Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Updated Kaspersky Se ...

 Products

We recently unveiled an all-new product line, which now simply goes by the name Kaspersky. As a result, our protection has become even more user-friendly and customizable. Today well be talking about our security solution for Android smartphones and tablets, Kaspersky Security & VPN, which replaces Kaspersky Internet   show more ...

Security for Android. Premium protection for Android devices This product has long been more than just antivirus; it protects against a host of other threats as well. But fighting malware, of course, remains a core task for us at Kaspersky. We never tire of saying that you need to protect not only desktop computers and laptops, but all other devices too, since they also store important data. Protecting smartphones and tablets is, if anything, even more critical — we take them everywhere, they contain all our correspondence, business and financial affairs and banking apps, plus heaps of private information from photos to geo-tracking. We care about the security of all mobile device owners, which is why our updated Android app offers the most important security features to everyone for free, while the range of subscription options makes it even easier to use the app and add security tools. Kaspersky Security & VPN protects against more than just viruses and malware. Always at your fingertips is a quick, full or selective scan of your smartphone for viruses, adware and apps that attackers might use against you. And with all our subscriptions, the Anti-Virus automatically scans all new files and apps, and can also be scheduled to be run whenever you want. Secure internet With Kaspersky Security & VPN, your internet surfing is safe and secure. Safe Browsing checks websites before opening them and blocks malicious and phishing websites, protecting your online payments and private data. Social Privacy checks your privacy settings in popular online services, lets you see what data is being collected, and can stop sharing it whenever you want. Safe Messaging checks texts and instant messages, and blocks dangerous and phishing links. Data Leak Checker looks for your private data on both the internet and the dark web (from credit card numbers to social security info). If your data becomes publicly accessible, Data Leak Checker alerts you. A new scam is becoming popular of late. It uses special malicious QR codes to lead you to, say, a phishing website. Secure QR Scanner lets you scan QR codes and barcodes safely by accessing the information encrypted in the codes to check for any links they may contain. Far safer online with Kaspersky Security & VPN. …Plus VPN… As the name suggests, this product includes not only anti-virus and security features, but also a VPN, which makes your digital life both easier and more secure. Weve already explained why a VPN is essential, and our VPN is the clear winner in performance, privacy and transparency tests. Even the free version of Kaspersky Security & VPN grants you 300MB of traffic per day (without the ability to choose a server), while with the Plus or Premium subscriptions you get unlimited traffic and a choice of 99 locations in 80 countries (with more than 2000 servers deployed). And with a few tricks you can turbocharge your VPN to the max. Use our free VPN — or turbocharge it to the max with Plus or Premium subscriptions. …Plus device management On top of all that, our deep understanding of how Android works lets us protect your device through fixing vulnerable spots in the default settings using Weak Setting Scan. My Apps is a feature that lets you see what apps are installed on your smartphone, when you last used them, how much space they take up and, most importantly, what permissions they have to access your data. You can also enhance the security of apps individually: App Lock controls access to certain apps by a code or fingerprint. That way, even if a snoopy person gets access to your unlocked phone, they still wont be able to open apps that hold sensitive information — for example, messengers, banking apps or e-mail clients. All apps under your full control. Hang on! Wheres my device?! Any smartphone owner lives in fear of one day losing it. Kaspersky Security & VPN cannot, of course, prevent loss or theft, but it can minimize the consequences and make finding your device much easier. After turning on the Where Is My Device feature on My Kaspersky, you can remotely: Get the location of the missing device, lock it, and display an on-screen message on the locked device. Turn on a (very) loud alarm on the device. Perform a factory reset of the device, including wiping the memory. Take a mugshot of the person currently using the device. Set up Where Is My Device and manage it through My Kaspersky in the event of loss or theft. Additionally, SIM Watch blocks the device when someone inserts a new SIM card into it, while Uninstallation Protection safeguards against the Kaspersky app being uninstalled, and also against changes being made to the system settings intended to reduce the level of protection; any such attempt will block the device instantly. And yes, its all free! Smart Home Monitor, or dont mess with my Wi-Fi Another important feature is home network protection. It works very simply: after installing Kaspersky, the app scans your network, finds all devices connected to it (by both Wi-Fi and cable), collects information about them, and generates a network map that a regular user can understand. This map lets you view at any time what devices are on your home network and whether theyre Kaspersky-protected. This is especially useful if there are many computers, smartphones and/or tablets in your home, in which case its easy to forget to install protection on some of them. Our security solution will then monitor all devices that connect to your home network and issue an alert when something new appears. This gives you a heads-up of uninvited guests or anything suspicious, allowing you to take care of protection. Kaspersky Security & VPN guards your home network. Most of the above-mentioned features you can start using for free right away. And if you prefer to get access to all Kaspersky Security & VPN capabilities via subscription, you can choose and activate the one you want directly in the app. You can now protect up to five devices on Android, iOS, Windows or macOS: its never been easier to cover all your familys devices. PS: A subscription also includes our password manager, which securely protects and automatically syncs all your passwords across all your devices.

 Malware and Vulnerabilities

While cybercriminals are exploiting the pair of bugs in PaperCut MF/NG print management software, researchers at cybersecurity firm Horizon3 revealed information about one of the bugs, identified as CVE-2023-27350, and also shared a PoC exploit code. The bug can be effectively exploited by criminals to dodge detection   show more ...

and run arbitrary code on susceptible PaperCut servers. Trend Micro is poised to release further details on the bugs on May 10th.

 Companies to Watch

The new money comes in the form of a $20M secured note and a $10M convertible note and provides working capital and a runway for Token to compete in a crowded market for enterprise authentication products.

 Malware and Vulnerabilities

In this instance, a fake shipping notification in Italian was observed, humorously reflecting GuLoader's Italian origins. Unlike previous cases, GuLoader was not concealed within a Zip file but rather an ISO file.

 Trends, Reports, Analysis

Cyberattackers leveraged more than 500 unique tools and tactics in 2022, according to Sophos. The data was analyzed from more than 150 Sophos Incident Response (IR) cases.

 Malware and Vulnerabilities

There has been a significant number of victims in the consumer and enterprise sectors in Australia, Japan, and the U.S. after information-stealer ViperSoftX adopted new anti-detection capabilities. The enterprise sector made up over 40% of the total number of affected victims. The latest version of the info-stealer   show more ...

comes with the capability to steal passwords from two password managers such as KeePass 2 and 1Password.

 Trends, Reports, Analysis

Organizations in the cloud are exposed to web-borne attacks. 87% of all-SaaS adopters and 79% of CISOs in a hybrid environment experienced a web-borne security threat in the past 12 months, according to a global survey by LayerX.

 Malware and Vulnerabilities

For the past eight years, NSB has been used by bot operators to acquire limited edition and hard-to-find items from over 100 online shops. It's considered one of the best scalping bots available on the market, with an annual price of $499.

 Malware and Vulnerabilities

The Mirai botnet operators were seen abusing CVE-2023-1389, a vulnerability in the TP-Link Archer A21 (AX1800) WiFi router, and trying to make those devices part of their future DDoS attacks. The initial study of the attack infrastructure revealed targeted devices in the Eastern Europe region, however, the attack campaign could be spreading worldwide. The vulnerability was patched last month by TP-Link.

 Malware and Vulnerabilities

Elastic Security Labs has uncovered LOBSHOT, a previously unknown hVNC malware, that impersonates legitimate software for financial gain and is promoted through malvertising, such as Google Ads, to extend their reach and perpetrate their attacks. It targets 32 Chrome extensions, nine Edge wallet extensions, and 11 Firefox wallet extensions, enabling threat actors to steal cryptocurrency assets.

 Identity Theft, Fraud, Scams

Group-IB spotted a new phishing campaign targeting Facebook users, leveraging 3,200 fake profiles, in an attempt to steal account credentials from public figures, businesses, celebs, and others. The profiles were either created by the actors or were genuinely hacked accounts of users. Of these fake profiles, 1,200 were created in March alone. Users are urged to practice digital hygiene.

 Feed

Ubuntu Security Notice 6010-3 - USN-6010-1 fixed vulnerabilities and USN-6010-2 fixed minor regressions in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an   show more ...

attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Irvan Kurniawan discovered that Firefox did not properly manage fullscreen notifications using a combination of window.open, fullscreen requests, window.name assignments, and setInterval calls. An attacker could potentially exploit this issue to perform spoofing attacks. Lukas Bernhard discovered that Firefox did not properly manage memory when doing Garbage Collector compaction. An attacker could potentially exploits this issue to cause a denial of service. Zx from qriousec discovered that Firefox did not properly validate the address to free a pointer provided to the memory manager. An attacker could potentially exploits this issue to cause a denial of service. Alexis aka zoracon discovered that Firefox did not properly validate the URI received by the WebExtension during a load request. An attacker could potentially exploits this to obtain sensitive information. Trung Pham discovered that Firefox did not properly validate the filename directive in the Content-Disposition header. An attacker could possibly exploit this to perform reflected file download attacks potentially tricking users to install malware. Ameen Basha M K discovered that Firefox did not properly validate downloads of files ending in .desktop. An attacker could potentially exploits this issue to execute arbitrary code.

 Feed

Red Hat Security Advisory 2023-2023-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

 Feed

Ubuntu Security Notice 6039-1 - It was discovered that OpenSSL was not properly managing file locks when processing policy constraints. If a user or automated system were tricked into processing a certificate chain with specially crafted policy constraints, a remote attacker could possibly use this issue to cause a   show more ...

denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. David Benjamin discovered that OpenSSL was not properly performing the verification of X.509 certificate chains that include policy constraints, which could lead to excessive resource consumption. If a user or automated system were tricked into processing a specially crafted X.509 certificate chain that includes policy constraints, a remote attacker could possibly use this issue to cause a denial of service.

 Feed

qdPM version 9.1 suffers from a cross site scripting vulnerability. Original discovery of cross site scripting in this version is attributed to Mehmet Emiroglu in 2019.

 Feed

Red Hat Security Advisory 2023-1866-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.58. Issues addressed include a cross site scripting vulnerability.

 Feed

Red Hat Security Advisory 2023-1884-01 - The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. This release of the Red Hat build of OpenJDK 17 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 17 and includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

 Feed

Red Hat Security Advisory 2023-1887-01 - Multicluster Engine for Kubernetes 2.2.3 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use   show more ...

the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2023-1894-01 - Multicluster Engine for Kubernetes 2.1 hotfix security update for console. Red Hat Product Security has rated this update as having a security impact of Critical.

 Feed

Red Hat Security Advisory 2023-1897-01 - Red Hat Advanced Cluster Management for Kubernetes hotfix security update for console. Red Hat Product Security has rated this update as having a security impact of Critical.

 Feed

Red Hat Security Advisory 2023-1896-01 - Red Hat Advanced Cluster Management for Kubernetes hotfix security update for console. Red Hat Product Security has rated this update as having a security impact of Critical.

 Feed

VMware has released updates to resolve multiple security flaws impacting its Workstation and Fusion software, the most critical of which could allow a local attacker to achieve code execution. The vulnerability, tracked as CVE-2023-20869 (CVSS score: 9.3), is described as a stack-based buffer-overflow vulnerability that resides in the functionality for sharing host Bluetooth devices with the

 Feed

The prolific Iranian nation-state group known as Charming Kitten targeted multiple victims in the U.S., Europe, the Middle East and India with a novel malware dubbed BellaCiao, adding to its ever-expanding list of custom tools. Discovered by Bitdefender Labs, BellaCiao is a "personalized dropper" that's capable of delivering other malware payloads onto a victim machine based on commands received

 Feed

The advanced persistent threat (APT) group referred to as Evasive Panda has been observed targeting an international non-governmental organization (NGO) in Mainland China with malware delivered via update channels of legitimate applications like Tencent QQ. The attack chains are designed to distribute a Windows installer for MgBot malware, ESET security researcher Facundo Muñoz said in a new

 Feed

The browser serves as the primary interface between the on-premises environment, the cloud, and the web in the modern enterprise. Therefore, the browser is also exposed to multiple types of cyber threats and operational risks.  In light of this significant challenge, how are CISOs responding? LayerX, Browser Security platform provider, has polled more than 150 CISOs across multiple verticals and

 Feed

The maintainers of the Apache Superset open source data visualization software have released fixes to plug an insecure default configuration that could lead to remote code execution. The vulnerability, tracked as CVE-2023-27524 (CVSS score: 8.9), impacts versions up to and including 2.0.1 and relates to the use of a default SECRET_KEY that could be abused by attackers to authenticate and access

 Feed

The Chinese nation-state group dubbed Alloy Taurus is using a Linux variant of a backdoor called PingPull as well as a new undocumented tool codenamed Sword2033. That's according to findings from Palo Alto Networks Unit 42, which discovered recent malicious cyber activity carried out by the group targeting South Africa and Nepal. Alloy Taurus is the constellation-themed moniker assigned to a

2023-04
Aggregator history
Wednesday, April 26
SAT
SUN
MON
TUE
WED
THU
FRI
AprilMayJune