Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 277 of the Transatlantic Cable only really has two topics of discussion this week. The first, and probably most prominent is the sale and consequent that happened over on Twitter.  Twitter threads across the globe are blanketed in a sea of #RIPTwitter and #Twitterdeath, but what is the actual real possible   show more ...

outcome? Following that, the team take a look at the other big story of the week, with the recent implosion of the FTX crypto-exchange – including a story (only possible in 2022, it seems) where Twitter users are being duped out of their crypto by a deepfake of Sam Bankman-Fried. Additionally, sandwiched between the two topics of discussion is an interview with Professor Dr. Dennis-Kenji Kipker Professor for IT Security Law at the University of Bremen, to talk about IT security predications for the coming year. To learn more about his work, head here. If you liked what you heard, please consider subscribing. Is this really the end of Twitter? Two Estonians arrested for running $575M crypto Ponzi scheme FTX crypto exchange owes biggest creditors $3.1bn FTX Founder Deepfake Offers Refund to Victims in Verified Twitter Scam IT Security Predictions, 2023

image for Link to Google Trans ...

 Business

When discussing cybercriminal tricks, we always recommend that you look carefully at the URL when clicking a link in an email. Heres another red flag — a link to a page translated using Google Translate. In theory, it could be that the sender of the email is inviting you to visit a site in a different language and   show more ...

is trying to be helpful. In practice, however, this technique is most often used to bypass antiphishing mechanisms. If the message forms part of business correspondence, and the site thats opened after you click on the link wants you to enter your mail credentials, close the browser window and delete the email right away. Why attackers use Google Translate links Lets take a look at a recent example of phishing through a Google Translate link caught by our traps: The senders of the email allege that the attachment is some kind of payment document available exclusively to the recipient, which must be studied for a contract meeting presentation and subsequent payments. The Open button link points to a site translated by Google Translate. However, this becomes clear only when clicking on it, because in the email it appears like this: The strange wording is perhaps intentional — an attempt by the attackers to create the impression of not being native English speakers to make the Google Translate link seem more convincing. Or maybe theyve just never seen a real email with financial documents. Pay attention to the two links below (Unsubscribe From This List and Manage Email Preferences), as well as the sendgrid.net domain in the link. These are signs that the message was not sent manually, but through a legitimate mailing service — in this case the SendGrid service, but any other ESP could have been used. Services of this type normally protect their reputation and periodically delete mail campaigns aimed at phishing and block their creators. Thats why attackers run their links through Google Translate — the ESPs security mechanisms see a legitimate Google domain and dont consider the site to be suspicious. In other words, its an attempt not only to dupe the end-user target, but the filters of the intermediary service as well. What does a link to a page translated by Google Translate look like? Google Translate lets you translate entire websites simply by passing it a link and selecting the source and target languages. The result is a link to a page where the original domain is hyphenated, and the URL is supplemented with the domain translate.goog, followed by the name of the original page and keys indicating which languages the translation was made to and from. For example, the URL of the translation of the home page of our English-language blog www.kaspersky.com/blog into Spanish will look like this: www-kaspersky-com.translate.goog/blog/?_x_tr_sl=auto&_x_tr_tl=es&_x_tr_hl=en&_x_tr_pto=wapp. The phishing email we analyzed sought to lure the user here: The browser address bar, despite the string of garbage characters, clearly shows that the link was translated by Google Translate. How to stay safe To keep company employees from falling for cybercriminal tricks, we recommend periodically refreshing their knowledge of phishing tactics (for example, by sending them relevant links to our blog) or, better still, raising their awareness of modern cyberthreats with the aid of specialized learning tools. Incidentally, in the above example, a trained user would never have gotten as far as the phishing page — the chances of a legitimate financial document addressed to a specific recipient being sent through an ESP service are pretty slim at best. A while back, we posted about ESP-based phishing. To be extra sure, we additionally recommend using solutions with antiphishing technologies both at the corporate mail server level and on all employee devices.

 Incident Response, Learnings

More than 100 people have been arrested in the UK’s biggest-ever fraud operation, which brought down a website police describe as a “one-stop spoofing shop” used by scammers to steal tens of millions of pounds from Britons via fake bank phone calls.

 Trends, Reports, Analysis

A survey from Daon shows 92% of consumers believe cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security measures to prove their identity on an ongoing basis to protect their assets.

 Breaches and Incidents

According to the report provided by jdsupra, the attackers obtained data which contains personal information of Home Trust Mortgage clients. It is claimed that the data holds the names, addresses and the social security numbers.

 Malware and Vulnerabilities

According to Google's Project Zero, after its team discovered five separate bugs in the ARM Mali GPU driver, ARM "promptly" issued a patch in July and August. Yet, it reported that every test device they looked at this week remains vulnerable.

 Malware and Vulnerabilities

Cryptonite is a ransomware kit that exists as FOSS. Unusually, it is available to download by anyone with the skills to deploy it (as opposed to being available for sale on the criminal underground).

 Threat Actors

Trellix researchers analyzed thousands of leaked internal messages related to the Yanluowang group and revealed the group's inner workings, victims, and possible collaboration with other Russian ransomware groups.

 Malware and Vulnerabilities

Unlike its previous version, this new variant dubbed Life ransomware uses a batch file to download and execute WINWORD.exe to perform DLL side-loading and load the ransomware in memory.

 Breaches and Incidents

The National Informatics Centre (NIC) at AIIMS Delhi on Wednesday said that a ransomware attack affected the hospital server due to which day-to-day activities including OPD registrations and blood sample reports remained halted.

 Feed

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

 Feed

Ubuntu Security Notice 5736-1 - It was discovered that ImageMagick incorrectly handled certain values when processing PDF files. If a user or automated system using ImageMagick were tricked into opening a specially crafted PDF file, an attacker could exploit this to cause a denial of service. This issue only affected   show more ...

Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. Zhang Xiaohui discovered that ImageMagick incorrectly handled certain values when processing image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 22.10.

 Feed

Red Hat Security Advisory 2022-8535-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-8534-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.

 Feed

Ubuntu Security Notice 5740-1 - It was discovered that X.Org X Server incorrectly handled certain inputs. An attacker could use these issues to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5739-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11 in Ubuntu 22.04 LTS and Ubuntu 22.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

 Feed

Ubuntu Security Notice 5638-3 - USN-5638-1 fixed a vulnerability in Expat. This update provides the corresponding updates for Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. This update also fixes a minor regression introduced in Ubuntu 18.04 LTS.

 Feed

The Android banking fraud malware known as SharkBot has reared its head once again on the official Google Play Store, posing as file managers to bypass the app marketplace's restrictions. A majority of the users who downloaded the rogue apps are located in the U.K. and Italy, Romanian cybersecurity company Bitdefender said in an analysis published this week. SharkBot, first discovered towards

 Feed

Companies based in the U.S. have been at the receiving end of an "aggressive" Qakbot malware campaign that leads to Black Basta ransomware infections on compromised networks. "In this latest campaign, the Black Basta ransomware gang is using QakBot malware to create an initial point of entry and move laterally within an organization's network," Cybereason researchers Joakim Kandefelt and

 Feed

The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language, following other strains like BlackCat, Hive, and Luna. The latest version, dubbed RansomExx2 by the threat actor known as Hive0091 (aka DefrayX), is primarily designed to run on the Linux operating system, although it's expected that a Windows version will

 Feed

A set of five medium-severity security flaws in Arm's Mali GPU driver has continued to remain unpatched on Android devices for months, despite fixes released by the chipmaker. Google Project Zero, which discovered and reported the bugs, said Arm addressed the shortcomings in July and August 2022. "These fixes have not yet made it downstream to affected Android devices (including Pixel, Samsung,

 Feed

As 2022 comes to an end, now's the time to level up your bug bounty program with Intigriti. Are you experiencing slow bug bounty lead times, gaps in security skills, or low-quality reports from researchers? Intigriti's expert triage team and global community of ethical hackers are enabling businesses to protect themselves against every emerging cybersecurity threat. Join the likes of Intel,

 Feed

The cyber espionage group known as Bahamut has been attributed as behind a highly targeted campaign that infects users of Android devices with malicious apps designed to extract sensitive information. The activity, which has been active since January 2022, entails distributing rogue VPN apps through a fake SecureVPN website set up for this purpose, Slovak cybersecurity firm ESET said in a new

 Celebrities

Deepfake shenanigans strike users of troubled crypto firm FTX, the perils of charging your electric vehicle, and is Microsoft’s takeover of Activision good news for video game fanatics. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes of AMTSO.

2022-11
Aggregator history
Thursday, November 24
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary