Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Webroot™ Premium:  ...

 Threat Lab

The risk of becoming a victim of identity theft has never been greater We are increasingly living our lives in the digital realm. Whether we’re banking, purchasing or browsing, our daily activities are most likely taking place online. Not only has this sped up our efficiency, but it has also expanded our exposure   show more ...

to a host of cybercriminals who are eager to use our personal information. According to the Federal Trade Commissioner (FTC), incidents of identity theft and related fraud rose nationwide in the United State in 2021. Consumers lost more than 5.8 billion, skyrocketing over 70% from the previous year. The FTC received 5.7 million fraud and identity theft reports in 2021. Over a million of these reports were consumer identity theft cases. The rise in identity theft and fraud means it’s especially important to secure not only the devices you use but also your personal identity. Your identity is unique to you. Keep it that way with Webroot and Allstate Identity Protection There are many steps you can take to ensure your identity isn’t compromised: Shredding bank statementsSecuring important documentsEnsuring your passwords are effectively managedInvesting in a quality antivirus for your devices However, these actions won’t help you regularly monitor your financial accounts, scan for emerging threats or provide fraud or stolen funds reimbursement. That’s where Webroot can help. Webroot has partnered with Allstate Identity Protection to offer two unique ways to preserve both your devices and identity: Webroot Premium and Allstate Identity Protection Add-on. The same trusted antivirus but with the added bonus of identity protection Webroot Premium is a combination of our top-of-the-line antivirus protection and Allstate Identity Protection. Enjoy all the great benefits of our antivirus plus these great features: Dark Web, financial and identity monitoring: Credit card and bank account transactions, 401(k) and account takeover24/7 U.S.-based customer care1 bureau credit monitoring550K in fraud expense and stolen funds reimbursement* In addition to Webroot Premium, we’re offering existing customers the chance to keep their current Webroot subscription and just add identity protection with Allstate Identity Protection Add-on. Experience the benefits of your current Webroot antivirus plus:                                               Dark Web monitoring with social security traceFinancial monitoring with account takeover alertsIdentity monitoring, including identity health status updates24/7 U.S.-based restoration$25K fraud expense reimbursement* This holiday season, ensure your online shopping purchases remain secure while safeguarding your devices and identity with Webroot and Allstate Identity Protection. Learn more about Webroot Premium and discover what our comprehensive protection can do for you. Allstate Identity Protection Legal Disclaimer *Identity theft insurance covering expense and stolen funds reimbursement is underwritten by American Bankers Insurance Company of Florida, an Assurant company. The description herein is a summary and intended for informational purposes only and does not include all terms, conditions, and exclusions of the policies described. Please refer to the actual policies for terms, conditions, and exclusions of coverage. Coverage may not be available in all jurisdictions. Product may be updated or modified. Certain features require additional activation. The post Webroot™ Premium: The all-in-one protection for your devices and identity appeared first on Webroot Blog.

 Malware and Vulnerabilities

Rapid7 researchers discovered several vulnerabilities in F5 BIG-IP and BIG-IQ devices running a customized distribution of CentOS. The experts also discovered several bypasses of security controls that F5 does not recognize as exploitable flaws.

 Govt., Critical Infrastructure

Failures in reporting cyber incidents at the U.S. Department of Defense risks leaving commanders in the dark about the effects hackers could have on their missions, according to a new report by the Government Accountability Office.

 Incident Response, Learnings

The month-long operation took place in October and saw 19 countries involved in targeting criminal networks that were using stolen credit card information to order high-value goods from online shops.

 Companies to Watch

The new investment round was led by Ballistic Ventures, with participation from Sierra Ventures, Cervin Ventures, and angel investors. This brings the total raised by the company to $25 million.

 Malware and Vulnerabilities

TA542, an actor that distributes Emotet malware, has once again returned from an extensive break from delivering malicious emails. The actor was absent from the landscape for nearly four months but became active again in early November.

 Feed

This Metasploit module exploits the Git fetch command in the Gitea repository migration process to allow for remote command execution on the system. This vulnerability affect Gitea versions prior to 1.16.7.

 Feed

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.

 Feed

Debian Linux Security Advisory 5279-2 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform SQL injection, create open redirects, bypass authorization access, or perform Cross-Site Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks. The   show more ...

wordpress package released in DSA-5279-1 had incorrect dependencies that could not be satisfied in Debian stable. This update corrects the problem.

 Feed

Ubuntu Security Notice 5729-1 - It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service. Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel contained an out-of-bounds read   show more ...

vulnerability in the x86 JIT compiler. A local attacker could possibly use this to cause a denial of service or expose sensitive information.

 Feed

Ubuntu Security Notice 5727-1 - It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service. It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs   show more ...

without APICs in certain situations. A local attacker could possibly use this to cause a denial of service.

 Feed

Ubuntu Security Notice 5728-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Debian Linux Security Advisory 5282-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure, spoofing or bypass of the SameSite cookie policy.

 Feed

Red Hat Security Advisory 2022-8502-01 - The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.

 Feed

Red Hat Security Advisory 2022-8506-01 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, remote SQL injection, and traversal vulnerabilities.

 Feed

A Ukrainian national who has been wanted by the U.S for over a decade has been arrested by Swiss authorities for his role in a notorious cybercriminal ring that stole millions of dollars from victims' bank accounts using malware called Zeus. Vyacheslav Igorevich Penchukov, who went by online pseu­do­nyms   show more ...

"tank" and "father," is said to have been involved in the day-to-day operations of the group

 Feed

On average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organization, such as IT and Security, Sales, Marketing, R&D, Product Management, HR, Legal, Finance, and Enablement. An attack can come from any app, no matter how robust the app is.Without visibility and control over a critical mass of an organization’s entire SaaS

 Feed

Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to completely compromise affected systems. Cybersecurity firm Rapid7 said the flaws could be abused to remote access to the devices and defeat security constraints. The issues impact BIG-IP versions 13.x, 14.x, 15.x, 16.x, and 17.x, and BIG-IQ Centralized Management versions 7.x

 Feed

Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of the Log4Shell vulnerability in an unpatched VMware Horizon server. The details, which were shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), come in response to incident response efforts undertaken by the authority from mid-June through mid-July 2022

 Feed

Hackers tied to the North Korean government have been observed using an updated version of a backdoor known as Dtrack targeting a wide range of industries in Germany, Brazil, India, Italy, Mexico, Switzerland, Saudi Arabia, Turkey, and the U.S. "Dtrack allows criminals to upload, download, start or delete files on the victim host," Kaspersky researchers Konstantin Zykov and Jornt van der Wiel 

 Feed

A China-based financially motivated group is leveraging the trust associated with popular international brands to orchestrate a large-scale phishing campaign dating back as far as 2019. The threat actor, dubbed Fangxiao by Cyjax, is said to have registered over 42,000 imposter domains, with initial activity observed in 2017. "It targets businesses in multiple verticals including retail, banking,

 Google

Elon Musk is still causing chaos at Twitter (and it's beginning to impact users), are scammers selling your house without your permission, and Google gets stung with a record-breaking fine. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by   show more ...

computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.

2022-11
Aggregator history
Thursday, November 17
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary