Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What is two-factor a ...

 Tips

Anyone who has an account on any social network or online service is bound to have come across two-factor authentication (2FA) before. It also goes by the name two-step authentication or two-step verification, but the concepts the same. But have you ever wondered what it exactly is, how it works and – most   show more ...

importantly – why its needed? If so, youve come to the right place. Well try to answer these questions and more in this post. What is two-factor authentication? Well begin with a simple definition. When several methods are used simultaneously to validate access rights — that is, for authentication — its known as multi-factor authentication. Most often digital services use two-factor authentication. Theres nothing wrong with using more factors, but the number is usually limited to two so as not to overly irritate users. In other words, 2FA provides the optimal balance between account protection and convenient login. But what factors can be used to confirm the users authentication rights? Here are the most popular options: Knowledge. Authentication is granted if you have the correct password, passphrase, numeric code, graphic pattern, answer to a secret question, etc. Possession. If you have a certain item (for example, a key, USB token, phone, bank card), this is validation of your access rights. This also includes having access to a phone number or some other account (say, an email), which can be demonstrated, for example, by getting a one-time code. Inherent property. Its often possible to authenticate with some inherent, unique property of the actual user: a fingerprint, voice, face, DNA, iris pattern, characteristic typing style on keyboard, etc. Geolocation. Here, authentication is based on the user being in a certain place; for example, if logging in to corporate resources — inside the companys office. Note that for multi-factor authentication to work, the methods used to validate the users rights must be different. So, if a service asks the user to enter two passwords instead of one (or, say, a password and the answer to a secret question), this cannot be considered 2FA, since the same method of validation (knowledge) is used twice. Why do you need two-factor authentication? Multi-factor authentication is recommended since, individually, each validation method has its own weaknesses. For example, knowledge of some information could be a reliable method — but only if this information is known to the user alone and could in no way somehow be obtained from any other source. But thats hardly ever the case: the user has to type in a password thats then transmitted over the internet. Also, they probably store it somewhere since no one can remember all passwords for all accounts. This provides many opportunities for interception and theft. Whats more, the password is bound to be stored on the side of the online service, from where it could one day leak. And if you use the same password for multiple services (unfortunately, many people still do), then all these accounts are at risk of being hacked. The same goes for other validation methods. The possession factor isnt ideal, because your item (key, phone, bank card) might get stolen. Geolocation by itself confirms nothing: there are sure to be many other folks at roughly the same point in time and space as you (unless you happen to be drifting on an ice floe in the middle of the Arctic Ocean). Perhaps only an inherent property factor can be considered more or less reliable, which is why its sometimes used as the sole authentication factor. But there are a fair number of nuances too. Hence the concept of multi-factor authentication: the greater the number of different factors, the more likely it is that a person whos trying to get access to the account actually has the right to do so. Using more factors helps ensure your account will be accessed by you and you alone So, two-factor authentication is a good idea for a simple reason: to let the service know that you are you, and to make your account harder to hack. How to use two-factor authentication Well look at the various kinds of 2FA in a separate post; in the meantime, well end this one with a few tips: Be sure to enable two-factor authentication for all services that offer it. Where possible, select one-time codes from an authenticator app as the 2FA method. And for really valuable accounts, use a FIDO U2F hardware key. If the above options arent available, any other method will still be far better than having no second factor at all. Remember that 2FA doesnt guard against high-quality phishing (with the exception of FIDO U2F keys), so each time before entering a code, make sure youre on the real website — not a fake one. Use a reliable security solution with built-in anti-phishing protection, such as Kaspersky Premium. As for creating strong passwords and storing them securely, we recommend Kaspersky Password Manager — the full version of which comes with a Kaspersky Premium subscription. Incidentally, our password manager has several other useful features that will help protect your accounts from hacking.

 Malware and Vulnerabilities

An updated version of the Python-based, cloud-focused hack tool called Legion—which can extract credentials from vulnerable web servers—has surfaced. The updated variant incorporates the Paramiko module to exploit SSH servers. Furthermore, it can now retrieve specific AWS credentials associated with CloudWatch, DynamoDB, and AWS Owl from Laravel web applications.

 Threat Actors

Alleged Iranian nation-state hacker group Tortoiseshell performed a watering hole attack on several shipping and logistics websites in Israel to collect information about their users. Attackers stay hidden by impersonating the genuine jQuery JavaScript framework. Organizations are urged to raise awareness for watering hole attacks and always keep the systems updated.

 Malware and Vulnerabilities

"Initially, the attacker targets a router whose WEBUI is open to the public, executes scripts possibly by using vulnerabilities, and finally infects the GobRAT," the JPCERT Coordination Center (JPCERT/CC) said in a report published today.

 Breaches and Incidents

The Royal ransomware group is on a spree in the Dallas metro area, having hit multiple government institutions in the region during the last six months. The frenzy began with an attack against the Dallas Central Appraisal District in November 2022.

 Threat Intel & Info Sharing

FCEB agencies must patch or mitigate the vulnerability as ordered by the BOD 22-01 binding operational directive. However, this is no longer needed since Barracuda has already patched all vulnerable devices by applying two patches over the weekend.

 Feed

Ubuntu Security Notice 6005-2 - USN-6005-1 fixed vulnerabilities in Sudo. This update provides the corresponding updates for Ubuntu 16.04 LTS. Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly escaped control characters in log messages and sudoreplay output. An attacker could possibly use these issues to inject terminal control characters that alter output when being viewed.

 Feed

Ubuntu Security Notice 6110-1 - It was discovered that Jhead did not properly handle certain crafted Canon images when processing them. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. It was discovered that Jhead did not properly handle certain crafted images when printing   show more ...

Canon-specific information. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. It was discovered that Jhead did not properly handle certain crafted images when removing unknown sections. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service.

 Feed

Ubuntu Security Notice 6097-1 - It was discovered that Linux PTP did not properly perform a length check when forwarding a PTP message between ports. A remote attacker could possibly use this issue to access sensitive information, execute arbitrary code, or cause a denial of service.

 Feed

Debian Linux Security Advisory 5415-1 - Two security issues were discovered in LibreOffice, which could potentially result in the execution of arbitrary code when loading a malformed spreadsheet document or unacknowledged loading of linked documents within a floating frame.

 Feed

Debian Linux Security Advisory 5412-1 - Several vulnerabilities were discovered in libraw, a library for reading RAW files obtained from digital photo cameras, which may result in denial of service or the execution of arbitrary code if specially crafted files are processed.

 Feed

Debian Linux Security Advisory 5414-1 - Jose Gomez discovered that the Catalog API endpoint in the Docker registry implementation did not sufficiently enforce limits, which could result in denial of service.

 Feed

It appears that sites designed by e-Biz Technocrats Pvt.Ltd suffer from a remote SQL injection vulnerability. As they do not provide any sort of versioning with their offerings, the researcher was unable to provide affected versions. Versions as of May 11, 2023 were affected.

 Feed

The Python Package Index (PyPI) announced last week that every account that maintains a project on the official third-party software repository will be required to turn on two-factor authentication (2FA) by the end of the year. "Between now and the end of the year, PyPI will begin gating access to certain site functionality based on 2FA usage," PyPI administrator Donald Stufft said. "In addition

 Feed

Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. "Initially, the attacker targets a router whose WEBUI is open to the public, executes scripts possibly by using vulnerabilities, and finally infects the GobRAT," the JPCERT Coordination Center (JPCERT/CC) said in a report published today. The compromise of an internet-exposed router is followed by the

 Feed

A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser when a victim visits a .ZIP domain. "With this phishing attack, you simulate a file archiver software (e.g., WinRAR) in the browser and use a .zip domain to make it appear more legitimate," security researcher mr.d0x disclosed last week. Threat actors, in a

 Feed

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm ESET said it identified over 240,000 detections of the crypter in its telemetry in 2021 and 2022. This amounts to more than 10,000 hits per month. Some of the prominent malware families contained within AceCryptor are SmokeLoader, RedLine

 Feed

If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day. In this article, we'll look at another trending acronym – CTEM, which stands for Continuous Threat Exposure Management – and the often-surprising challenges that come

 Feed

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user authentication and seize control of the devices. The approach, dubbed BrutePrint, bypasses limits put in place to counter failed biometric authentication attempts by weaponizing two zero-day vulnerabilities in the smartphone fingerprint authentication (SFA

 Feed only

Graham Cluley Security News is sponsored this week by the folks at PureDome. Thanks to the great team there for their support! PureDome offers a secure, quick, reliable solution that enhances and safeguards business network security. With seamless deployment, you can effortlessly expand your corporate network without   show more ...

sacrificing performance. By consolidating critical aspects of user … Continue reading "Protect your business network with PureDome"

2023-05
MON
TUE
WED
THU
FRI
SAT
SUN
MayJuneJuly