Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to get across th ...

 Business

If you ask any infosec expert what causes most incidents, the answer will almost certainly be the human factor. Most attacks on companies succeed because of employees inattention, ignorance and mistakes. At the same time, the human factor is the hardest threat to eliminate, because youre dealing not with obedient   show more ...

information systems, but living, breathing people. Our tips often include communicating some information to employees. But this is easier said than done. So today, well talk about how to get employees to take cybersecurity more seriously and heed the advice of security specialists. Why employees ignore cybersecurity The problem is that cybersecurity isnt a priority issue for most company staff. They have their own job to do, and may simply not have the time for what they see as secondary matters. Therefore, its important to realize and accept two facts. First: for a typical employee, information security is a secondary issue. So dont expect an email about the dangers of reusing passwords to cause an avalanche of password changes, or a memo about downloading dubious attachments to stop the practice dead in its tracks. Second: be aware that employees for whom cybersecurity is not at the forefront of their mind might not (or probably wont) understand what youre talking about. For a security pro, phrases like targeted attack using spear phishing dont contain any complex information. But to the regular employee in sales, accounts or logistics, you might as well be speaking Klingon. These two facts together often lead infosec experts to the conclusion that the task is unsolvable, so they give up and limit themselves to security measures that relate solely to hardware and software. But this is of course not just wrong but dangerous. The question arises: how to get through to employees? Cybersecurity + communications = â¤ï¸ The good news is that your company most likely already has all the ingredients in place to establish good communications about information security. You probably have security experts who understand threats and how to stop them. And you likely have communication experts — usually found in HR or, even better, in the internal communications department (if you have one). Be prepared that at first it wont be easy: such experts are unlikely to be well-versed in cybersecurity, and probably wont be burning with desire to delve into the details. But dont give up: you need to find among them the most suitable candidate for, so to speak, evangelism. Ideally, it should be an already tech-savvy person. If theres no one in-house, try hiring a new employee who knows internal communications and has a technical background. Such people are rare, but you may get lucky. When you find them, first, upgrade their cybersecurity skills — teach them to look at the world through the prism of information security. Our interactive Kaspersky Automated Security Awareness Platform is just what you need — it even provides a free trial training. The essential ingredient of the entire undertaking is trust. IT guys in general, and infosec pros in particular, are notoriously control freaks. So here theyll have to tame their instincts and let the communication experts do their job where it relates to communication with employees. Where to start The internal communications department (if none exists, then HR) will usually have a good idea of which employees do what and how. Therefore, if you outline the general range of threats in a way that your counterpart can understand, they should be able to develop the appropriate communications strategy — that is, determine what risks certain departments are exposed to, and what to explain to employees in specific fields as a priority. Another useful thing that you and your new ally can do is to create an easy-to-read information security guide for new employees. Dont expect instant success. Overcoming the misunderstanding phase will be a challenge. I highly recommend listening to this informative talk by former NYPD Cyber Intelligence and Investigations chief Nick Selby about raising awareness of cybersecurity among NYPD officers (spoiler: it wasnt easy). Ill share some of his tips about how to organize the process: Keep it simple. At the heart of the NYPD campaign were simplicity and specificity, which helped a lot. Empower people. Its important to have well-oiled communications on security issues in the team, and for employees to understand what actions to take in a particular case. This is so that our aforementioned salesperson or other regular employee knows who to go to with a suspicious email, thereby preventing a hack of the company. Show results. Its a good idea to show how working together produces a positive result. For example, from time to time you can email out an internal memo about attacks that were prevented, and reward employees who helped in this. Again, a series of interactive trainings can be a good starting point to instill in employees cybersecuritys importance, to give them advice and recommendations, and to raise awareness of security requirements and restrictions. As said above, our Kaspersky Automated Security Awareness Platform is the perfect solution. Your new corporate communications ally can act as administrator of these trainings, and use them to scale up awareness of threats and protection practices throughout the company.

image for Microsoft Patch Tues ...

 Security Tools

Microsoft Corp. today released software updates to fix dozens of security vulnerabilities in its Windows operating systems and other software. This month’s relatively light patch load has another added bonus for system administrators everywhere: It appears to be the first Patch Tuesday since March 2022 that   show more ...

isn’t marred by the active exploitation of a zero-day vulnerability in Microsoft’s products. June’s Patch Tuesday features updates to plug at least 70 security holes, and while none of these are reported by Microsoft as exploited in-the-wild yet, Redmond has flagged several in particular as “more likely to be exploited.” Top of the list on that front is CVE-2023-29357, which is a “critical” bug in Microsoft SharePoint Server that can be exploited by an unauthenticated attacker on the same network. This SharePoint flaw earned a CVSS rating of 9.8 (10.0 is the most dangerous). “An attacker able to gain admin access to an internal SharePoint server could do a lot of harm to an organization,” said Kevin Breen, director of cyber threat research at Immersive Labs. “Gaining access to sensitive and privileged documents, stealing and deleting documents as part of a ransomware attack or replacing real documents with malicious copies to further infect users in the organization.” There are at least three other vulnerabilities fixed this month that earned a collective 9.8 CVSS score, and they all concern a widely-deployed component called the Windows Pragmatic General Multicast (PGM), which is used for delivering multicast data — such as video streaming or online gaming. Security firm Action1 says all three bugs (CVE-2023-32015, CVE-2023-32014, and CVE-2023-29363) can be exploited over the network without requiring any privileges or user interaction, and affected systems include all versions of Windows Server 2008 and later, as well as Windows 10 and later. It wouldn’t be a proper Patch Tuesday if we also didn’t also have scary security updates for organizations still using Microsoft Exchange for email. Breen said this month’s Exchange bugs (CVE-2023-32031 and CVE-2023-28310) closely mirror the vulnerabilities identified as part of ProxyNotShell exploits, where an authenticated user in the network could exploit a vulnerability in the Exchange to gain code execution on the server. Breen said while Microsoft’s patch notes indicate that an attacker must already have gained access to a vulnerable host in the network, this is typically achieved through social engineering attacks with spear phishing to gain initial access to a host before searching for other internal targets. “Just because your Exchange server doesn’t have internet-facing authentication doesn’t mean it’s protected,” Breen said, noting that Microsoft says the Exchange flaws are not difficult for attackers to exploit. For a closer look at the patches released by Microsoft today and indexed by severity and other metrics, check out the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: AskWoody.com usually has the lowdown on any patches that may be causing problems for Windows users. As always, please consider backing up your system or at least your important documents and data before applying system updates. And if you run into any problems with these updates, please drop a note about it here in the comments.

image for Is a DEF CON Village ...

 artificial intelligence

The AI industry is pointing to the AI Village at DEF CON as a venue for assessing cybersecurity risk. But is a "village" the best way to test AI risk? Experts have their doubts. The post Is a DEF CON Village the right way to assess AI risk? appeared first on The Security Ledger with Paul F. Roberts. Related   show more ...

StoriesThe surveys speak: supply chain threats are freaking people outForget the IoT. Meet the IoZ: our Internet of Zombie thingsBeware: Images, Video Shared on Signal Hang Around

 Trends, Reports, Analysis

Orange Cyberdefense published its Cy-Xplorer 2023 report noting that cyber extortion groups have shifted their focus from North America and Europe to Latin America. While cyber extortion victims were identified across 96 countries, certain regions witnessed a rise in popularity among threat actors throughout 2022. Cyber extortion is a problem that businesses cannot effectively address in isolation.

 Emerging Threats

A newly discovered multi-stage AitM phishing and BEC attack campaign has been targeting banking and financial organizations. The phishing kit enabled the attackers to send out more than 16,000 emails to a target’s contacts as part of the second-stage phishing campaign. To remediate the issue, it is recommended to reset the passwords for compromised users.

 Trends, Reports, Analysis

The 2023 Verizon Data Breach Investigations Report (DBIR) has confirmed what the FBI’s Internet Crime Complaint Center has pointed out earlier this year: BEC scammers are ramping up their social engineering efforts to great success.

 Identity Theft, Fraud, Scams

Hackers have devised an intricate phishing attack by leveraging the reputation of Germany’s renowned Anga Com conference to send spoofed emails and create deceptive web pages, deceiving unsuspecting users into divulging their login credentials.

 Malware and Vulnerabilities

Cybercriminals have added a new malware loader called DoubleFinger to their arsenal for stealing cryptocurrency and business information. GreetingGhoul comprises two major components that work together to steal cryptocurrency credentials. To protect themselves, organizations must look at the TTPs and IOCs associated with the malware.

 Malware and Vulnerabilities

Vietnamese public companies have been targeted by the SPECTRALVIPER backdoor in an ongoing campaign. The backdoor, a previously undisclosed x64 variant, offers various capabilities including file manipulation, token impersonation, and PE loading. SPECTRALVIPER can be compiled as an executable or DLL to imitate known binary exports.

 Feed

This Metasploit module exploits an unauthenticated remote code execution vulnerability in TerraMaster TOS versions 4.2.29 and below by chaining two existing vulnerabilities, CVE-2022-24990 "Leaking sensitive information" and CVE-2022-24989, "Authenticated remote code execution". Exploiting vulnerable   show more ...

endpoint api.php?mobile/webNasIPS leaking sensitive information such as admin password hash and mac address, the attacker can achieve unauthenticated access and use another vulnerable endpoint api.php?mobile/createRaid with POST parameters raidtype and diskstring to execute remote code as root on TerraMaster NAS devices.

 Feed

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

 Feed

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

 Feed

Debian Linux Security Advisory 5425-1 - It was discovered that PHP's implementation of SOAP HTTP Digest authentication performed insufficient error validation, which may result in a stack information leak or use of weak randomness.

 Feed

Debian Linux Security Advisory 5424-1 - It was discovered that PHP's implementation of SOAP HTTP Digest authentication performed insufficient error validation, which may result in a stack information leak or use of weak randomness.

 Feed

Ubuntu Security Notice 6160-1 - It was discovered that GNU binutils incorrectly performed bounds checking operations when parsing stabs debugging information. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

 Feed

Ubuntu Security Notice 6159-1 - It was discovered that Tornado incorrectly handled certain redirect. An remote attacker could possibly use this issue to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.

 Feed

Ubuntu Security Notice 6158-1 - It was discovered that Node Fetch incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information.

 Feed

Ubuntu Security Notice 6143-2 - USN-6143-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these   show more ...

to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Jun Kokatsu discovered that Firefox did not properly validate site-isolated process for a document loaded from a data: URL that was the result of a redirect, leading to an open redirect attack. An attacker could possibly use this issue to perform phishing attacks.

 Feed

Ubuntu Security Notice 6157-1 - Tao Lyu discovered that GlusterFS did not properly handle certain event notifications. An attacker could possibly use this issue to cause a denial of service.

 Feed

Ubuntu Security Notice 6148-1 - It was discovered that SNI Proxy did not properly handle wildcard backend hosts. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service, or arbitrary code execution.

 Feed

Ubuntu Security Notice 6156-1 - It was discovered that SSSD incorrectly sanitized certificate data used in LDAP filters. When using this issue in combination with FreeIPA, a remote attacker could possibly use this issue to escalate privileges.

 Feed

Ubuntu Security Notice 6155-1 - Dennis Brinkrolf and Tobias Funke discovered that Requests incorrectly leaked Proxy-Authorization headers. A remote attacker could possibly use this issue to obtain sensitive information.

 Feed

Ubuntu Security Notice 6154-1 - It was discovered that Vim was using uninitialized memory when fuzzy matching, which could lead to invalid memory access. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu   show more ...

23.04. It was discovered that Vim was not properly performing bounds checks when processing register contents, which could lead to a NULL pointer dereference. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

 Feed

This proof of concept abuses an SQL injection vulnerability in MOVEit to obtain a sysadmin API access token and then use that access to abuse a deserialization call to obtain remote code execution. This proof of concept needs to reach out to an Identity Provider endpoint which hosts proper RS256 certificates used to   show more ...

forge arbitrary user tokens - by default this POC uses horizon3ai's IDP endpoint hosted in AWS. By default, the exploit will write a file to C:WindowsTempmessage.txt. Alternative payloads can be generated by using the ysoserial.net project.

 Feed

Fortinet on Monday disclosed that a newly patched critical flaw impacting FortiOS and FortiProxy may have been "exploited in a limited number of cases" in attacks targeting government, manufacturing, and critical infrastructure sectors. The vulnerability, tracked as CVE-2023-27997 (CVSS score: 9.2), concerns a heap-based buffer overflow vulnerability in FortiOS and FortiProxy SSL-VPN that could

 Feed

"Dozens" of organizations across the world have been targeted as part of a broad business email compromise (BEC) campaign that involved the use of adversary-in-the-middle (AitM) techniques to carry out the attacks. "Following a successful phishing attempt, the threat actor gained initial access to one of the victim employee's account and executed an 'adversary-in-the-middle' attack to bypass

 Feed

Believe it or not, your attack surface is expanding faster than you realize. How? APIs, of course! More formally known as application programming interfaces, API calls are growing twice as fast as HTML traffic, making APIs an ideal candidate for new security solutions aimed at protecting customer data, according to Cloudflare. According to the "Quantifying the Cost of API Insecurity" report, US

 Feed

The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with masterminding the 2014 digital heist of the now-defunct cryptocurrency exchange Mt. Gox. According to unsealed indictments released last week, Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, have been accused of conspiring to launder approximately 647,000 bitcoins stolen from September 2011 through at

 Feed

A novel multi-stage loader called DoubleFinger has been observed delivering a cryptocurrency stealer dubbed GreetingGhoul in what's an advanced attack targeting users in Europe, the U.S., and Latin America. "DoubleFinger is deployed on the target machine, when the victim opens a malicious PIF attachment in an email message, ultimately executing the first of DoubleFinger's loader stages,"

 Feed

It might come as a surprise, but secrets management has become the elephant in the AppSec room. While security vulnerabilities like Common Vulnerabilities and Exposures (CVEs) often make headlines in the cybersecurity world, secrets management remains an overlooked issue that can have immediate and impactful consequences for corporate safety.  A recent study by GitGuardian found that 75% of IT

2023-06
Aggregator history
Tuesday, June 13
THU
FRI
SAT
SUN
MON
TUE
WED
JuneJulyAugust