Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Malware and Vulnerabilities

Trustwave SpiderLabs laids bare a new malware, dubbed Rilide, that can steal cryptocurrency by abusing multiple Chromium-based browsers, such as Google Chrome, Opera, Microsoft Edge, and Brave. Experts recommend remaining vigilant when opening emails from unknown and untrusted sources.

 Breaches and Incidents

Kaspersky attributed the 3CX supply chain attack to the North Korean Lazarus APT group, owing to the deployment of the Gopuram and AppleJeus backdoors used by the threat actor. Attackers deployed Gopuram on machines mostly belonging to cryptocurrency companies in Brazil, Germany, Italy, and France.

 Govt., Critical Infrastructure

The UK government continues to adjust its cyber response to the growing threat posed by nation-state adversaries, in line with its latest National Cyber Strategy (NCS), published in December 2022.

 Malware and Vulnerabilities

Several fake websites were erected to advertise genuine software and cryptocurrency-related applications only to drop OpcJacker, an info-stealer, stated Trend Micro. The malware is capable of carrying next-stage payloads such as NetSupport RAT and a remote access-focused version with hidden virtual network computing (hVNC).

 Govt., Critical Infrastructure

Public utilities have been put to the test as attacks by bad actors have risen sharply in recent years. Q3 ‘22 saw a record number of attacks on the energy market, a trend that is not expected to slow down.

 Mobile Security

According to the new policy, starting in early 2024, Google Play users will have better control over their data since every store listing will display links in the "Data deletion" area, allowing them to ask for their accounts and data to be deleted.

 Trends, Reports, Analysis

Two of the currently most threatening malware are Emotet and SocGholish. Android droppers usually come disguised as benign apps, available on third-party app stores or even on Google Play. MacOS malware is not common, but the threat can't be ignored.

 Expert Blogs and Opinion

An experiment by a Forcepoint staffer does, to some extent, highlight how the code-suggesting unreliable chatbot, built by OpenAI and pushed by Microsoft, could be used to cut some corners in malware development or automate the process.

 Trends, Reports, Analysis

Cyberattacks aren’t a roll of the dice for organizations, but rather a near certainty. Almost all organizations, 94%, experienced a cyberattack of some form during the last year, according to research Sophos released Tuesday.

 Feed

Red Hat Security Advisory 2023-1525-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.59.

 Feed

Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma   show more ...

Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

 Feed

Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute   show more ...

arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

 Feed

Ubuntu Security Notice 5998-1 - It was discovered that the SocketServer component of Apache Log4j 1.2 incorrectly handled deserialization. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 ESM. It was discovered that the JMSSink component of Apache Log4j 1.2   show more ...

incorrectly handled deserialization. An attacker could possibly use this issue to execute arbitrary code.

 Feed

Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Debian Linux Security Advisory 5383-1 - It was discovered that Ghostscript, the GPL PostScript/PDF interpreter, is prone to a buffer overflow vulnerability in the (T)BCP encoding filters, which could result in the execution of arbitrary code if malformed document files are processed (despite the -dSAFER sandbox being enabled).

 Feed

Debian Linux Security Advisory 5382-1 - It was reported that cairosvg, a SVG converter based on Cairo, can send requests to external hosts when processing specially crafted SVG files with external file resource loading. An attacker can take advantage of this flaw to perform a server-side request forgery or denial of service. Fetching of external files is disabled by default with this update.

 Feed

Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to provide more transparency and control over their data. "For apps that enable app account creation, developers will soon need to provide an option to initiate account and data deletion from within the app and online," Bethel

 Feed

A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated with email, bank accounts, and social media platforms. Coinciding with the infrastructure seizure, the major crackdown, which involved authorities from 17 countries, culminated in 119 arrests and 208 property searches in

 Feed

Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to protect them. What is Critical Infrastructure and Why is It Attacked? Critical infrastructure is the physical and digital assets, systems and networks that are vital to national security, the economy, public health, or safety. It can be government- or privately-owned. According to Etay

 Law & order

An Elon Musk-worshipping college principal gets schooled, and rapper Afroman turns the tables after armed police raid his house. All this and much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

2023-04
Aggregator history
Thursday, April 06
SAT
SUN
MON
TUE
WED
THU
FRI
AprilMayJune