Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Microsoft will block ...

 Business

Outdated and completely unsupported versions of Exchange Servers pose an undeniable danger to corporate infrastructure and to mail flow. However, many administrators still believe in the proverb if it aint broke — dont fix it, and prefer not to update Exchange unless absolutely necessary. And this appears to be why   show more ...

Microsoft decided to develop its transport-based enforcement System for Exchange Online. The main purpose of this system is to notify administrators that theyre working with outdated and possibly unsafe software, and that, if they dont subsequently update in a timely fashion, mail delivery from vulnerable servers will be gradually throttled and eventually blocked. Its hoped that this system will serve as a convincing reason for administrators to finally upgrade or update Exchange Servers. How the transport-based enforcement system works The mechanism is quite simple: when Exchange Online receives mail from Exchange Server through an inbound OnPremises type connector, it identifies the servers build version and evaluates if its safe to receive mail from it (i.e., whether the servers version is supported and critical security patches are in place). If the server is vulnerable, then Exchange Online notes the date of its first encounter with it and adds a notification about an outdated server to the mail flow report, accessible by Exchange Server administrators. If the situation doesnt change within 30 days from the moment of initial discovery, Exchange Online will begin to throttle (in other words delay) messages from the vulnerable server. The throttling duration increases progressively every 10 days. If nothing changes 60 days after detection, Exchange Online begins to block the e-mails. Initially, Microsoft plans to apply this system to Exchange 2007 servers only, but later the same approach will be applied to all versions of Exchange, and it doesnt matter how the servers communicate with Exchange Online (that is, it wont be limited to just OnPremises inbound connector). You can find additional details regarding the transport-based enforcement system in the official Exchange teams blog post. Unfortunately, it lacks information on when this system will be launched and, most importantly, when it will extend its scope to other versions of Exchange servers. Why a transport-based enforcement system is important Implementation of such a system will be interesting as a precedent. Microsoft is rather aggressively demonstrating to its customers how highly it regards the importance of its cloud infrastructure security. It will be very interesting to see if this initiative turns into a trend — if other manufacturers of hybrid solutions (i.e., which run partly on a customers premises and partly in the cloud) follow Microsofts  example. How to ensure Microsoft Exchange servers operability and secure e-mail flow? If you are still using an unsupported version of the Exchange platform, its probably time to upgrade. If you have an up-to-date version of the Exchange, you need to monitor the release of security patches and timely install them. In addition, we recommend protecting Exchange servers and the mail delivered through them with the dedicated solution Kaspersky Security for Microsoft Exchange Server (included in Kaspersky Security for Mail Server). In addition, as the last few years have shown, attackers willingly exploit vulnerabilities in Microsoft Exchange — sometimes creating exploits before users have a chance to install patches, and this can lead to rather serious consequences. But you can stay on top of things — controlling whats happening in the corporate infrastructure and detecting malicious activity in time — with the help of Managed Detection and Response-class services.

 Malware and Vulnerabilities

Proofpoint analysts uncovered variants of the IcedID banking Trojan—Lite, and Forked—that focus on additional payload and bot delivery, respectively. According to experts, the initial developers of Emotet and IcedID operators have worked together on the Lite version. Meanwhile, the new threat group TA581 was   show more ...

observed using the Forked version. All in all, at least three threat actors exploited the new variants of IcedID.

 Breaches and Incidents

The company exposed credentials to the Salesforce Marketing Cloud, a provider of digital marketing automation and analytics software and services. Cybernews has reached out to the car manufacturer, and the dataset has been secured.

 Trends, Reports, Analysis

Threat actors target OT and IoT devices because they are the most difficult to patch. Researchers also said botnets have expanded their capabilities, targeting internet of things (IoT) devices to conduct lateral movement in enterprise networks.

 Malware and Vulnerabilities

The first vendor to acknowledge the impact of the WiFi protocol flaw is Cisco, admitting that the attacks outlined in the paper may be successful against Cisco Wireless Access Point products and Cisco Meraki products with wireless capabilities.

 Breaches and Incidents

Euler Finance was hacked on March 13, 2023, and around $197 million worth of cryptocurrency was stolen, including $135.8 million stETH, $33.8 million USDC, $18.5 million WBTC, and $8.7 million DAI.

 Identity Theft, Fraud, Scams

The protocol is good for cybercriminals in that it lets attackers cut back on phishing webpage hosting costs and its distributed nature makes it near impossible to delete files.

 Threat Actors

The nuclear energy sector of China is reportedly facing threats from Bitter, a South Asian APT. The group specializes in using Excel exploits, Windows Installer (MSI) files, and Microsoft Compiled HTML Help (CHM) files. Besides, the group is infamous for targeting energy and government organizations in Bangladesh, Pakistan, China, and Saudi Arabia.

 Malware and Vulnerabilities

MacStealer is a new information-stealing malware threat attempting to pilfer sensitive information from compromised macOS devices. The malware uses Telegram as its C2 channel and specifically affects devices running Catalina and later versions on M1 and M2 CPUs. It can harvest documents, browser cookies, and login information from individuals.

 Trends, Reports, Analysis

The report also found that 80% of attacks happened over authenticated APIs, making it a widespread problem for all. Given that it is one of the easiest types of attack to execute, it is no surprise that attackers are increasingly taking this route.

 Trends, Reports, Analysis

ENISA says the three dominant threats to the transportation sector are ransomware (38 percent), data-related threats (30 percent), and malware (17 percent). However, each subgroup has reported experiencing other attack types than ransomware.

 Feed

Red Hat Security Advisory 2023-1392-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.55.

 Feed

Red Hat Security Advisory 2023-1393-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.55.

 Feed

Ubuntu Security Notice 5981-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux   show more ...

kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5982-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that   show more ...

a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5980-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle   show more ...

indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs.

 Feed

Ubuntu Security Notice 5686-4 - USN-5686-1 fixed several vulnerabilities in Git. This update provides the corresponding fix for CVE-2022-39253 on Ubuntu 16.04 ESM. Cory Snider discovered that Git incorrectly handled certain symbolic links. An attacker could possibly use this issue to cause an unexpected behaviour.

 Feed

Ubuntu Security Notice 5979-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that   show more ...

a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.

 Feed

A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence that aligns with Pyongyang's geopolitical interests since 2018. Google-owned Mandiant, which is tracking the activity cluster under the moniker APT43, said the group's motives are both espionage- and financially-motivated, leveraging techniques like credential

 Feed

Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. "Clipboard injectors [...] can be silent for years, show no network activity or any other signs of presence until the disastrous day when they replace a crypto wallet address," Vitaly Kamluk, director of

 Feed

An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French cybersecurity firm ExaTrack, which found three samples of the previously documented malicious software that date back to early 2022, dubbed it Mélofée. One of the artifacts is designed to drop a kernel-mode rootkit that's based on an open source project referred to as 

 Feed

Malware analysis is an essential part of security researcher's work. But working with malicious samples can be dangerous — it requires specialized tools to record their activity, and a secure environment to prevent unintended damage. However, manual lab setup and configuration can prove to be a laborious and time-consuming process. In this article, we'll look at 4 ways to create a reverse

 Feed

The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this increased reliance on APIs has also made them one of the most common attack vectors. According to Gartner, APIs account for 90% of the web application attack surface areas.  With no surprise, similar trends are emerging also in the smart mobility

 Feed

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google's Threat Analysis Group (TAG) has revealed. The two distinct campaigns were both limited and highly targeted, taking advantage of the patch gap between the release of a fix and when it was actually deployed on the targeted devices. "These

2023-03
Aggregator history
Wednesday, March 29
WED
THU
FRI
SAT
SUN
MON
TUE
MarchAprilMay