Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to increase VPN  ...

 Products

VPNs are becoming more and more popular: a secure, encrypted connection is needed these days not only by travelers, but also gamers, streamers, crypto investors and even fans of foreign TV shows. And thats why the VPN industry is developing rapidly. But did you know that just by updating your VPN application and   show more ...

configuring it a bit you can significantly increase the speed, convenience and security of your connection? You will after reading this post! New protocols When you turn on a VPN connection you establish an encrypted connection to one of the VPN providers servers. This is done to change your public IP address and to protect your connection from prying eyes on the local network. For many years, all VPN services offered a choice between the old and not very secure PPTP and L2TP communication protocols, and the newer yet slower OpenVPN protocol — which is more secure in terms of encryption. But recently some new VPN protocols have appeared. For example, theres the Catapult Hydra protocol used in Kaspersky VPN Secure Connection. Its the record holder for speed, and thanks to this protocol our VPN recently won a comparative test of leading VPN solutions. Due to the proprietary nature of the Catapult Hydra protocol, security researchers have raised questions about its security and privacy. However, a recent independent audit of the Catapult Hydra source code found no critical vulnerabilities. Another popular protocol to look out for is WireGuard. Its also faster (much more so than OpenVPN) at transferring data, has minimal latency, and provides an instant connection. At the same time, its source codes are open, so it can be found in many VPN services, including Kaspersky VPN Secure Connection. What to do: update the application and  select the correct protocol in the VPN client settings on each device. Speeds in descending order go like this: Catapult Hydra, WireGuard, OpenVPN. Other protocols dont provide sufficient security — especially for financial transactions. Optimal servers The key thing to look out for when choosing a VPN service is the number of servers it has and their location. The more servers — the greater the chance of a good connection. Its logical to choose a server based on your needs: either as close as possible to your actual geographical location, or located in the region whose websites you plant to visit. So, if youre using a VPN for safe gaming, you should choose a VPN server in the same country where the game servers are located — this will ensure a faster, more stable connection. When watching foreign media content, servers located in the country where the content is streamed also tend to provide a more stable connection. Sometimes municipal or government services arent available from abroad for various reasons. In this case, the right VPN server helps residents of the city, or citizens of the country, get the information they need while away from home. What can happen is the nearest server being overloaded and its connection speed drops as a consequence. In this case its worth trying other servers in the same region. By the way, Kaspersky VPN outperforms most competitors not only in terms of speed, but also in terms of the number of available servers: 99 locations in 80 countries, with more than 2000 servers deployed. What to do: update the application regularly and check for an updated list of servers. Choose the best VPN server for your tasks, taking into account the geographical proximity to the required online services. Fully up-to-date, Kaspersky VPN Secure Connection has just under a hundred server locations around the world, and also features a convenient dark theme. Protecting all devices and the entire network Every VPN service has clients for Windows, iOS and Android, but software manufacturers sometimes ignore Mac computers. However, there is an effective solution not only for Macs, but also for Smart TVs, game consoles, and smart-home devices that dont support VPNs themselves. This is a VPN security setting on your router that allows you to route all traffic from any device on your home network through the VPN. Of course, our VPN can work on a router — and it has a native Mac version as well. What to do: Make sure that all your devices are running through a VPN, especially those which you use to conduct financial transactions. Advanced settings At first, almost all VPN applications worked on the principle of a simple switch: turn on/turn off. But in real life this isnt always convenient. For example, a smartphone owner wants to always protect a crypto wallet application with a VPN, and doesnt want to work with finances through an unencrypted connection; meanwhile, some online stores require that the VPN be turned off. Some people may also need to ensure that not a single byte goes into the network without encryption. Therefore, modern VPN applications offer settings such as Split Tunneling and a Kill Switch. Split Tunneling lets you choose applications that always work through the VPN, or, conversely, without it. Its convenient, for example, to use two different browsers: one that provides access to sites through the VPN, and the other directly. The Kill Switch, on the other hand, prevents any data from being sent if the VPN connection is unexpectedly interrupted — say, when the device connects to another network. This can happen, for example, when your smartphone automatically switches from cellular data to known Wi-Fi networks. Kaspersky VPN Secure Connection supports both features. Kaspersky VPN Secure Connection settings for Android. What to do: configure the VPN individually for those applications that need it, or, conversely, disable the VPN for certain applications. Use different browsers to simultaneously access sites with and without a VPN protocol. If protecting your traffic is essential, enable the Kill Switch.

image for Spotlight: Traceable ...

 API

In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. The post Spotlight: Traceable CSO Richard Bird on Securing   show more ...

the API Economy appeared first...Read the whole entry... » Click the icon below to listen. Related StoriesEpisode 247: Into the AppSec Trenches with Robinhood CSO Caleb SimaEpisode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain SecurityEpisode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats

 Malware and Vulnerabilities

Security issues in Realtek and Cacti are being exploited to distribute ShellBot and Moobot malware, revealed FortiGuard Labs. Realtek bug, CVE-2021-35394, is an arbitrary command injection bug that affects UDPServer. CVE-2022-46169, the Cacti bug, is a command injection flaw that enables an unauthenticated user to execute arbitrary code on the vulnerable server.

 Malware and Vulnerabilities

AlienFox is a new modular toolkit that enables attackers to scan for misconfigured servers to pilfer authentication keys and credentials for cloud-based email services. SentinelLabs discovered three variants of AlienFox containing scripts that automate malicious operations using the stolen credentials.

 Identity Theft, Fraud, Scams

Cybercriminals associated with TACTICAL#OCTOPUS were spotted distributing tax-related email lures to spread malware. Security analysts at Securonix revealed that attackers are using authentic W-2 tax documents, I-9 forms, and real estate purchase contracts as bait.

 Companies to Watch

The new financing round was led by San Francisco-based venture capital outfit SignalFire. The company said it also took in investments from Ten Eleven Ventures and prominent security executives Kevin Mandia and Jack Huffard.

 Malware and Vulnerabilities

The bug, tracked as CVE-2023-1707, affects about 50 HP Enterprise LaserJet and HP LaserJet Managed Printers models. It has a severity score of 9.1 out of 10 on the CVSS v3.1 standard and exploiting it could potentially lead to information disclosure.

 Trends, Reports, Analysis

Netscout also pointed to a notable 18% increase in direct-path attacks over the past three years, corresponding to a drop in reflection or amplification attacks of about the same percentage.

 Incident Response, Learnings

The CEO of VoIP software provider 3CX said his team tested its products in response to alerts notifying it of a supply chain attack, and assessed reports that its client code was infested with malware were a false positive.

 Identity Theft, Fraud, Scams

The phishing messages typically claim that there is a problem with your Disney account, such as a billing issue, and that you need to update your account information to resolve the problem.

 Identity Theft, Fraud, Scams

Scammers are posing as buyers and sending fraudulent messages to sellers, reserving products for sale and then immediately canceling them. They then send messages to request the personal information of the sellers.

 Breaches and Incidents

Tallahassee Memorial HealthCare says its investigation into the February incident determined that an "unauthorized person" had gained access to its computer network and obtained certain files from its systems between January 26 and February 2.

 Breaches and Incidents

TAFE South Australia has revealed a data breach that was discovered when SA Police seized “devices containing electronic scanned copies of TAFE SA student identification forms”.

 Malware and Vulnerabilities

A security vulnerability in the Elementor Pro website builder plugin for WordPress is under active exploitation by a threat actor. An authenticated user can take advantage of this to take full control over a WordPress site having WooCommerce enabled. The bug in the plugin, roughly deployed on over 12 million sites, impacts versions 3.11.6 and earlier.

 Malware and Vulnerabilities

Researchers at Sysdig highlight that the new Proxyjacking attack, which is much like cryptojacking, is abusing the infamous Log4j vulnerability to gain initial access to victims’ systems. On a broader scale, researchers note that a modest compromise of 100 IPs can enable attackers to make a profit of nearly $1,000 per month.

 Malware and Vulnerabilities

A new ransomware strain, named Rorschach, was unveiled by Check Point Research. The ransomware boasts an advanced level of customization and fast encryption, which sets it apart from other strains. Furthermore, an in-depth examination of Rorschach's source code indicates similarities with the Babuk ransomware family. Its attacks have been reported in Asia, Europe, and the Middle East.

 Feed

Ubuntu Security Notice 5999-1 - It was discovered that trim-newlines incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.

 Feed

Ubuntu Security Notice 5997-1 - It was discovered that IPMItool was not properly checking the data received from a remote LAN party. A remote attacker could possibly use this issue to to cause a crash or arbitrary code execution.

 Feed

Red Hat Security Advisory 2023-1661-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.11.0 includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include denial of service, information leakage, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2023-1662-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2023-1630-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. Issues addressed include an information leakage vulnerability.

 Feed

Red Hat Security Advisory 2023-1504-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.34.

 Feed

Red Hat Security Advisory 2023-1600-01 - Virtual Network Computing is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2023-1594-01 - Virtual Network Computing is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers   show more ...

and clients. X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 5855-3 - USN-5855-2 fixed vulnerabilities in ImageMagick. Unfortunately an additional mitigation caused a regression. This update fixes the problem. It was discovered that ImageMagick incorrectly handled certain PNG images. If a user or automated system were tricked into opening a specially   show more ...

crafted PNG file, an attacker could use this issue to cause ImageMagick to stop responding, resulting in a denial of service, or possibly obtain the contents of arbitrary files by including them into images.

 Feed

The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that packs in improved capabilities to evade detection and resist analysis. The new version is offered for sale on the criminal underground for $59 per month, $360 per year, or alternatively, for $540 for a lifetime subscription. "The stealer can harvest and exfiltrate

 Feed

An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim's environment, new findings from CrowdStrike show. SFX files are capable of extracting the data contained within them without the need for dedicated software to display the file contents. It achieves this by including a decompressor stub, a piece of code

 Feed

A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think tanks, policy makers, academics, and researchers in South Korea and the U.S. Google's Threat Analysis Group (TAG) is tracking the cluster under the name ARCHIPELAGO, which it said is a subset of another threat group tracked by Mandiant under the name APT43. The tech giant

 Feed

Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses, worms, keyloggers, and ransomware. Malware is a pernicious threat and the biggest driver for businesses to look for cybersecurity solutions.  Naturally, businesses want to find products that will stop malware in its tracks, and so they search for solutions to do that.

 Feed

Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of a malvertising campaign. The activity leverages SEO poisoning techniques to entice users searching for "WhatsApp web" to rogue domains hosting the malware, Palo Alto Networks Unit 42 said in a new report published today.  CryptoClippy, a C-based executable, is a type

2023-04
Aggregator history
Wednesday, April 05
SAT
SUN
MON
TUE
WED
THU
FRI
AprilMayJune