Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 272 of the Transatlantic Cable kicks off with a report into gaming and gamers attitudes towards everything from work/gaming balance to cheating – if youre interested in the gaming space, be sure to check it out. After that, the team discuss the recent news that Kanye West (aka: Ye) is purchasing the   show more ...

controversial social platform, Parler. After those stories, discussion moves onto an interesting story around the hunt for Wikipedias disinformation moles – a fascinating story that is well worth checking out. To wrap up, the team talk about a story from The Register looking at how crime gangs are now able to leverage nation-state malware thanks to leaks and hacks, and defenders such as banks need to shore up their defences. If you liked what you heard, please consider subscribing. Performance addicted: exploring gamers priorities Kanye West agrees to buy conservative social media platform Parler Banks face their darkest hour as malware steps up, maker of antivirus says The Hunt for Wikipedias Disinformation Moles

image for iOS Bug Lets Apps Re ...

 Feed

Without even asking for permissions, the newly discovered 'SiriSpy' flaw in Apple's iOS Bluetooth access could allow someone to access user interactions with Siri and keyboard-dictation audio.

 Malware and Vulnerabilities

The initial infection occurs via a phishing email impersonating a Hungarian government portal. This portal is used to conduct official business online, such as submitting documents, ordering IDs, etc.

 Malware and Vulnerabilities

Researchers have uncovered thousands of repositories on GitHub offering fake PoC exploits for various vulnerabilities, with some laden with malware. Of the 47,313 repositories tested, 4,893 were deemed malicious and most of them were related to vulnerabilities from 2020. Some POs had malicious PowerShell script, malicious one-liner payloads, Cobalt Strike, and even inactive malicious components.

 Govt., Critical Infrastructure

A CISA official told Axios, which first reported the announcement, that the CISA and the Chemical Sector Coordinating Council will set up a new task force to implement the sprint. CISA is the sector risk management agency for the chemical sector.

 Trends, Reports, Analysis

The volume of ransomware detections in Q3 2022 was the lowest in two years, but certain geographical regions have become bigger targets as attacks on US organizations wane, according to SonicWall.

 Identity Theft, Fraud, Scams

A mass malvertising campaign named Dormant Colors is distributing malicious data-collecting browser extensions that have millions of active installations worldwide. Threat actors are targeting different sites such as AliExpress, Amazon, and adult sites. They can redirect victims to phishing pages to steal credentials for Microsoft 365, Google Workspace, bank sites, or social media platforms.

 Malware and Vulnerabilities

Hackers are dropping Android and Windows malware in a malicious campaign that uses over 200 typosquatting domains impersonating twenty-seven brands. The typosquat domains masqueraded as popular Android apps, including Google Play, APKPure, and APKCombo, along with download portals, such as TikTok, PayPal, VidMate, and Snapchat.

 Breaches and Incidents

Recently, we came across an exploitation attempt leveraging monitoring and visualization tool Weave Scope to enumerate the AWS instance metadata service (IMDS) from EC2 instances through environment variables and the IMDS endpoint.

 Expert Blogs and Opinion

Exploitation of zero-days by commercial makers of advanced spyware threatens global internet security to the point that it needs urgent attention from governments across the world, a Google cybersecurity executive told a European Parliament panel.

 Malware and Vulnerabilities

Extortion gangs named TommyLeaks and SchoolBoys are the same ransomware groups targeting companies worldwide, just like Conti and Karakurt pair. Furthermore, both were observed using the same Tor chat system for their extortion negotiation sites, which has been used only by Karakurt in the past.

 Malware and Vulnerabilities

Ursnif variant ( a.k.a. Gozi) comes in the form of a DLL called “loader.dll”, and it contains portable executable crypters and is signed with valid certificates, making it more accessible from being caught by systems security tools.

 Identity Theft, Fraud, Scams

A phishing email purportedly from LinkedIn with the subject line "We noticed some unusual activity" was discovered targeting users at a travel organization, in an attempt to pilfer their credentials on the social media platform.

 Govt., Critical Infrastructure

On Wednesday, Mandiant published new findings about a group it calls Dragonbridge, which it's seen for years promoting pro-Chinese interests in fake grassroots social media campaigns designed to influence politics in Taiwan and Hong Kong.

 Feed

Red Hat Security Advisory 2022-7143-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution   show more ...

of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, integer overflow, null pointer, out of bounds read, out of bounds write, and server-side request forgery vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7144-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution   show more ...

of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, integer overflow, null pointer, out of bounds read, out of bounds write, and server-side request forgery vulnerabilities.

 Feed

Ubuntu Security Notice 5703-1 - Selim Enes Karaduman discovered that a race condition existed in the General notification queue implementation of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar   show more ...

Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.

 Feed

Ubuntu Security Notice 5702-2 - USN-5702-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Robby Simpson discovered that curl incorrectly handled certain POST operations after PUT operations. This issue could cause applications using curl to send the wrong data, perform incorrect memory operations, or crash.

 Feed

Ubuntu Security Notice 5696-2 - USN-5696-1 fixed several vulnerabilities in MySQL. This update provides the corresponding update for Ubuntu 16.04 ESM. Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.7.40 in Ubuntu   show more ...

16.04 ESM. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

 Feed

Debian Linux Security Advisory 5261-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

 Feed

Ubuntu Security Notice 5702-1 - Robby Simpson discovered that curl incorrectly handled certain POST operations after PUT operations. This issue could cause applications using curl to send the wrong data, perform incorrect memory operations, or crash. Hiroki Kurosawa discovered that curl incorrectly handled parsing .   show more ...

netrc files. If an attacker were able to provide a specially crafted .netrc file, this issue could cause curl to crash, resulting in a denial of service. This issue only affected Ubuntu 22.10.

 Feed

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages.   show more ...

GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

This Metasploit module exploits a default Vagrant synced folder (shared folder) to append a Ruby payload to the Vagrant project Vagrantfile config file. By default, unless a Vagrant project explicitly disables shared folders, Vagrant mounts the project directory on the host as a writable vagrant directory on the guest   show more ...

virtual machine. This directory includes the project Vagrantfile configuration file. Ruby code within the Vagrantfile is loaded and executed when a user runs any vagrant command from the project directory on the host, leading to execution of Ruby code on the host.

 Feed

Australian health insurance firm Medibank on Wednesday disclosed that the personal information of all of its customers had been unauthorizedly accessed following a recent ransomware attack. In an update to its ongoing investigation into the incident, the firm said the attackers had access to "significant amounts of health claims data" as well as personal data belonging to its ahm health

 Feed

A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part of opportunistic attacks designed to illicitly mine cryptocurrency. Cybersecurity company CrowdStrike dubbed the activity Kiss-a-dog, with its command-and-control infrastructure overlapping with those associated with other groups like TeamTNT, which are known to strike misconfigured

 Feed

A now-patched security flaw in Apple's iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to eavesdrop on conversations with Siri. Apple said "an app may be able to record audio using a pair of connected AirPods," adding it addressed the Core Bluetooth issue in iOS 16.1 with improved entitlements. Credited with discovering and reporting the bug in August

 Feed

A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The Real Deal that specialized in the sales of hacking tools and stolen login credentials. Daniel Kaye, who went by a litany of pseudonyms Popopret, Bestbuy, UserL0ser, and Spdrman, has been charged with five counts of access device fraud and one count of money laundering conspiracy. Kaye was

 Feed

As many as 85 command-and-control (C2) servers have been discovered supported by the ShadowPad malware since September 2021, with infrastructure detected as recently as October 16, 2022. That's according to VMware's Threat Analysis Unit (TAU), which studied three ShadowPad variants using TCP, UDP, and HTTP(S) protocols for C2 communications. ShadowPad, seen as a successor to PlugX, is a modular

 Feed

Automobile, Energy, Media, Ransomware?When thinking about verticals, one may not instantly think of cyber-criminality. Yet, every move made by governments, clients, and private contractors screams toward normalizing those menaces as a new vertical. Ransomware has every trait of the classical economical vertical. A thriving ecosystem of insurers, negotiators, software providers, and managed

 Law & order

What is slushygate and how does it link to sextortion in the States? What is the most impersonated brand when it comes to delivering phishing emails? And what the flip is nano-targeting? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by fan favourite Maria Varmazis.

2022-10
Aggregator history
Thursday, October 27
SAT
SUN
MON
TUE
WED
THU
FRI
OctoberNovemberDecember