Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to find out if t ...

 Business

As a rule, cybercriminals try conduct their attacks stealthily. After all, the longer they remain undetected by the victims, the more likely the criminals will achieve their goals. However, they dont always succeed in hiding their activity. Often, based on a number of signs, you can tell that something is wrong with   show more ...

your computer or smartphone. And if corporate users timely detect these signs and notify their information security personnel (or at least IT specialists), this greatly complicates the attackers attempts to complete their attack. Thus, weve decided to list the most obvious symptoms that may indicate that malware is running on a device or that hackers are interfering with it. Device is running slowly Almost any user system starts to boot up and/or run slower over time. This can be for various reasons: the disk is full, some software requires more resources after an update, or the cooling system is simply clogged with dust. But it can also be a sign of malicious code running on the device. We recommend that you notify at least your IT department about such problems — especially if the performance drop is drastic. The computer is constantly accessing the hard drive If the machine is constantly flashing the HDD access light, making a lot of noise, or just copying files absurdly slowly though you havent initiated any resource-consuming processes, this may mean that either the disk is failing, or that some program is constantly reading or writing some data. Either way, its not normal behavior: better to play it safe and check with IT. Account issues If suddenly some services or systems stop granting you access after entering your password (correctly), this is a reason to be wary. You can try to reset your password, but if someone else has changed it theres no guarantee theyll not do it again. Its better to notify the person responsible for security. You should also do this if youre suddenly logged out of the services, or if youre receiving multiple notifications regarding attempts at changing your password. All this may indicate a possible attack. Pop-up windows A device occasionally notifying the user that an update is needed, or that the battery is about to run out — this is normal. But regular error messages are a sign that something isnt working properly, and the IT department should be made aware of this. Similarly, its not normal if unsolicited windows with advertisements or requests to confirm your password suddenly start appearing. Suspicious browser behavior Sometimes incorrect browser behavior can serve as evidence of an attack — and not just from the aforementioned suddenly appearing windows. If adware-type malware breaks into a computer, it can begin to replace banners on different pages with the same type of advertising but of dubious legality. Of course, this may also mean a problem on the side of banner exchange networks. But the same ad appearing on every site — this is an alarming symptom. In addition, you should pay attention to redirects. If you enter one address, and the browser regularly redirects you to another, you should tell the specialists about this. Inaccessible or missing files or folders If quite recently files or directories opened normally but now you cant open them — or theyve completely disappeared — this is a clear reason to contact the IT department. Maybe you accidentally deleted an important file, but maybe it was encrypted by ransomware or deleted by a wiper. Unfamiliar files or applications have appeared If youve neither installed new software nor downloaded or updated anything, but you still have new programs, files, in-program buttons, plug-ins, tools or something else unfamiliar on your computer, then its better to check with IT what they are and where they came from. Its especially worth paying attention to ransom notes. There have been cases when the victims ignored such notes because all the files seemed to be unchanged and available. But then it turned out that the ransomware failed to encrypt files, but successfully exfiltrated it to attackers servers. Remote connection notifications Attackers often use legitimate remote-access software. As a rule, such software displays a message on the screen that someone has remotely connected to the machine. If such a notification appears without your consent, or if youre suddenly offered to grant access to an unknown person, most likely your computer is being attacked by a hacker. Genuine system administrators warn users via a trusted communication channel in advance about the need for a remote connection. Something is preventing your computer from shutting down or restarting Many viruses need to remain present in RAM. Spy Trojans also need time to upload gathered information to the attackers servers. As a result, malware has to keep the computer running for as long as possible. If you notice that your device isnt shutting down properly, tell the security officer or IT specialist as soon as possible. Letters or messages you didnt send If your contacts complain that theyve received emails or instant messages from you but you didnt send them, this means that someone has either gained access to your accounts or is manipulating one of your devices. In either case, someone responsible for corporate security should be notified. How to stay safe Of course, not every attack can be detected with the naked eye. Therefore, we recommend using security solutions that can detect and stop malicious activity before it becomes apparent to the user.

image for Why Retail Stores Ar ...

 Feed

When we think about cybercrime and retail it is natural to focus on websites being targeted with attacks. Indeed, there has been a shocking rise in the number of cyberattacks perpetrated against online retailers in the past year. Dakota Murphey explains why store owners and security managers need to also protect their physical locations from the cyber threat, too, however.

 Threat Actors

Nation-state actor SideWinder compromised the official website of the National Electric Power Regulatory Authority (NEPRA) to deliver a tailored malware called WarHawk. Multiple malicious modules in WarHawk deliver Cobalt Strike, including new TTPs such as KernelCallBackTable injection and checking the Pakistan Standard Time zone for successful operations.

 Malware and Vulnerabilities

BlackByte ransomware operators have started deploying a new exfiltration tool, named Exbyte, to speed up data theft and upload it to an external server. Exbyte is a Go-based exfiltration tool that uploads stolen files directly to the Mega cloud storage service. With new custom tools, distribution techniques, and antidetection tactics, BlackByte is setting up a new standard for itself in the ransomware world.

 Incident Response, Learnings

Dutch authorities arrested Ukrainian national Mark Sokolovsky, 26, in March for his role behind malware-as-a-service Raccoon infostealer, according to a newly unsealed indictment from federal prosecutors in Texas.

 Trends, Reports, Analysis

CISA has issued a new joint Cybersecurity Advisory (CSA) warning organizations against activities by operators of Daixin Team ransomware that has targeted the HPH Sector since at least June 2022. For its ransomware and data extortion operations, Daixin Team generally leverages VPN servers to gain initial access to victims’ networks.

 Malware and Vulnerabilities

Security researchers from Code Intelligence discovered the RCE vulnerability (tracked as CVE-2022-41853 and rated with a near-maximum CVSS severity score of 9.8) after running a series of fuzzing tests.

 Geopolitical, Terrorism

An investigation by the European Parliament into the use of Pegasus and other advanced smartphone spyware by EU member countries is running into opposition from national governments, lamented Jeroen Lenaers, head of the investigative committee.

 Malware and Vulnerabilities

Tracked as CVE-2022-39297 and with a CVSS score of 9.8, the object injection flaw has been patched along with a pair of high-severity bugs by French vendor Melis Technology.

 Trends, Reports, Analysis

Ransomware attack activity jumped 26% from August to September, hitting 202 victims and reaching a number of cases not observed since May, according to NCC Group’s Monthly Threat Pulse report. Last year still holds the lead for monthly highs.

 Trends, Reports, Analysis

A total of 108.9 million accounts were breached in Q3 2022, a 70% increase compared to the previous quarter. The top five countries most affected by data breaches were Russia, France, Indonesia, the US, and Spain, according to a report by Surfshark.

 Malware and Vulnerabilities

This blocklist is designed to block threat actors from dropping legitimate but vulnerable drivers on targets' systems in Bring Your Own Vulnerable Driver (BYOVD) attacks on HVCI-enabled Windows machines or those running Windows in S Mode.

 Malware and Vulnerabilities

OpenSSL version 3.0.7 is scheduled for Tuesday, November 1, between 13:00 and 17:00 UTC. No details have been provided, but it has been described as a ‘security-fix release’ that will include a patch for a vulnerability rated ‘critical’.

 Emerging Threats

The UK Information Commissioner’s Office (ICO) has warned organizations using or developing “emotion analysis” technology to act responsibly or risk facing a formal investigation.

 Companies to Watch

The Rockville, MD-based provider of a physical layer-based asset risk management solution, raised an undisclosed amount in Series B funding. The round was led by U.S. Venture Partners (USVP).

 Companies to Watch

The Austin, TX-based cloud-native runtime security company, raised $10M in Series A funding. The round was led by NTTVC with participation from LiveOak Venture Partners, Benhamou Global Ventures, and John McHale.

 Feed

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the   show more ...

broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

 Feed

Red Hat Security Advisory 2022-7209-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

 Feed

Ubuntu Security Notice 5700-1 - David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Soenke Huster   show more ...

discovered that an integer overflow vulnerability existed in the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5688-2 - USN-5688-1 fixed vulnerabilities in Libksba. This update provides the corresponding update for Ubuntu 22.10. It was discovered that an integer overflow could be triggered in Libksba when decoding certain data. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5699-1 - Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could possibly use this issue to cause the GNU C Library to hang or crash, resulting in a denial of service. It was discovered that the GNU   show more ...

C Library nscd daemon incorrectly handled certain netgroup lookups. An attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service.

 Feed

Red Hat Security Advisory 2022-7184-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7183-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7186-01 - The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2022-7171-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7185-01 - The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2022-7181-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7192-01 - The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2022-7173-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7177-01 - This release of Camel for Spring Boot 3.14.5 serves as a replacement for Camel for Spring Boot 3.14.2 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.

 Feed

Red Hat Security Advisory 2022-7178-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7187-01 - The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Issues addressed include a bypass vulnerability.

 Feed

Red Hat Security Advisory 2022-7190-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7182-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.4.0. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-7188-01 - The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Issues addressed include a bypass vulnerability.

 Feed

Ubuntu Security Notice 5698-2 - USN-5698-1 fixed a vulnerability in Open. This update provides the corresponding update for Ubuntu 16.04 ESM. It was discovered that Open vSwitch incorrectly handled comparison of certain minimasks. A remote attacker could use this issue to cause Open vSwitch to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5697-1 - Douglas Mendizabal discovered that Barbican incorrectly handled certain query strings. A remote attacker could possibly use this issue to bypass the access policy.

 Feed

Ubuntu Security Notice 5698-1 - It was discovered that Open vSwitch incorrectly handled comparison of certain minimasks. A remote attacker could use this issue to cause Open vSwitch to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Red Hat Security Advisory 2022-7133-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration.

 Feed

VMware on Tuesday shipped security updates to address a critical security flaw in its VMware Cloud Foundation product. Tracked as CVE-2021-39144, the issue has been rated 9.8 out of 10 on the CVSS vulnerability scoring system, and relates to a remote code execution vulnerability via XStream open source library. "Due to an unauthenticated endpoint that leverages XStream for input serialization in

 Feed

A cybercrime group known as Vice Society has been linked to multiple ransomware strains in its malicious campaigns aimed at the education, government, and retail sectors. The Microsoft Security Threat Intelligence team, which is tracking the threat cluster under the moniker DEV-0832, said the group avoids deploying ransomware in some cases and rather likely carries out extortion using

 Feed

Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect Secure Mobility Client for Windows. Tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), the vulnerabilities could enable local authenticated attackers to perform DLL hijacking and copy arbitrary files to system directories with elevated privileges.

 Feed

A 26-year-old Ukrainian national has been charged in the U.S. for his alleged role in the Raccoon Stealer malware-as-a-service (MaaS) operation. Mark Sokolovsky, who was arrested by Dutch law enforcement after leaving Ukraine on March 4, 2022, in what's said to be a Porsche Cayenne, is currently being held in the Netherlands and awaits extradition to the U.S. "Individuals who deployed Raccoon

 Feed

If you regularly read The Hacker News, there’s a fair chance that you know something about cybersecurity. It’s possible to turn that interest into a six-figure career. But to make the leap, you need to pick up some key skills and professional certifications. Featuring nine in-depth courses, The 2022 Masters in Cyber Security Certification Bundle helps you get ready for the next step. And in a

 Feed

The North Korean espionage-focused actor known as Kimsuky has been observed using three different Android malware strains to target users located in its southern counterpart. That's according to findings from South Korean cybersecurity company S2W, which named the malware families FastFire, FastViewer, and FastSpy. "The FastFire malware is disguised as a Google security plugin, and the

 Feed

The threat actor behind a remote access trojan called RomCom RAT has been observed targeting Ukrainian military institutions as part of a new spear-phishing campaign that commenced on October 21, 2022.  The development marks a shift in the attacker's modus operandi, which has been previously attributed to spoofing legitimate apps like Advanced IP Scanner and pdfFiller to drop backdoors on

2022-10
Aggregator history
Wednesday, October 26
SAT
SUN
MON
TUE
WED
THU
FRI
OctoberNovemberDecember