Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 274 of the Transatlantic Cable kicks off with a story that has wide ramifications if it goes ahead. The EU has finalized plans for its DMA, or Digital Markets Act, which would open up things such as app stores and messenger apps to third-parties – in effect, it would enable users (eventually) to install app   show more ...

stores from competing services on their devices. However, how it will work in practice is anybodys guess right now. From there, the team talk about a recent story around cryptocurrency and Matt Damon – hint folks: dont take financial advice from actors. From there, the discussion moves to news around a Chinese propaganda service, allegedly being run inside the U.S. in an attempt to disrupt the midterm elections. To wrap up, the team talk about news that the Biden administration has issued new cybersecurity requirements for rail operators in an attempt to shore up cybersecurity in critical industries. If you liked what you heard, please consider subscribing. New EU law could open up messaging and app buying Heres How Much Money Youve Lost If You Took Matt Damons Crypto Advice One Year Ago Chinese influence operation seeks to sow political discord, aggressively targets U.S. midterms Biden administration issues new cybersecurity requirements for rail operators

image for LinkedIn Adds Verifi ...

 A Little Sunshine

Responding to a recent surge in AI-generated bot accounts, LinkedIn is rolling out new features that it hopes will help users make more informed decisions about with whom they choose to connect. Many LinkedIn profiles now display a creation date, and the company is expanding its domain validation offering, which   show more ...

allows users to publicly confirm that they can reply to emails at the domain of their stated current employer. LinkedIn’s new “About This Profile” section — which is visible by clicking the “More” button at the top of a profile — includes the year the account was created, the last time the profile information was updated, and an indication of how and whether an account has been verified. LinkedIn also said it is adding a warning to some LinkedIn messages that include high-risk content, or that try to entice the user into taking the conversation to another platform (like WeChat). “We may warn you about messages that ask you to take the conversation to another platform because that can be a sign of a scam,” the company said in a blog post. “These warnings will also give you the choice to report the content without letting the sender know.” In late September 2022, KrebsOnSecurity warned about the proliferation of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. A follow-up story on Oct. 5 showed how the phony profile problem has affected virtually all executive roles at corporations, and how these fake profiles are creating an identity crisis for the businesses networking site and the companies that rely on it to hire and screen prospective employees. Reporting here last month also tracked a massive drop in profiles claiming to work at several major technology companies, as LinkedIn apparently took action against hundreds of thousands of inauthentic accounts that falsely claimed roles at these companies. For example, on October 10, 2022, there were 576,562 LinkedIn accounts that listed their current employer as Apple Inc. The next day, half of those profiles no longer existed. At around the same time, the number of LinkedIn profiles claiming current roles at Amazon fell from roughly 1.25 million to 838,601 in just one day, a 33 percent drop. For whatever reason, the majority of the phony LinkedIn profiles reviewed by this author were young women with profile photos that appear to have been generated by artificial intelligence (AI) tools. “We’re seeing rapid advances in AI-based synthetic image generation technology and we’ve created a deep learning model to better catch profiles made with this technology,” LinkedIn’s Oscar Rodriguez wrote. “AI-based image generators can create an unlimited number of unique, high-quality profile photos that do not correspond to real people.” It remains unclear who or what is behind the recent proliferation of fake executive profiles on LinkedIn, but likely they are from a combination of scams. Cybersecurity firm Mandiant (recently acquired by Google) told Bloomberg that hackers working for the North Korean government have been copying resumes and profiles from leading job listing platforms LinkedIn and Indeed, as part of an elaborate scheme to land jobs at cryptocurrency firms. Identity thieves have been known to masquerade on LinkedIn as job recruiters, collecting personal and financial information from people who fall for employment scams. Also, fake profiles also may be tied to so-called “pig butchering” scams, wherein people are lured by flirtatious strangers online into investing in cryptocurrency trading platforms that eventually seize any funds when victims try to cash out.

 Trends, Reports, Analysis

In MFA fatigue, the attacker uses the stolen credentials to try to sign into a protected account over and over, overwhelming the user with push notifications. It relies on social engineering, as well as any shortcomings in the system design.

 New Cyber Technologies

Security researcher Eilon Harel created an open-source, automated scanner for the timely discovery of secrets in exposed AWS S3 buckets. It performs operations such as listing the bucket content via API queries, downloading the relevant textual files, checking for exposed textual files, forwarding results to SIEM, scanning content for secrets, and using CSPM to get a list of public buckets.

 Breaches and Incidents

Researchers at Proofpoint discovered a threat actor it tracks as TA569 targeting an unnamed media company with SocGholish malware. The victim firm caters to over 250 news outlets in the U.S. While the numbers could be higher, the affected regions include Boston, New York, Chicago, Miami, Palm Beach, Washington DC, and Cincinnati.

 Trends, Reports, Analysis

Kaspersky laid out significant APT trends for Q3 demonstrating how APT actors consistently change their tactics, sharpen their toolsets, and evolve with new tools and techniques. As observed, while some APT groups remained consistent with their TTPs and targets, some extended the scope of their activities and added more sophistication to their attacks.

 Breaches and Incidents

The ALMA Observatory in Chile was struck by a cyberattack on 29 October, the Observatory said in a tweet on Wednesday. The attack impacted its computer systems and took both its public website and its radio telescope antennas offline.

 Malware and Vulnerabilities

Kaspersky spotted an espionage campaign involving Android spyware SandStrike to target followers of the Baháí faith, the Persian-speaking religious community. Cybercriminals used a VPN application as bait that claimed to provide access to Bahai religious resources that are banned in Iran.

 Govt., Critical Infrastructure

The White House's second International Counter Ransomware Initiative summit has concluded, and this year the 36-nation group has made clear it intends to crack down on how cryptocurrencies are used to finance ransomware operations.

 Trends, Reports, Analysis

Phishing campaigns from threat actors claiming to be a senior executive feigning distress are constantly making the rounds. Since everyone wants to stay on good terms with their employer, threat actors exploit this weakness accordingly.

 Threat Actors

The law firms impersonated include Allen & Overy, Clifford Chance, Deloitte, Dentons, Eversheds Sutherland, Herbert Smith Freehills, Hogan Lovells, Kirkland & Ellis, Lindsay Hart, Manix Law Firm, Monlex International, Morrison Foerster, and more.

 Breaches and Incidents

Pharmaceutical company AstraZeneca has blamed “user error” for leaving a list of credentials unsecured online for more than a year that exposed access to sensitive patient data.

 Feed

Debian Linux Security Advisory 5270-1 - Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a read-write NTFS driver for FUSE, due to incorrect validation of some of the NTFS metadata. A local user can take advantage of this flaw for local root privilege escalation.

 Feed

Red Hat Security Advisory 2022-7410-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.1 on RHEL 8 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include HTTP request smuggling, code execution, cross site scripting, and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7409-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.1 on RHEL 7 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include HTTP request smuggling, code execution, cross site scripting, and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7417-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.1 serves as a replacement for Red Hat   show more ...

Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include HTTP request smuggling, code execution, cross site scripting, and denial of service vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7411-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.1 on RHEL 9 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include HTTP request smuggling, code execution, cross site scripting, and denial of service vulnerabilities.

 Feed

Ubuntu Security Notice 5712-1 - It was discovered that SQLite did not properly handle large string inputs in certain circumstances. An attacker could possibly use this issue to cause a denial of service or arbitrary code execution.

 Feed

Ubuntu Security Notice 5713-1 - Devin Jeanpierre discovered that Python incorrectly handled sockets when the multiprocessing module was being used. A local attacker could possibly use this issue to execute arbitrary code and escalate privileges.

 Feed

Ubuntu Security Notice 5711-2 - USN-5711-1 fixed a vulnerability in NTFS-3G. This update provides the corresponding update for Ubuntu 14.04 ESM Ubuntu 16.04 ESM. Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated certain NTFS metadata. A local attacker could possibly use this issue to gain privileges.

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in software from ETIC Telecom, Nokia, and Delta Industrial Automation. Prominent among them is a set of three flaws affecting ETIC Telecom's Remote Access Server (RAS), which "could allow an attacker to obtain sensitive information and

 Feed

The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions of a two-factor authentication solution called Kavach. "This group abuses Google advertisements for the purpose of malvertising to distribute backdoored versions of Kavach multi-authentication (MFA) applications," Zscaler ThreatLabz researcher Sudeep Singh said 

 Feed

Not too long ago, there was a clear separation between the operational technology (OT) that drives the physical functions of a company – on the factory floor, for example – and the information technology (IT) that manages a company's data to enable management and planning.  As IT assets became increasingly connected to the outside world via the internet, OT remained isolated from IT – and the

2022-11
Aggregator history
Friday, November 04
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary