Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Breaches and Incidents

North Korea-linked APT37, aka ScarCruft, was found leveraging a previously undocumented backdoor, named Dolphin, against South Korean entities. Experts are not sure of the final payload for this campaign, however, they evaluate it can be ROKRAT, BLUELIGHT, or DOLPHIN, which the group distributed previously.

 Malware and Vulnerabilities

Resecurity identified the largest mobile malware marketplace on the dark web, InTheBox, which is used by threat actors to target more than 300 financial institutions, payment systems, and others across 43 nations. InTheBox offers region-specific services for the U.S. and the U.K., including over 28 countries, namely Argentina, Austria, Australia, Belgium, Brazil, Canada, Chile, India, and others.

 Govt., Critical Infrastructure

Australia plans to develop a new cybersecurity strategy that aims to strengthen the country’s critical infrastructure, among other goals, following a spate of high-profile cyberattacks against Australian companies this year.

 Trends, Reports, Analysis

The Vice Society ransomware group emerged as a major threat to the education sector, especially in the U.S. It has been disproportionately targeting K 12 schools and higher education institutions worldwide. Overall, the group has impacted more than 100 organizations in different sectors since it started its operations   show more ...

in 2021. The ransomware operators have the largest number of victims in the U.S., followed by the U.K, Spain, France, Brazil, Germany, and Spain.

 Breaches and Incidents

According to Microsoft, cybercriminal group DEV-0139 is approaching cryptocurrency investment firms’ VIP customers to infect their systems with malware. The adversaries took to Telegram chat groups to identify such targets, win their trust, and then share malicious Excel spreadsheets with them. The campaign also delivers a second payload which is an MSI package for a CryptoDashboardV2 app.

 Trends, Reports, Analysis

Cloud breaches often stem from misconfigured storage services or exposed credentials. A growing trend of attacks specifically targets cloud compute services to steal associated credentials and illicitly gain access to cloud infrastructure.

 Malware and Vulnerabilities

ESET researchers attributed a new wiper malware, dubbed Fantasy, and its execution tool to the Agrius APT group. The Iranian group has been targeting diamond industries in South Africa, Hong Kong, and Israel. The malware’s foundations are pretty similar to that of Apostle wiper, except that it (the latter) also posed as a ransomware strain.

 Govt., Critical Infrastructure

Regulators are exploring how to update critical infrastructure protection—or CIP—standards in order to secure electric utilities and other energy-sector entities from attacks against their software supply chains.

 Govt., Critical Infrastructure

Jen Easterly, director of the CISA, said the agency’s 2023 priorities include working with state and local officials to prepare for the next presidential election and making inroads with corporate boards to improve how the C-suite manages cyber risk.

 Malware and Vulnerabilities

This Python package was published on December 2, 2022, as shown in its official PyPI repository. The package includes malicious code in its setup.py installation script that downloads and runs an executable file as a part of its installation.

 Feed

Intel Data Center Manager's endpoint at "/DcmConsole/DataAccessServlet?action=getRoomRackData" is vulnerable to an authenticated, blind SQL injection attack when user-supplied input to the HTTP POST parameter "dataName" is processed by the web application. Versions 4.1 and below are affected.

 Feed

The latest version (5.1) and all prior versions of Intel's Data Center Manager are vulnerable to a local privileges escalation vulnerability using the application user "dcm" used to run the web application and the rest interface. An attacker who gained remote code execution using this dcm user (i.e.,   show more ...

through Log4j) is then able to escalate their privileges to root by abusing a weak sudo configuration for the "dcm" user.

 Feed

Qualys discovered a race condition (CVE-2022-3328) in snap-confine, a SUID-root program installed by default on Ubuntu. In this advisory,they tell the story of this vulnerability (which was introduced in February 2022 by the patch for CVE-2021-44731) and detail how they exploited it in Ubuntu Server (a local privilege   show more ...

escalation, from any user to root) by combining it with two vulnerabilities in multipathd (an authorization bypass and a symlink attack, CVE-2022-41974 and CVE-2022-41973).

 Feed

The Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well as Central and West Asia as part of a new spear-phishing activity. "The campaign has been observed targeting Armenia, Azerbaijan, Egypt, Iraq, Israel, Jordan, Oman, Qatar, Tajikistan, and the United Arab Emirates," Deep Instinct researcher Simon Kenin said in a technical write-up.

 Feed

API attacks are on the rise. One of their major targets is eCommerce firms like yours.  APIs are a vital part of how eCommerce businesses are accelerating their growth in the digital world.  ECommerce platforms use APIs at all customer touchpoints, from displaying products to handling shipping. Owing to their increased use, APIs are attractive targets for hackers, as the following numbers expose

 Feed

The subgroup of an Iranian nation-state group known as Nemesis Kitten has been attributed as behind a previously undocumented custom malware dubbed Drokbk that uses GitHub as a dead drop resolver to exfiltrate data from an infected computer, or to receive commands. "The use of GitHub as a virtual dead drop helps the malware blend in," Secureworks principal researcher Rafe Pilling said. "All the

 Feed

For today's businesses data privacy is already a big headache, and with modern privacy laws expanding to more of the world's population, regulatory compliance is on track to become a more complicated, high-stakes process touching on every aspect of an organization. In fact, Gartner predicts that by 2024, 75% of the Global Population will have its personal data covered under privacy regulations.

 Feed

Businesses know they need cybersecurity, but it seems like a new acronym and system is popping up every day. Professionals that aren’t actively researching these technologies can struggle to keep up. As the cybersecurity landscape becomes more complicated, organizations are desperate to simplify it. Frustrated with the inefficiencies that come with using multiple vendors for cybersecurity, often

 Feed

Cybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S. Cisco Talos said the attackers behind the operation have moved from using malicious emails to alternative delivery methods such as the exploitation of a now-patched remote code execution (RCE) flaw in Netwrix auditor as well as the Raspberry Robin worm. "

2022-12
Aggregator history
Friday, December 09
THU
FRI
SAT
SUN
MON
TUE
WED
DecemberJanuaryFebruary