Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 266 of the Transatlantic Cable kicks off with news that TikTok has had a data breach. However, all is not as it appears. After digging into the details, it appears that the breach may not be as clear cut as it first seems. Following that, the team look at a story concerning Samsung and a confirmed data breach   show more ...

– Samsung is asking affected people to secure their accounts and reset passwords. From there, the discussion moves to a story around Instagram, having just been on the receiving end of a whopping €405 million fine due to the exposure of childrens data online. To wrap up, the team look at a story from the Guardian investigating doom scrolling, which is defined as the tendency to be glued to bad news [which] can spark a vicious cycle that interferes with our lives. If you liked what you heard, please do consider subscribing. TikTok denies reports that its been hacked Samsung says a data breach revealed some customers names, birthdays Instagram fined €405m over childrens data privacy Doomscrolling linked to poor physical and mental health, study finds

 Malware and Vulnerabilities

Malware infiltrating Android devices to steal bank login details is nothing new, but the threat around it is only growing intense with the detection of new variant of SharkBot and the introduction of a new trojan, dubbed Zanubis. To keep malware infections at bay, users must be mindful before giving unnecessary permissions to apps. 

 Malware and Vulnerabilities

Uptycs researchers found an ELF ransomware encrypting files in Linux systems according to the provided folder path. Based on the Onion link in the binary, it is believed to be still under development.

 Malware and Vulnerabilities

CodeRAT author leaked the source code of the malware on GitHub after being confronted by security researchers. It was being used to target Farsi-speaking code developers via a Word document hosting Dynamic Data Exchange (DDE) exploit. CodeRAT supports 50 commands such as taking screenshots, copying the clipboard, list   show more ...

of running processes, terminating processes, checking GPU usage, downloading, uploading, and deleting files. 

 Malware and Vulnerabilities

LockBit ransomware group has enhanced its technical capabilities and infrastructure in the form of protection from DDoS attacks and adopting triple extortion tactics. Further, the operators announced an increase in duplicate servers and mirrors and an increase in the availability of stolen data by using Clearnet via a bulletproof storage service.

 Malware and Vulnerabilities

Cisco Talos has reported about cybercriminals dropping ModernLoader RAT and RedLine Stealer, in three different campaigns. In one of the campaigns earlier this year, it was also observed delivering the XMRig cryptomining malware. Attackers compromise vulnerable web apps to host their malware that are delivered via files masquerading as Amazon gift cards.

 Malware and Vulnerabilities

First discovered in June 2021, the Redeemer ransomware has since been released in four different versions - 1.0, 1.5, 1.7, and 2.0. All the versions, written in C++, bring major changes in the way they encrypt files.

 Security Products & Services

Curated and reviewed by the Go security team, based on CVEs, GitHub Security Advisories, and reports from maintainers, the new vuln.go.dev website host a list of known vulnerabilities in packages that can be imported from public Go modules.

 Companies to Watch

The company is currently in stealth mode and has yet to be officially launched. Some of the most prominent venture capital firms took part in the seed round, including Greylock, Cyberstarts, Leaders VC, and other private investors.

 Security Products & Services

The newly introducted Zoom Customer Managed Key lets customers implement encryption technology of their choice to encrypt voicemails, cloud recordings, and calendar access, among others.

 Expert Blogs and Opinion

Between July 25 and 29, UN member states gathered in New York for the third substantive session of the Open-Ended Working Group on the security in and of information and communications technologies (OEWG).

 Expert Blogs and Opinion

A layered defense is important to make it difficult to carry out a successful attack, but by adopting a recovery-first strategy you also limit the damage of an attack so perpetrators look elsewhere for a more profitable, easier-to-take-down quarry.

 Expert Blogs and Opinion

While solutions exist for prevention, most solutions focus on one or a few types of fraud. Fraud happens at such an unprecedented scale that utilizing law enforcement to disrupt bad actors is a hard value proposition.

 Malware and Vulnerabilities

This zero-day bug is caused by a faulty password validation algorithm that attackers could exploit to log into the VPN on vulnerable devices using what the company describes as "crafted credentials" if the IPSec VPN Server feature is enabled.

 Expert Blogs and Opinion

Malicious redirects are the most common example of .ico malware seen by Sucuri researchers but attackers leverage this file type for other purposes as well, including concealing credit card skimmers.

 Companies to Watch

The cloud-native data security company plans to use the new funding to expand its engineering, sales, and marketing operations, to accelerate its roadmap and support for large enterprises.

 Feed

This Metasploit module exploits an unauthenticated command injection vulnerability in Apache Spark. Successful exploitation results in remote code execution under the context of the Spark application user. The command injection occurs because Spark checks the group membership of the user passed in the ?doAs parameter   show more ...

by using a raw Linux command. It is triggered by a non-default setting called spark.acls.enable. This configuration setting spark.acls.enable should be set true in the Spark configuration to make the application vulnerable for this attack. Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1 are affected by this vulnerability.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

 Feed

Red Hat Security Advisory 2022-6389-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a HTTP request smuggling vulnerability.

 Feed

Red Hat Security Advisory 2022-6393-01 - The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource   show more ...

management, live migrations, and virtual infrastructure provisioning. Issues addressed include code execution, cross site scripting, and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.

 Feed

Red Hat Security Advisory 2022-6382-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-6287-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.3. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

 Feed

Red Hat Security Advisory 2022-6384-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-6385-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-6383-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-6386-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a denial of service vulnerability.

 Feed

Ubuntu Security Notice 4976-2 - USN-4976-1 fixed a vulnerability in Dnsmasq. This update provides the corresponding update for Ubuntu 16.04 ESM. Dnsmasq has been updated to 2.79-1 for Ubuntu 16.04 ESM in order to fix some security issues. Petr Mensik discovered that Dnsmasq incorrectly randomized source ports in   show more ...

certain configurations. A remote attacker could possibly use this issue to facilitate DNS cache poisoning attacks.

 Feed

Microsoft's threat intelligence division on Wednesday assessed that a subgroup of the Iranian threat actor tracked as Phosphorus is conducting ransomware attacks as a "form of moonlighting" for personal gain. The tech giant, which is monitoring the activity cluster under the moniker DEV-0270 (aka Nemesis Kitten), said it's operated by a company that functions under the public aliases Secnerd and

 Feed

Cisco on Wednesday rolled out patches to address three security flaws affecting its products, including a high-severity weakness disclosed in NVIDIA Data Plane Development Kit (MLNX_DPDK) late last month. Tracked as CVE-2022-28199 (CVSS score: 8.6), the vulnerability stems from a lack of proper error handling in DPDK's network stack, enabling a remote adversary to trigger a denial-of-service (

 Feed

Major financial and insurance companies located in French-speaking nations in Africa have been targeted over the past two years as part of a persistent malicious campaign codenamed DangerousSavanna. Countries targeted include Ivory Coast, Morocco, Cameroon, Senegal, and Togo, with the spear-phishing attacks heavily focusing on Ivory Coast in recent months, Israeli cybersecurity firm Check Point 

 Feed

A malicious campaign mounted by the North Korea-linked Lazarus Group is targeting energy providers around the world, including those based in the United States, Canada, and Japan. “The campaign is meant to infiltrate organizations around the world for establishing long-term access and subsequently exfiltrating data of interest to the adversary’s nation-state,” Cisco Talos said in a report shared

 Feed

A Chinese hacking group has been attributed to a new campaign aimed at infecting government officials in Europe, the Middle East, and South America with a modular malware known as PlugX. Cybersecurity firm Secureworks said it identified the intrusions in June and July 2022, once again demonstrating the adversary's continued focus on espionage against governments around the world. "PlugX is

 Feed

A recent report revealed that ecommerce provider, Shopify uses particularly weak password policies on the customer-facing portion of its Website. According to the report, Shopify's requires its customers to use a password that is at least five characters in length and that does not begin or end with a space.  According to the report, Specops researchers analyzed a list of a billion passwords

 Feed

Multiple security vulnerabilities have been disclosed in Baxter's internet-connected infusion pumps used by healthcare professionals in clinical environments to dispense medication to patients. "Successful exploitation of these vulnerabilities could result in access to sensitive data and alteration of system configuration," the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in

 Law & order

Students learn a valuable lesson when it comes to AI detecting guns on campus, SIM swappers are surprisingly stupid, and romance scammers get scammed by someone (or some thing?) calling themselves Chiquita Banana. All this and much more is discussed in the latest edition of the award-winning "Smashing   show more ...

Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.

2022-09
Aggregator history
Thursday, September 08
THU
FRI
SAT
SUN
MON
TUE
WED
SeptemberOctoberNovember