe problem. The potential interference in the production processes of a critical infrastructure facility can lead to catastrophic consequences for both the company and the environment. How to protect IoT devices In order to secure the entire fleet of IoT or IIoT devices used in your company from cyberthreats, it is not at all necessary to isolate from the Internet. Their communication with cloud services can be organized through a specialized security gateway. Recently we presented such a solution — the Kaspersky IoT Secure Gateway 1000. Our gateway is able to protect IoT devices from network attacks, DDoS, MitM attacks, and other malicious activity. Kaspersky IoT Secure Gateway 1000 is built as part of a cyber immunity strategy based on our own operating system, KasperskyOS, thanks to which it is itself reliably protected from outside interference. You can learn more about the principle of cyber immunity and using KasperskyOS n the Best Practice Cyber Immunity 2022 whitepaper. It also contains several real cases of the Kaspersky IoT Secure Gateway 1000 usage for protection of critical infrastructure. Kaspersky IoT Secure Gateway 1000 is managed through the Kaspersky Security Center console, which allows network administrators to view all security events and provides specialists with information about running IoT devices. It supports Syslog and MQTT protocols to send events to external monitoring systems and cloud platforms, including Microsoft Azure, Siemens MindSphere, AWS, IBM Bluemix and others. Detailed information about the device itself, as well as about other cyber-immune developments of Kaspersky Lab, can be found on the Kaspersky IoT Infrastructure Security page.

 Malware and Vulnerabilities

Researchers disclosed that NightLion hackers have been on a data-wiping mission and it is fraudulently claiming that Night Lion security company and Shadow Byte are behind the act. Hackers have been trying to exact virtual revenge on Vinny Troia, a security researcher, pentester, and owner of Night Lion Security and Shadowbyte, ever since he published a book revealing secrets of The Dark Overlord.

 Threat Actors

A threat actor infiltrated the networks of building automation systems of several Asian organizations by exploiting the Proxylogon flaw in Microsoft Exchange. Last year, the Dutch Institute for Vulnerability Disclosure reported around 46,000 unpatched servers against the ProxyLogon flaw last year. Encrypting   show more ...

sensitive information and implementing proper access control to protect the data should be made the priority/

 Malware and Vulnerabilities

A joint advisory warned against threat actors ramping up attacks against unpatched Log4Shell vulnerability in VMware and UAG servers. APT groups moving laterally throughout the network could get access to a disaster recovery network. In case of a potential compromise is detected, administrators should apply the incident response recommendations without fail.

 Malware and Vulnerabilities

Microsoft patched a container escape bug known as FabricScape in the Service Fabric application hosting platform, which could let adversaries compromise the SF Linux cluster. Tracked as CVE-2022-30137, FabricScape works only on containers configured to have runtime access. Thankfully, there is no evidence so far that FabricScape has been exploited in real-world attacks.

 Threat Actors

China-based Dragonbridge hacker group launched influence campaigns against rare earth mining companies in the USA and Australia via thousands of fake social media accounts. The Chinese threat actors claim that the building of a rare earth processing facility in Texas would expose the local population to radioactive   show more ...

contamination and health problems. Organizations must stay vigilant and report if there’s any wrong content against them.

 Malware and Vulnerabilities

The flaw is a Windows LSA Spoofing vulnerability actively exploited in the wild. The vulnerability can be exploited by an unauthenticated attacker to force a domain controller to authenticate against another server using NTLM.

 Threat Actors

Avast security researchers have discovered a server on Discord where a group of minors is involved in developing, upgrading, marketing, and selling malware and ransomware strains on the platform, supposedly to earn pocket money.

 Malware and Vulnerabilities

Security researchers have published technical details and proof-of-concept exploit code for CVE-2022-28219, a critical vulnerability in the Zoho ManageEngine ADAudit Plus tool for monitoring activities in the Active Directory.

 Trends, Reports, Analysis

Professor Edward Burke made the comment following the report of High Court judge Charles Meenan, who supervises the interception of phone calls and post, and access to traffic data on private communications.

 Malware and Vulnerabilities

A new Revive banking trojan was found targeting users of BBVA, a Spanish financial services company. Revive follows a more focused approach - the bank and not customers as its prime targets. While the malware is in its early developmental stages, it is designed for persistent campaigns. Training employees and using the right cybersecurity tools is the need of the hour to protect against banking Trojans like Revive.

 Malware and Vulnerabilities

Tracked as CVE-2022-34265, the potential SQL Injection vulnerability impacts Django's main branch, and versions 4.1 (currently in beta), 4.0, and 3.2, with patches and new releases issued that squash the vulnerability.

 Feed

Red Hat Security Advisory 2022-5491-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow and privilege escalation vulnerabilities.

 Feed

Ubuntu Security Notice 5500-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Lin Ma discovered that the NFC Controller Interface   show more ...

implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5493-2 - It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service.

 Feed

Ubuntu Security Notice 5485-2 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on   show more ...

microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.

 Feed

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

 Feed

Lockbit ransomware version 3.0 apparently now requires a password to execute as noted by "@vxunderground", but does not properly check bounds for both the -pass and -k arguments. Supplying a long string of characters for either flag will trigger a unicode stack buffer overflow overwriting the ECX register and structured exception handler (SEH).

 Feed

Vulnerability coordination and bug bounty platform HackerOne on Friday disclosed that a former employee at the firm improperly accessed security reports submitted to it for personal gain. "The person anonymously disclosed this vulnerability information outside the HackerOne platform with the goal of claiming additional bounties," it said. "In under 24 hours, we worked quickly to contain the

 Feed

The Cyber Police of Ukraine last week disclosed that it apprehended nine members of a criminal gang that embezzled 100 million hryvnias via hundreds of phishing sites that claimed to offer financial assistance to Ukrainian citizens as part of a campaign aimed at capitalizing on the ongoing conflict. "Criminals created more than 400 phishing links to obtain bank card data of citizens and

 Feed

Gardeners know that worms are good. Cybersecurity professionals know that worms are bad. Very bad. In fact, worms are literally the most devasting force for evil known to the computing world. The MyDoom worm holds the dubious position of most costly computer malware ever – responsible for some $52 billion in damage. In second place… Sobig, another worm. It turns out, however, that there are

2022-07
FRI
SAT
SUN
MON
TUE
WED
THU
JulyAugustSeptember