Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

For the first time in what feels like a long time, the team are fully reunited to discuss this weeks topics. They kick things off with news that more and more hospitals are under attack from ransomware. From there, the team discuss a strange story about an MP in Australia whos been handed a lifetime ban on Facebook   show more ...

for letting her account get hacked. After that, the team take a brief hiatus so that Elena Molchanova from our business development team can talk about Security Awareness training – a new offering from Kaspersky to help train staff in cybersecurity compliance. Getting back on track, the team close out the podcast with two related stories about TikTok – the first around growing concerns in the West around the data harvesting that the app performs, and the second looks at a worrying story on how some parents are looking to leverage their children for likes and shares. If you like what you heard, please do consider subscribing. Hacking of US hospitals highlights deadly risk of ransomware MP faces lifetime Facebook ban after hackers posted porn on page TikTok has been accused of aggressive data harvesting TikTok moms are removing videos of their children

image for Sky Mavis robbed of  ...

 Threats

We often write about scams promising someone mountains of gold, when in reality the opposite happens and their pockets get emptied. Similarly, cybercriminals can get their hands on the money of entire companies by exploiting the greed and negligence of their employees. Thats exactly what happened with the Ronin   show more ...

Networks blockchain system, created by Sky Mavis for the play-to-earn game Axie Infinity. A Sky Mavis employee downloaded a PDF file with spyware hidden inside, resulting in one of the biggest cryptocurrency thefts ever. The company lost 173 600 ETH and 25.5 million USDC (around $540 million at the time of the incident). We discuss the attack in more detail and share tips on how to protect yourself. A word about Axie Infinity and Ronin Networks Axie Infinity is an online video game in which players earn cryptocurrency with the help of fantastic creatures known as axies which can be bred, used in competitions and sold to other players. To players, axies look like cuddly animals, but they are essentially non-fungible tokens (NFTs). Released in 2018, Axie Infinity soon gained a wide audience. At its peak, players could earn so much that for some in South East Asia it became a full-time job. In its record-breaking November 2021, the game had a daily player count of 2.7 million and revenues last year hit $215 million per week (by the summer of 2022, however, they had dipped to a modest $1 million per week). Payments in the Axie Infinity ecosystem are made using the in-game currency Smooth Love Potion (SLP), based on the Ethereum blockchain. To allow users to buy and sell SLP for regular cryptocurrency conveniently and without high fees, the developers created the Ronin platform. It was this platform that attracted cybercriminal attention. A juicy offer: how scammers tricked the developers To get to the platform, the attackers carried out a targeted attack on Sky Mavis employees. They collected information about the company and devised a scam built around a fake job offer with a very attractive salary. The scheme involved sending (most likely on LinkedIn) a tempting job offer to a senior engineer, who should have known better. Having passed all the selection stages with flying colors, the employee, as expected, received the mouth-watering offer in the form of a PDF file. When this file was downloaded, the spyware inside it was released into the companys network. Spyware in action: withdrawal of funds The cybercriminals used the malware to gain access to the private keys of network validators, that is, nodes that verify and confirm cryptocurrency transactions. There were nine such validators in Ronin Networks at the time of the attack, and to carry out the transfer, at least five of them had to approve it. Eventually, the attackers managed to compromise four validators at the company itself and a fifth in the decentralized autonomous organization Axie DAO, where it would (and should) not have been, were it not for an oversight on the part of Sky Mavis itself. Turns out in November 2021, due to the high volume of transactions and load on the validators, the company allowed Axie DAO to approve transfers. After a month, the load decreased, and Axie DAOs assistance was no longer required — but the rights to approve transactions were not withdrawn, which played into cybercriminals hands. Having penetrated the Sky Mavis system, the hackers also gained access to Axie DAO, which provided the fifth validator needed to withdraw funds from others accounts to their own. The Sky Mavis response On discovering the attack, Sky Mavis acted responsibly and took steps to beef up security. The company brought in outside security experts from Verichains and CertiK, and conducted a thorough audit of Ronin Networks. Sky Mavis also increased the number of validators to 11, promising to gradually scale up to at least 100. The larger the total number of validators there are, the more of them have to be compromised to carry out unauthorized transactions, so increasing their number should in theory make such attacks more difficult. Since the stolen funds actually belonged to Axie Infinity players, Sky Mavis began compensation payments to victims on June 28. For this, the company leveraged both its own resources and $150 million of Binance funding received in early April. How to stay protected When planning targeted attacks, cybercriminals carefully study the victim for weak spots. These can be both security holes in devices and software, as well as the human factor. The hero of our post was an experienced IT specialist, but even they were duped. To avoid a similar fate and keep hold of your data, money and tokens, stay vigilant and do not neglect security measures. Do not trust unexpected generous offers: be it your dream job with a huge salary, a prize, an inheritance from some far-flung relative or other heaven-sent goodies. Avoid downloading files or following links in e-mails and messages from senders you dont know. All the more so if youre on the office network and the files and links are not work-related. Use a reliable security solution that will prevent malware from running on your device.

 Malware and Vulnerabilities

A dark web ransomware forum ad has listed a new ransomware family, dubbed Luna, that can encrypt multiple platforms, including Windows, Linux, and ESXi systems. Luna is simple ransomware that is still in development and has limited capabilities. Stay tuned for more updates on Luna with daily threat intel.

 Malware and Vulnerabilities

Atlassian released security updates to address a critical hardcoded credentials vulnerability in Confluence Server and Data Center tracked as CVE-2022-26138. A remote, unauthenticated attacker can exploit the flaw to log into unpatched servers.

 Security Tips and Advice

NIST’s new draft publication is designed to help the healthcare industry maintain the confidentiality, integrity, and availability of electronic protected health information, or ePHI.

 Govt., Critical Infrastructure

Kiran Ahuja, director of the Office of Personnel Management, told lawmakers on Thursday that her agency wants “to work with Congress to develop a government-wide cyber workforce plan that puts agencies on equal footing in competing for cyber talent.”

 Malware and Vulnerabilities

First on the list is CVE-2022-2030, an authenticated directory traversal vulnerability in the Common Gateway Interface (GLI) programs of some Zyxel firewalls. This was caused by specific character sequences within an improperly sanitized URL.

 Incident Response, Learnings

Settlements in class action lawsuits filed in the aftermath of two separate major breaches serve as the latest examples of threats and risks involving email hacks - as well as underlining the threat of litigation in the wake of such incidents.

 Feed

Apple Security Advisory 2022-07-20-4 - Security Update 2022-005 Catalina addresses code execution, information leakage, null pointer, out of bounds read, and out of bounds write vulnerabilities.

 Feed

Apple Security Advisory 2022-07-20-2 - macOS Monterey 12.5 addresses bypass, code execution, information leakage, null pointer, out of bounds read, out of bounds write, and spoofing vulnerabilities.

 Feed

Apple Security Advisory 2022-07-20-1 - iOS 15.6 and iPadOS 15.6 addresses buffer overflow, bypass, code execution, information leakage, null pointer, out of bounds read, out of bounds write, and spoofing vulnerabilities.

 Feed

Ukrainian radio operator TAVR Media on Thursday became the latest victim of a cyberattack, resulting in the broadcast of a fake message that President Volodymyr Zelenskyy was seriously ill. "Cybercriminals spread information that the President of Ukraine, Volodymyr Zelenskyy, is allegedly in intensive care, and his duties are performed by the Chairman of the Verkhovna Rada, Ruslan Stefanchuk,"

 Feed

The actively exploited but now-fixed Google Chrome zero-day flaw that came to light earlier this month was weaponized by an Israeli spyware company and used in attacks targeting journalists in the Middle East. Czech cybersecurity firm Avast linked the exploitation to Candiru (aka Saito Tech), which has a history of leveraging previously unknown flaws to deploy a Windows malware dubbed

 Feed

Microsoft has officially resumed blocking Visual Basic for Applications (VBA) macros by default across Office apps, weeks after temporarily announcing plans to roll back the change. "Based on our review of customer feedback, we've made updates to both our end user and our IT admin documentation to make clearer what options you have for different scenarios," the company said in an update on July

 Feed

Google on Thursday said it's backtracking on a recent change that removed the app permissions list from the Google Play Store for Android across both the mobile app and the web. "Privacy and transparency are core values in the Android community," the Android Developers team said in a series of tweets. "We heard your feedback that you find the app permissions section in Google Play useful, and

 Feed

Python has its pros and cons, but it's nonetheless used extensively. For example, Python is frequently used in data crunching tasks even when there are more appropriate languages to choose from. Why? Well, Python is relatively easy to learn. Someone with a science background can pick up Python much more quickly than, say, C. However, Python's inherent approachability also creates a couple of

 Feed

Network security company SonicWall on Friday rolled out fixes to mitigate a critical SQL injection (SQLi) vulnerability affecting its Analytics On-Prem and Global Management System (GMS) products. The vulnerability, tracked as CVE-2022-22280, is rated 9.4 for severity on the CVSS scoring system and stems from what the company describes is an "improper neutralization of special elements" used in

2022-07
FRI
SAT
SUN
MON
TUE
WED
THU
JulyAugustSeptember