Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Google Chrome Gets E ...

 Security

Google has released an emergency security update for Google Chrome, as the company is patching a 0-day vulnerability in the browser. While not too many specifics have been offered, the vulnerability is already being exploited in the wild, with Google obviously urging its users to install the latest update as soon as   show more ...

possible. The new version is Chrome 103.0.5060.114, and if you want to install it today, simply check for updates in the browser’ settings page. According to Google itself, the new browser update comes to resolve three different security vulnerabilities, all of which are rated with a high severity rating.   High CVE-2022-2294: Heap buffer overflow in WebRTC. Reported by Jan Vojtesek from the Avast Threat Intelligence team on 2022-07-01 High CVE-2022-2295: Type Confusion in V8. Reported by avaue and Buff3tts at S.S.L. on 2022-06-16 High CVE-2022-2296: Use after free in Chrome OS Shell. Reported by Khalil Zhani on 2022-05-19

image for Favorable exchange r ...

 Threats

Online scammers use all sorts of ways to separate cryptoinvestors from their prized bitcoin. They create fake news sites and promise helicopter money. They even post screenshots in Lightshot with cryptowallet login credentials — this being a trap for folks who have a weakness for other folks secrets and a free lunch.   show more ...

We recently uncovered a new scheme in which YouTube users are lured to a fake cryptoexchange through videos about a bug that supposedly lets them take advantage of a huge discrepancy in exchange rates. The cryptocurrency exchange rate bug Just like traditional currencies, cryptocurrencies exchange rates are determined by the market: as of the writing of this post, one bitcoin is worth around 18 Ethereum on average. But exchange rates may vary between the different platforms where these currencies are traded. The differences are usually small, but what if one of the platforms has a technical glitch that works to buyers advantage? Then it could be those buyers lucky day, and they might strike it rich thanks to the discrepancy in exchange rates. Finding a bug like this is a dream for freebie lovers — and this is exactly what the scammers are promising in videos on YouTube. Using YouTube comments to build hype The first thing the fraudsters do is create a YouTube channel where they post videos describing a clever way to get rich, which they want to share with the cryptocommunity. One of the fraudulent YouTube channels used in this scheme — with just one video posted on the channel In the single video on the channel, the scammers claim that theyve found a bug in one of the automated exchanges: by some happy turn of events, the exchange buys one bitcoin for 184 Ethereum, while on Binance the exchange rate is 18.4. That means that you should get 10 times more money on this website, all because of a vanishing decimal point. In their video, the scammers show an error they allegedly found in the BTC-to-ETH exchange rate To get users excited and steer them away from fact-checking, the fraudsters pad the comments section with bot-posts expressing the deepest of gratitude for the amazing insider knowledge. Fake comments under a video by users who suddenly struck it rich To promote their channel, the scammers go to popular videos made by other people — these are often newly posted ones where the comments section is the most active — and leave comments talking about a bug on a cryptoexchange and recommending a video about it. To make sure the comments dont get lost among others, the bots give them lots of likes. Scammers comments with tons of likes under another creators popular video Directing users to the website The link to the website with the allegedly favorable exchange rate is provided for those who are interested. You guessed it: this website is also run by the scammers. Website of a fake cryptocurrency exchange When they try to sell their crypto on this website, victims see a message saying that the rate is good for only 180 minutes. During that time, victims are asked to transfer the bitcoin they want to sell for Ethereum to a specific cryptowallet address. If the victim sends the bitcoin, they go to the criminals — who of course dont send back any Ethereum in return. A fake cryptoexchange page The described website isnt the only one of its kind: fraudsters are creating dozens of fake cryptoexchanges and YouTube channels for other cryptocurrencies too. The cybercriminals are probably banking on the fact that users will seek out information about the tokens theyre interested in. The website names and addresses may be different, but in every case the scam revolves around a bug in an exchange rate. A bunch of similar fraudulent videos in a YouTube search How to protect yourself As always, your most powerful weapon in combating cybercriminals is vigilance. Always be wary if youre offered something for free, or if you see a deal that looks too good to be true. Ask yourself why someone would want to share that pot of gold with you. If anyone asks you to send funds somewhere, do your homework and check where theyd be going. If youre not confident that the recipient is legitimate, its best not to take the risk no matter how great the deal looks. And make sure that all the devices you use to handle cryptocurrency have a reliable antivirus that will block malicious software and warn you before you visit a suspicious website.

 Expert Blogs and Opinion

Steve Barclay, the UK government minister responsible for cybersecurity, claims that “the greatest cyber threat to the UK – one now deemed severe enough to pose a national security threat – is from ransomware attacks.”

 Breaches and Incidents

Geographic Solutions (GSI) was forced to shut down state labor exchanges and unemployment claims systems, and as many as 40 states and Washington DC, all of which rely on GSI's services, could be affected.

 Malware and Vulnerabilities

Google has issued an unexpected update to its Chrome browser to address a zero-day WebRTC flaw that is actively being exploited. The version Chrome 103.0.5060.114 for Windows and Chrome 103.0.5060.71 for Android will release with the fix soon.

 Govt., Critical Infrastructure

The German Federal Office for Information Security (BSI) has put out an IT baseline protection profile for space infrastructure amid concerns that attackers could turn their gaze skywards.

 Malware and Vulnerabilities

A new infostealer, named YTStealer, is targeting content creators on YouTube in an attempt to steal their authentication tokens and take over their accounts. The buyers of the compromised accounts typically use these stolen authentication cookies to hijack YouTube channels for various scams or demand a ransom from the   show more ...

actual owners. YouTube creators can consider logging out of their accounts on a regular basis to invalidate any authentication tokens that may have previously been created or stolen.

 Govt., Critical Infrastructure

In a recent document, the DoJ said that it pledges to increase “the percentage of reported ransomware incidents from which cases are opened, added to existing cases, or resolved or investigative actions are conducted within 72 hours to 65%.”

 Incident Response, Learnings

The southern Maastricht University in 2019 was hit by a large cyberattack in which criminals used ransomware, a type of malicious software that locks valuable data and can only be accessed once the victim pays a ransom amount.

 Malware and Vulnerabilities

Federal agencies have been ordered to patch their Linux servers against PwnKit within three weeks. The most astounding part is that it remained hidden for over 12 years since pkexec's first release. Successful exploitation of the flaw could induce pkexec to execute arbitrary code. Organizations are   show more ...

recommended to prioritize timely remediation of the issues in order to mitigate any potential risk of exposure to cyberattacks.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 Feed

TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous implant designs in this area, notably the works of Jeff Dileo at DEFCON 271, Pat Hogan at DEFCON 292, Guillaume Fournier and Sylvain Afchain also at DEFCON 293, and Kris   show more ...

Nóva's Boopkit4. The authors reuse and extend some of the techniques pioneered by these previous explorations of the offensive capabilities of eBPF technology.

 Feed

Ubuntu Security Notice 5479-2 - USN-5479-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 16.04 ESM. Charles Fol discovered that PHP incorrectly handled initializing certain arrays when handling the pg_query_params function. A remote attacker could use this issue to cause PHP   show more ...

to crash, resulting in a denial of service, or possibly execute arbitrary code. Charles Fol discovered that PHP incorrectly handled passwords in mysqlnd. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Lockbit version 3.0 ransomware looks for and executes DLLs in its current directory. Therefore, we can hijack a DLL, in this case "RstrtMgr.dll", execute our own code, and terminate the malware pre-encryption. The exploit DLL checks if the current directory is "C:WindowsSystem32" and if not we grab our   show more ...

process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.

 Feed

Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild. The shortcoming, tracked as CVE-2022-2294, relates to a heap overflow flaw in the WebRTC component that provides real-time audio and video communication capabilities in browsers without the need to install plugins or download native

 Feed

Change is a part of life, and nothing stays the same for too long, even with hacking groups, which are at their most dangerous when working in complete silence. The notorious REvil ransomware gang, linked to the infamous JBS and Kaseya, has resurfaced three months after the arrest of its members in Russia. The Russian domestic intelligence service, the FSB, had caught 14 people from the gang. In

 Feed

Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure. "Most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany, and Singapore) to host their ransomware operations sites," Cisco Talos researcher Paul Eubanks 

 Feed

A pro-China influence campaign singled out rare earth mining companies in Australia, Canada, and the U.S. with negative messaging in an unsuccessful attempt to manipulate public discourse to China's benefit. Targeted firms included Australia's Lynas Rare Earths Ltd, Canada's Appia Rare Earths & Uranium Corp, and the American company USA Rare Earth, threat intelligence firm Mandiant said in a

 Feed

A widespread software supply chain attack has targeted the NPM package manager at least since December 2021 with rogue modules designed to steal data entered in forms by users on websites that include them. The coordinated attack, dubbed IconBurst by ReversingLabs, involves no fewer than two dozen NPM packages that include obfuscated JavaScript, which comes with malicious code to harvest

2022-07
FRI
SAT
SUN
MON
TUE
WED
THU
JulyAugustSeptember