Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Why 8kun Went Offlin ...

 A Little Sunshine

The latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to former President Trump’s invitation to “be wild” in Washington, D.C. on that chaotic day. At the same   show more ...

time the committee was hearing video testimony from 8kun founder Jim Watkins, 8kun and a slew of similar websites were suddenly yanked offline. Watkins suggested the outage was somehow related to the work of the committee, but the truth is KrebsOnSecurity was responsible and the timing was pure coincidence. In a follow-up video address to his followers, Watkins said the outage happened shortly after the Jan. 6 committee aired his brief video testimony. “Then everything that I have anything to do with seemed to crash, so that there was no way for me to go out and talk to anybody,” Watkins said. “The whole network seemed to go offline at the same time, and that affected a lot of people.” 8kun and many other sites that continue to push the false narrative that the 2020 election was stolen from the 45th president have long been connected to the Internet via VanwaTech, a hosting firm based in Vancouver, Wash. In late October 2020, a phone call to VanwaTech’s sole provider of connectivity to the Internet resulted in a similar outage for 8kun. Jim Waktins (top right), in a video address to his followers on Tuesday after 8kun was taken offline. Following that 2020 outage, 8kun and a large number of QAnon conspiracy sites found refuge a Russian hosting provider. But when the anonymous “Q” leader of QAnon suddenly began posting on 8kun again earlier this month, KrebsOnSecurity received a tip that 8kun’s ISP was once again connected to the larger Internet via a single upstream provider based in the United States. On Sunday, July 10, KrebsOnSecurity contacted Psychz Networks, a hosting provider in Los Angeles, to see if they were aware that they were the sole Internet lifeline for 8kun et. al.  Psychz confirmed that in response to a report from KrebsOnSecurity, VanwaTech was removed from its network around the time of the Jan. 6 hearing on Tuesday. 8kun and its archipelago of conspiracy theory communities have once again drifted back into the arms of a Russian hosting provider (AS207651), which is connected to the larger Internet via two providers. Those include AS31500 — which appears to be owned by Russians but is making a fair pretense at being located in the Caribbean; and AS28917, in Vilnius, Lithuania. 8kun’s newfound Russian connections will likely hold, but Lithuania may be a different story. Late last month, pro-Russian hackers claimed responsibility for an extensive distributed denial-of-service (DDoS) attack against Lithuanian state and private websites, which reportedly was in response to Vilnius’s decision to cease the transit of some goods under European Union sanctions to Russia’s Kaliningrad exclave. The Jan. 6 hearing referenced in this story is available via CSPAN.

 Identity Theft, Fraud, Scams

A new SMS-based scam is reaching out to people in New York with a false claim of New York State offering $1,500 rebates owing to high fuel prices. Those who click on the links are redirected to a fake DMV website and urged to enter their personal information. The NYS Office has provided multiple recommendations for staying protected from such phishing scams.

 Expert Blogs and Opinion

Automation is an emerging trend for SOCs. Like Microsoft’s new security patch technology, SOC automation intends to both improve an enterprise’s security posture and reduce the burden on security engineers and security analysts.

 Trends, Reports, Analysis

“The main goal of hackers remains cyber-espionage, disruption of the availability of state information services and even destruction of information systems with the help of wipers,” the SSSCIP said.

 Breaches and Incidents

The Predatory Sparrow threat actor attacked multiple Iranian steel facilities and posted 20GB of corporate documents. Even while the group insists that the attacks are autonomous, it is speculated that the Israeli government is backing the group. However, it's not the first time that the group has claimed responsibility for attacks against Iranian facilities.

 Malware and Vulnerabilities

This specific vulnerability exists in WebGPU, which is a JavaScript API for processing accelerated 3-D graphics and other functions in the browser. CVE-2022-2399 occurs if the user opens a specially crafted web page in Chrome.

 Trends, Reports, Analysis

Digital Shadows, which monitors almost 90 data leak sites on the dark web, observed ransomware groups name 705 victims in Q2 2022, representing a 21% increase over last quarter’s 582.

 Expert Blogs and Opinion

There is no reliable data based on which to determine by when you should remediate certain vulnerabilities. One can rely on the intelligence and data at hand, and based on what other companies have implemented successfully, find good places to start.

 Trends, Reports, Analysis

After first appearing just weeks ago, MaliBot has become one of the most prolific forms of Android malware. According to Check Point, it was the third-most prevalent malware targeting Android users in June, filling the gap left by FluBot.

 Trends, Reports, Analysis

According to Skybox Security, the top four causes of the most significant breaches reported by the affected organizations were human error, misconfigurations, poor maintenance/lack of cyber hygiene, and unknown assets.

 Feed

The botnet behind the largest HTTPS distributed denial-of-service (DDoS) attack in June 2022 has been linked to a spate of attacks aimed at nearly 1,000 Cloudflare customers. Calling the powerful botnet Mantis, the web performance and security company attributed it to more than 3,000 HTTP DDoS attacks against its users. The most attacked industry verticals include internet and telecom, media,

 Feed

An emerging threat cluster originating from North Korea has been linked to developing and using ransomware in cyberattacks targeting small businesses since September 2021. The group, which calls itself H0lyGh0st after the ransomware payload of the same name, is being tracked by the Microsoft Threat Intelligence Center under the moniker DEV-0530, a designation assigned for unknown, emerging, or a

 Feed

New survey reveals lack of staff, skills, and resources driving smaller teams to outsource security. As business begins its return to normalcy (however “normal” may look), CISOs at small and medium-size enterprises (500 – 10,000 employees) were asked to share their cybersecurity challenges and priorities, and their responses were compared the results with those of a similar survey from 2021.

 Feed

A group of academics from the New Jersey Institute of Technology (NJIT) has warned of a novel technique that could be used to defeat anonymity protections and identify a unique website visitor. "An attacker who has complete or partial control over a website can learn whether a specific target (i.e., a unique individual) is browsing the website," the researchers said. "The attacker knows this

2022-07
FRI
SAT
SUN
MON
TUE
WED
THU
JulyAugustSeptember