Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for LastPass Confirms Se ...

 Security

LastPass has publicly acknowledged a security incident, revealing that a developer account was compromised, with cybercriminals managing to access portions of the source code and some proprietary technical information. The security breach took place earlier this month, LastPass says, and after an investigation, the   show more ...

company was able to confirm that no user data was exposed. With the help of a cybersecurity and forensics firm, LastPass says it determined that users’ master passwords and vaults haven’t been compromised – for what it’s worth, the master passwords aren’t being stored on LastPass servers in the first place. “Two weeks ago, we detected some unusual activity within portions of the LastPass development environment. After initiating an immediate investigation, we have seen no evidence that this incident involved any access to customer data or encrypted password vaults,” Last... (read more)

image for Transatlantic Cable  ...

 News

Welcome to the Transatlantic Cable a podcast that dives into hot topics in the security news and industry each week. We start off this episode with Airbnb rolling out new anti-party tech to prevent unapproved gatherings. Then, we move to asset managers on alert after the recent WhatsApp crackdown on banks! We also   show more ...

discuss the chief executive of Norways sovereign wealth fund, which has warned that cybersecurity has overshadowed any other concerns about the markets in recent years. Then we finish off with Daniel Kelley, who was convicted and sent to prison for his involvement in a high-profile cyberattack on TalkTalk in 2015 trying to be a Whitehat. If you liked what you heard, please do consider subscribing. Exclusive: Airbnb rolls out new anti-party tech to prevent unapproved gatherings Asset managers on alert after WhatsApp crackdown on banks Norwegian sovereign wealth fund chief says hes more worried about cybersecurity than markets, even after $174 billion loss I went to prison for the £77m TalkTalk hacking. I could be sent back for ordering a McDonalds

 Trends, Reports, Analysis

The researchers recently discovered an ELF sample that acts as a bot and can run scripts on the victim machine using the Tox protocol. The binary is written in C and has only statically linked the c-toxcore library.

 Malware and Vulnerabilities

Grandoreiro banking malware is targeting the automotive, manufacturing, and chemical industries in Mexico and Spain by masquerading as the Attorney General’s Office of Mexico City and the Public Ministry. Grandoreiro operators are only interested in carrying out highly-targeted attacks as they continue to innovate their tactics.

 Malware and Vulnerabilities

Like many ransomware strains, BlackByte has reemerged after a brief hiatus—and in its second iteration has already taken to hacker forums to push a new Tor data leak site that taps some familiar LockBit 3.0 techniques.

 Trends, Reports, Analysis

Some of the most well-hidden and advanced skimmer infections that researchers have seen targeting WordPress sites actually modify existing plugin files to make their code look like it’s supposed to belong within the file structure.

 Security Products & Services

Paranoid contains implementations and optimizations extracted from existing crypto-related literature, which “showed that the generation of these artifacts was flawed in some cases,” Google explains.

 Breaches and Incidents

Hackers abused a zero-day vulnerability in General Bytes Bitcoin ATM servers, allowing them to hijack transactions related to fund withdrawal and deposits. It's not known how many servers were attacked using the flaw and how much cryptocurrency was stolen. The ATM maker has provided steps to perform on the devices before using the service.

 Feed

Red Hat Security Advisory 2022-6188-01 - This is an updated release of the Node Maintenance Operator. The Node Maintenance Operator cordons off nodes from the rest of the cluster and drains all the pods from the nodes. By placing nodes under maintenance, administrators can proactively power down nodes, move workloads to other parts of the cluster, and ensure that workloads do not get interrupted.

 Feed

The Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

 Feed

Password management service LastPass confirmed a security incident that resulted in the theft of certain source code and technical information. The security breach is said to have occurred two weeks ago, targeting its development environment. No customer data or encrypted passwords were accessed. “An unauthorized party gained access to portions of the LastPass development

 Feed

Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control (C2) framework in their intrusion campaigns as a replacement for Cobalt Strike. “Given Cobalt Strike’s popularity as an attack tool, defenses against it have also improved over time,” Microsoft security experts said. “Sliver thus presents an attractive alternative for actors looking for a

 Feed

Atlassian has rolled out fixes for a critical security flaw in Bitbucket Server and Data Center that could lead to the execution of malicious code on vulnerable installations. Tracked as CVE-2022-36804 (CVSS score: 9.9), the issue has been characterized as a command injection vulnerability in multiple endpoints that could be exploited via specially crafted HTTP requests. “An

2022-08
Aggregator history
Friday, August 26
MON
TUE
WED
THU
FRI
SAT
SUN
AugustSeptemberOctober