Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 271 kicks off with talk around a recent story suggesting that a third of children have adult social media accounts, in an attempt to access the full version of social sites. From there, discussion moves over to talk about TikTok and third-party tracking – something readers with long memories will remember   show more ...

that Facebook Meta has been doing for quite some time already. To wrap up, the duo discuss two stories around crypto, the first around Kim Kardashian and a crypto pump and dump, and a story around a married couple who were accidently sent $10M in crypto instead of $100. If you liked what you heard, please do consider subscribing! A third of children have adult social media accounts Kim Kardashian pays $1.26m over crypto pump and dump TikTok is tracking people on sites across the web—even if they dont use the app Couple mistakenly given $10.5m from Crypto.com thought they had won contest

image for Episode 244: ZuoRAT  ...

 broadband router

In this episode of the Security Ledger podcast, brought to you by ReversingLabs, we interview Danny Adamitis (@dadamitis) of Black Lotus Labs about the discovery of ZuoRAT, malware that targets SOHO routers – and is outfitted with APT-style tools for attacking the devices connected to home networks. As always,   show more ...

 you can check our full...Read the whole entry... » Click the icon below to listen. Related StoriesEpisode 241: If Its Smart, Its Vulnerable a Conversation with Mikko HyppönenEpisode 241: If Its Smart, Its Vulnerable a Conversation wit Mikko HyppönenEpisode 240: As Stakes Of Attacks Grow, Can Cyber Policy “Shift Right”?

 Trends, Reports, Analysis

Tens of thousands of organizations each year are now affected by a hack involving Cobalt Strike, warned HHS. Apart from using Cobalt Strike, threat actors are using PowerShell, Mimikatz, Sysinternals, Brute Ratel, and Anydesk against healthcare facilities. State-sponsored threat actors, mostly the ones located in Russia, Vietnam, China, and Iran are leading the chart in the misusing Cobalt Strike.

 Laws, Policy, Regulations

India's minister of state for electronics and information technology to extend the deadline to comply with sweeping new information security reporting rules that were imposed as an essential national defense mechanism.

 Malware and Vulnerabilities

Threat actors behind the IcedID malware have been found using a variety of propagation methods, including changing the management of C2 server IPs, in their phishing campaigns. The attackers were found registering fresh domains for C2, instead of relying on the old ones.

 Breaches and Incidents

The hospital system detected a ransomware attack that led to three days of reduced functionality at the Barcelona hospitals Dos de Maig and Creu Roja de l'Hospitalet and the nearby Moisès Broggi facility in Sant Joan Despí.

 Security Products & Services

To use the new RSS feed feature, you need to install an RSS Feed reader, whether a desktop application, mobile app, or browser extension. Once you subscribe to the feed, you will automatically receive notifications when Microsoft adds a new CVE.

 Trends, Reports, Analysis

SEO spam was the most common infection seen in our remote scan data, followed by injected malware. SEO spam infections also happen to be one of the most common types of malware found during remediation cleanup.

 Breaches and Incidents

Advanced informed that no data was taken from the other products it hosts, and it has “recovered the limited amount of data” that the crooks swiped from the infected systems.

 Breaches and Incidents

The incident happened in late March 2022 and the breached systems contained LDS church members' basic contact information but did not include banking history or other financial information associated with donations.

 Companies to Watch

The integration of Hardenize’s unique ASM capabilities enables the Red Sift platform to gain a comprehensive view of an organization’s digital footprint, allowing customers to better understand and protect their entire critical attack surface area.

 Identity Theft, Fraud, Scams

The phishing campaign uses the coding technique to obfuscate phishing sites to make them appear legitimate to the end user as well as fool security gateways. The messages direct a user to a link that directs them to a credential-harvesting page.

 Govt., Critical Infrastructure

Ransomware attacks on industrial targets continue to rise, accounting for more than half of all malware on industrial endpoints. They have also become highly sophisticated, able to exploit long unpatched vulnerabilities as well as zero-days.

 Malware and Vulnerabilities

The attack chain begins when the user visits a website controlled by the attackers, designed to look like legitimate websites and services that victims are tricked into visiting in one of a number of ways.

 Malware and Vulnerabilities

A ransomware attack delivered by fake Windows 10 and antivirus software updates is targeting home users, using sneaky techniques to stay undetected before encrypting files and demanding a ransom payment of thousands of dollars.

 Malware and Vulnerabilities

Security researchers at WithSecure, previously F-Secure Business, found that it is possible to partially or fully infer the contents of encrypted messages sent through Microsoft Office 365 due to the use of a weak block cipher mode of operation.

 Malware and Vulnerabilities

Researchers are drawing attention to Microsoft's use of the algorithm because Microsoft-encrypted email could betray their senders under conditions in which an adversary can gather large volumes of messages.

 Trends, Reports, Analysis

It was found that the oil and gas industry averaged 6 days for system outages due to cyberattacks, one day longer than five days for other industries. In addition, 65% of respondents said that the system stopped for more than four days.

 Identity Theft, Fraud, Scams

A malicious version of the popular WhatsApp messaging app was found dropping an Android trojan known as Triada. Named YoWhatsApp, the unofficial app offers the ability to lock chats, send texts to unsaved numbers, and customize using different themes. It is spread to users via fraudulent ads on Snaptube and Vidmate.

 Malware and Vulnerabilities

Ransom Cartel is ransomware as a service (RaaS) that surfaced in mid-December 2021. This ransomware performs double extortion attacks and exhibits several similarities and technical overlaps with REvil ransomware.

 Breaches and Incidents

Over 80,000 drone IDs were exposed in a data leak after a database containing information from dozens of airspace monitoring devices manufactured by the Chinese-owned DJI was left accessible to the public.

 Malware and Vulnerabilities

Microsoft is reportedly looking into reports of a new zero-day bug abused to hack Exchange servers which were later used to launch Lockbit ransomware attacks. Recently, two more zero-days tracked under the moniker ProxyNotShell (CVE-2022-41040 and CVE-2022-41082) were chained by attackers to gain remote code execution on servers with elevated privileges.

 Emerging Threats

A new attack and C2 framework, dubbed Alchimist, was found capable of targeting Linux, macOS, and Windows systems. It can run arbitrary commands and perform remote shellcode execution. These kinds of frameworks have high quality, rich features, good detection evasion capabilities, and effective implant-dropping functions.

 Feed

A proof-of-concept (PoC) exploit code has been made available for the recently disclosed critical security flaw affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager, making it imperative that users move quickly to apply the patches. "FortiOS exposes a management web portal that allows a user to configure the system," Horizon3.ai researcher James Horseman said. "Additionally, a user can

 Feed

Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. Characterizing it as a "multi-vector attack consisting of UDP and TCP floods," researcher Omer Yoachimik said the DDoS attack targeted the Minecraft server Wynncraft in Q3 2022. "The entire 2.5 Tbps attack lasted about 2 minutes,

 Feed

A PHP version of an information-stealing malware called Ducktail has been discovered in the wild being distributed in the form of cracked installers for legitimate apps and games, according to the latest findings from Zscaler. "Like older versions (.NetCore), the latest version (PHP) also aims to exfiltrate sensitive information related to saved browser credentials, Facebook account information,

 Feed

With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is still growing. The situation means that

 Feed

Details have emerged about a now-patched security flaw in Windows Common Log File System (CLFS) that could be exploited by an attacker to gain elevated permissions on compromised machines. Tracked as CVE-2022-37969 (CVSS score: 7.8), the issue was addressed by Microsoft as part of its Patch Tuesday updates for September 2022, while also noting that it was being actively exploited in the wild. "

 Feed

Telecommunications and IT service providers in the Middle East and Asia are being targeted by a previously undocumented Chinese-speaking threat group dubbed WIP19. The espionage-related attacks are characterized by the use of a stolen digital certificate issued by a Korean company called DEEPSoft to sign malicious artifacts deployed during the infection chain to evade detection. "Almost all

 Threat Lab

For the past year, hackers have been following close behind businesses and families just waiting for the right time to strike. In other words, 2022 has been an eventful year in the threat landscape, with malware continuing to take center stage. The 6 Nastiest Malware of 2022 Since the mainstreaming of ransomware   show more ...

payloads and the adoption of cryptocurrencies that facilitate untraceable payments, malicious actors have been innovating new methods and tactics to evade the latest defenses. 2022 was no different. The ransomware double extortion tactic continues to wreak havoc, with ransomware attackers threating to both steal your data and also leak it if you don’t pay up. But this year also saw the onset of the triple extortion method – with this type of attack, hackers threaten to steal your data, leak it and then also execute DDoS attack if you don’t pay up. As a result, many organizations are shifting away from cyber insurance and adopting layered defenses in an effort to achieve cyber resilience. Ransom payments continued to balloon – last year at this time the average was just below $150,000 but it now stands close to $225,000 (that’s increasing faster than the rate of inflation, for those counting at home!). In bad news (as if we needed more), malicious actors seem to have settled on a favorite target: small and medium sized businesses. Large-scale attacks make headlines, but hackers have found that smaller environments make for easier targets. But it’s not all bad news… after all, the first step in defeating your enemy is to learn their tactics. Our researchers have been hard at work uncovering the worst offenders to better build defenses against them. With that, here are the 6 Nastiest Malware of 2022. Here are this year’s wicked winners Emotet Persisting botnet with cryptomining payload and moreInfects via emails, brute force, exploits and moreRemoves competing malware, ensuring they’re the only infection Lockbit The year’s most successful ransomware groupIntroduced the triple extortion method – encryption + data leak + DDOS attackAccept payments in two untraceable cryptocurrencies Monero and Zcash as well as Bitcoin Conti  Longstanding ransomware group also known as Ryuk and a favorite payload of trickbot Shutdown attempts by US gov have made them rebrand into other operations such as Hive, BlackCat, BlackByte, and AvosLockerWill leak or auction off your data if you don’t pay the ransom Qbot The oldest info stealing trojan still in operationWorks to infect an entire environment to ‘case the joint’ before its final stageCreates ransomware Voltrons through partnerships with Conti, ProLock and Egregor Valyria Malspam botnet that starts with email attachments containing malicious scriptsKnown for their complex payloads that can overwhelm defenses and evade detectionPartners with Emotet to create a two-headed monster Cobalt Strike / Brute Ratel White hat designed pen testing tool, that’s been corrupted and used for evil.Very powerful features like process injection, privilege escalation, and credential harvesting.The customizability and scalability are just too GOOD not to be abused by BAD actors Protect yourself and your business The key to staying safe is a layered approach to cybersecurity backed up by a cyber resilience strategy. Here are tips from our experts. Strategies for business continuity Lock down Remote Desktop Protocols (RDP)Educate end usersInstall reputable cybersecurity softwareSet up a strong backup and disaster recovery plan Strategies for individuals Develop a healthy dose of suspicion toward messagesProtect devices with antivirus and data with a VPNKeep your antivirus software and other apps up to dateUse a secure cloud backup with immutable copiesCreate strong, unique passwords (and don’t reuse them across accounts)If a download asks to enable macros, DON’T DO IT The post Discover 2022’s Nastiest Malware appeared first on Webroot Blog.

2022-10
Aggregator history
Friday, October 14
SAT
SUN
MON
TUE
WED
THU
FRI
OctoberNovemberDecember