Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Travel phishing and  ...

 Threats

Summers here, with the vacation season in full swing. Along with holidaymakers, tourist-targeting scammers are also getting more active. Our experts studied the dangers confronting travelers in the 2023 vacation season. Heres what they found out Phishing attacks on Booking.com users Lets start with a phishing site   show more ...

mimicking Booking.com, one of the worlds most popular sites for online hotel and apartment bookings. The aim of the fake site is to harvest email addresses that double up as usernames, as well as some kind of email passwords. The phishers seem to have got their nets in a twist: what theyre really after is probably passwords for Booking.com accounts. Phishers harvest login credentials of Booking.com users Interestingly, the phishers didnt forget about the second largest category of Booking.com users: hotel and apartment owners who use the website to attract clientele. For them, too, there are fake sites that hoover up usernames and passwords. Another site pretending to be Booking.com harvests credentials of hotel and apartment owners To avoid such tricks, always carefully check the website address before entering any credentials on it. If youre unsure what the real address should be, better to double-check using a search engine and good old Wikipedia. Scammers prey on Airbnb users Inevitably, cybercriminals havent ignored that other bastion of online accommodation booking, Airbnb. A fake Airbnb site — a carbon copy of the original — offers attractive apartment rentals and doggedly reminds the visitor that they must make a wire transfer to some agent to confirm their reservation. Fake Airbnb site urges visitors to pay for a non-existent booking It goes without saying that customers who send the transfer are left with nothing but a hole in their wallet. To avoid this danger, always carefully check the address of the site before sending money to its owners. Harvesting user data on fake travel survey sites A less serious, but also less-than-pleasant online scam involves sites promising valuable gifts for taking a survey. In this case — travel surveys offering a prize of US$100. Enticed by the prospect of a US$100 gift, the visitor is asked to take a fake survey (and hand over personal data) At the end of the survey, the scammers usually ask the victim for some personal data: first and last name, address, phone number and sometimes payment information. Such data can be used at a later date for all kinds of bad stuff — from identity theft to hacking into financial accounts. As for the prize, its not exactly forthcoming. Avoiding this threat is easy: dont fall for the promise of easy money — especially when its an unfeasibly large sum that falls from the sky. Airline phishing sites Another traditional target for phishers is airline passengers. Fake pages are forever popping up imitating the official sites of different carriers. Of course, the bigger the airline, the more likely its customers credentials will be hunted by phishers. Phishing site hungry for a popular airlines customer accounts The goal here can be twofold. First, there can be a direct financial interest: all major airlines have loyalty programs with bonus points that are a kind of currency. If cybercriminals manage to hack into someones account holding sufficient bonus points, they can buy a ticket and sell it for real money, which they pocket. Phishing site that harvests credentials for an airline loyalty program accounts Second, login credentials can be collected in order to hijack other accounts held by the victim. This method of hacking has a very good chance of success, since password reuse is still common, sadly. So a password for an airline loyalty program account could well work for email. Unusual airline ticket scams This year has also seen a rather unconventional method of defrauding airline ticket buyers bound for the UK. Scammers posing as travel agency employees offer tickets at extremely attractive prices. Whats more, after payment, the booking shows up in all systems — its completely real. However, the fraudsters dont actually buy any tickets; rather, they exploit the temporary ticket reservation service thats used in many booking systems and costs no more than a few dozen dollars. The service even assigns a so-called passenger name record (PNR) to the booking — a six-digit alphanumeric code that goes by different names, depending on the airline: booking reference, reservation number, flight confirmation code, etc. This code lets you check the booking on the airlines website and make sure its logged in the system. Of course, since the scammers never redeem the ticket, when the holding time is up the reservation turns into a pumpkin. The difference between the hundreds of dollars paid for the non-existent ticket and the twenty-odd bucks spent on the reservation service is duly pocketed by the fraudsters, who then mysteriously fail to respond to the victims urgent inquiries. Incidentally, theres a way to make sure that you paid for a proper ticket — not a reservation. Simply look in the booking information for a 13-digit ticket number (for example, 123-4567890123), and not for a six-digit PNR (for example, A1B2C3). If theres a ticket number, it means the airline ticket has been paid for and issued and youve nothing to worry about. How to stop scammers ruining your vacation Lastly, a few tips on how to protect your trip from online scammers and phishers: When buying airline tickets, as well as booking hotels and apartments, use only reputable websites. If possible, buy your tickets directly on the airlines own site. It might be a little more expensive, but its always safer. Dont be fooled by the promise of prizes or fairy-tale low prices. As you know, if the cheese is free, its likely in a mousetrap. Carefully check the address of the site you end up on. And triple-check the page URL before entering any important information there: username and password, payment card number, etc. Never share reservation numbers with anyone, or post photos of airline tickets with a visible barcode or PNR on social networks — heres why. A few days before your departure date, check all the bookings youve made for the trip. If theres a problem with a reservation, better to sort it out beforehand, not at the airport check-in desk or hotel reception. Use a reliable antivirus with built-in protection against online fraud and phishing on all your devices. This will give you early warning of sites to avoid.

 Identity Theft, Fraud, Scams

Cybercriminals have adopted a deceptive strategy by introducing fake "Are You Human" checks. The aim of this malicious scheme is to trick unsuspecting individuals into granting unnecessary permissions, thereby exploiting their trust and potentially gaining unauthorized access to sensitive information. These websites, furthermore, exploit the granted permissions to establish a backdoor into your browser.

 Identity Theft, Fraud, Scams

Users clicking on seemingly legitimate ads for postal package tracking can be redirected to malicious websites that collect sensitive data, such as credit card details and banking credentials.

 Malware and Vulnerabilities

Technical information has emerged for a serious vulnerability affecting multiple Linux kernel versions. The security issue is referred to as StackRot (CVE-2023-3269) and can be used to compromise the kernel and elevate privileges.

 Trends, Reports, Analysis

Small organizations face the same security threats as organizations overall but have fewer resources to address them, according to Netwrix. The most common security incidents are phishing, ransomware, and user account compromise.

 Breaches and Incidents

The tech retailer Poorvika had a non-password-protected data breach exposing sensitive employee and customer data. The breach included a vast number of records, including personal information, email addresses, tax invoices, and payment receipts.

 Incident Response, Learnings

International cops have arrested a suspected "key figure" of a cybercrime group dubbed OPERA1ER that has stolen as much as $30 million from more than 30 banks and financial organizations across 15 countries.

 Malware and Vulnerabilities

The recent detection of RedEnergy stealer-as-a-ransomware represents an advanced threat that combines stealthy data theft and encryption techniques to cause significant damage and seize control over its targets. 

 Feed

Debian Linux Security Advisory 5448-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

 Feed

Debian Linux Security Advisory 5447-1 - Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in cross-site scripting, a bypass of vandalism protections or information disclosure.

 Feed

Ubuntu Security Notice 6204-1 - Seth Arnold discovered that CPDB incorrectly handled certain characters. An attacker could possibly use this issue to cause a crash or execute arbitrary code.

 Feed

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged   show more ...

the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

 Feed

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

 Feed

Red Hat Security Advisory 2023-3915-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.44.

 Feed

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

 Feed

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

 Feed

Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.

 Feed

A suspected senior member of a French-speaking hacking crew known as OPERA1ER has been arrested as part of an international law enforcement operation codenamed Nervone, Interpol has announced. "The group is believed to have stolen an estimated USD 11 million -- potentially as much as 30 million -- in more than 30 attacks across 15 countries in Africa, Asia, and Latin America," the agency said.

 Feed

Gcore Radar is a quarterly report prepared by Gcore that provides insights into the current state of the DDoS protection market and cybersecurity trends. This report offers you an understanding of the evolving threat landscape and highlights the measures required to protect against attacks effectively. It serves as an insight for businesses and individuals seeking to stay informed about the

 Feed

Details have emerged about a newly identified security flaw in the Linux kernel that could allow a user to gain elevated privileges on a target host. Dubbed StackRot (CVE-2023-3269, CVSS score: 7.8), the flaw impacts Linux versions 6.1 through 6.4. There is no evidence that the shortcoming has been exploited in the wild to date. "As StackRot is a Linux kernel vulnerability found in the memory

 Feed

As technology advances and organizations become more reliant on data, the risks associated with data breaches and cyber-attacks also increase. The introduction of data privacy laws, such as the GDPR, has made it mandatory for organizations to disclose breaches of personal data to those affected. As such, it has become essential for businesses to protect themselves from the financial and

 Feed

Cybersecurity researchers have unearthed an attack infrastructure that's being used as part of a "potentially massive campaign" against cloud-native environments. "This infrastructure is in early stages of testing and deployment, and is mainly consistent of an aggressive cloud worm, designed to deploy on exposed JupyterLab and Docker APIs in order to deploy Tsunami malware, cloud credentials

 Feed

The Iranian nation-state actor known as TA453 has been linked to a new set of spear-phishing attacks that infect both Windows and macOS operating systems with malware. "TA453 eventually used a variety of cloud hosting providers to deliver a novel infection chain that deploys the newly identified PowerShell backdoor GorjolEcho," Proofpoint said in a new report. "When given the opportunity, TA453

 Podcast

Just how much do porn websites know about your sexual peccadillos? How are Barbie dolls involved in identity scams? And would you trust a completely free telly? Oh, and Graham has some opinions to share about "Indiana Jones and the Dial of Destiny". All this and much much more is discussed in the latest   show more ...

edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Matt Davey from the "Random but Memorable" podcast.

2023-07
Aggregator history
Thursday, July 06
SAT
SUN
MON
TUE
WED
THU
FRI
JulyAugustSeptember