Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for All things related t ...

 Privacy

As youve probably heard, Mark Zuckerberg has launched a Twitter competitor that goes by the name of Threads. So, lets have a look at how things are with privacy there. What is Threads and how does it operate? Threads is not a fully independent social network. Technically, its a continuation of Instagram, hived off   show more ...

into a separate app. To use most of the features in Threads, youll need an Instagram account: It will form the basis of your Threads profile. The Threads app itself is uncannily Twitter-esque. Viewing the two apps side by side, its easy to mix them up once the bird icon or Zuckerbergs squiggly shoelace scroll off the screen. Try to guess which is which As for posts, these can be read in the Threads app or on the web version threads.net (not to be confused with the site threads.com, which belongs to the developers of a corporate messenger similar to Slack). But using the site is, to put it mildly, inconvenient: theres no feed, no search, and just the option to follow direct links to someones profile or individual posts (which you still have to rummage around for). Basically, if youve ever tried using the Instagram website, you understand what were talking about. Posting in Threads without the app isnt possible at all. For one thing, the site doesnt even have a sign-in button; the main page offers a Get the app message and links to Google Play and the App Store, plus a QR code. Thus, theres nothing doing without both the app and an Instagram account (at least for now — more about that below). For now, you need the app to use Threads Scammers already love Threads Being such a modest website in terms of functionality, Threads is a gift to scammers. Our experts have already discovered phishing pages imitating the web version of the social network and collecting users logins and passwords — which match at least the login data for Instagram. In addition, so-called Threads Coin is already being sold for cryptocurrency on the Web. And it seems like even its creators dont fully understand the purpose of these coins, vaguely promising to connect users to the Metaverse. Finally, another scam promises to generate tens of thousands of followers for a freshly created Threads account. The obvious result of participating in any such schemes will only be the loss of money and personal data. How much data does Threads collect? All projects associated with Mark Zuckerberg are known for being excessively data-hungry. Perhaps only the omnipresent Google can rival the Zuckerberg empire when it comes to harvesting personal information. Threads, it seems, is no exception: according to its App Store description, the social network collects all user data it can lay its hands on. However, there are a couple of nuances to bear in mind. First: the list of data collected is identical to Instagrams. Categories of data collected by Threads and Instagram Second: this list is written by the app developers themselves, so it doesnt have to be completely true. And apparently, for now it lists some categories of data that Threads doesnt request access to yet. For example, it mentions access to location, but, at the time of posting, the app doesnt request that permission. This may change in the future, but for now thats the way it is. Threads and Instagram app permissions What about Twitter? The social network Zuckerberg is trying to knock aside also hoovers up user data like theres no tomorrow. Who knew?! Heres the equivalent list for the Twitter app, kindly provided once again by the App Store. Take a look at what it wants: Categories of data collected by Twitter On a separate note, we should mention that Twitter has worked hard these past few years to complicate interaction for users who dont log in. As things stand, to read other peoples tweets, its advisable to have your own Twitter account — so in this sense, Musks bird is no better than Zuckerbergs squiggle. However, Twitter still has the edge (for now) — a fully-functional web version, which gives you a chance to fend off some of its data-grabbing practices by using a private browser. Should Instagram users get a Threads profile? As we said above, Threads and Instagram have the same permission list. So, if you already use Insta and arent too bothered by the amount of data Zuckerberg collects about you, dont worry: the Threads app wont harvest any new kinds of information. It will still read your posts, though. There are plenty of scare stories doing the rounds right now that if Threads users want to leave it, theyll lose their Instagram account too. Otherwise, allegedly, it will simply not be possible to delete the account from the Twitter analog. However, its important to understand here that there are no Threads accounts (deleting what doesnt exist in the first place may indeed be tricky) — only Threads profiles linked to Instagram accounts. You cant delete your profile, but you can deactivate it. After that, all app-based information will no longer be visible to other users. In practical terms, this differs little from deletion. So, long story short, if you already use Instagram, theres nothing to fear about creating a Threads profile. If you dont like the app for some reason, you can deactivate your profile, and everything you published there will be hidden. Is Instagram worth signing up to for Threads? If you dont have an Instagram account but have decided to get one to use Threads, you may want to reconsider; especially if your main reason for staying off Instagram all this time has been privacy. The thing is that Threads promises the opportunity to enter the Fediverse (a decentralized association of independent social networks) using the ActivityPub protocol. This feature is operational yet, but Threads developers are reportedly planning to add it to the platform. This means youll be able to post on Threads not only without creating a profile, but without having an Instagram account or even installing any app created by a Zuckerberg company. Instead, youll be able to use an alternative, less data-greedy social network account. But you need to wait for the feature to be implemented. Alternatives to Twitter and Threads The primary alternative to Threads and Twitter is Mastodon. This social network is already part of the Fediverse and supports ActivityPub (so in the future it will be possible to read and write Threads posts through it). Another important plus is that the Mastodon app collects hardly any user data at all. And there are lots of Mastodon client apps out there for you to choose from. On top of that, journalists from Wired magazine suggest a few other Twitter and Threads alternatives: Bluesky, Hive Social and Spill. All of these microblogging platforms collect significantly less user data than either Threads or Twitter. However, they dont offer ActivityPub support. In our next post, well talk about how you can improve privacy in Zuckerbergs potential Twitter-killer for those who do decide to give Threads a whirl. Also, to secure your internet surfing, we recommend using a reliable VPN.

 Malware and Vulnerabilities

FortiGuard Labs claimed to have found several Office maldocs purposed to exploit known vulnerabilities, specifically CVE-2021-40444 and CVE-2022-30190 (Follina). Researchers noted that the version of Lokibot used in the campaign includes MD5 hash. This version of Lokibot info-stealer seems to have appeared first in March.

 Trends, Reports, Analysis

Security researchers published its Digital Risk Trends 2023 report and noted a significant rise in phishing websites, with a 62% year-on-year growth, and a surge of 304% in scam pages. Scammers exhibited a particular interest in brands from the APAC and MEA regions. Organizations must implement robust security measures and foster a proactive cybersecurity culture among employees.

 Trends, Reports, Analysis

Mandiant outlined how two USB malware campaigns have been observed this year; one named 'Sogu,' attributed to a Chinese espionage threat group 'TEMP.HEX,' and another named 'Snowydrive,' attributed to UNC4698, which targets Asian oil and gas firms.

 Trends, Reports, Analysis

Barracuda Networks teamed up with Columbia University to analyze over 300,000 extortion emails tracked by the firm over a one-year period. They looked specifically at the Bitcoin addresses used by the scammers in order to discern specific trends.

 Breaches and Incidents

The NRC said it immediately suspended the database to protect the data and prevent further attacks. They also launched an external forensic investigation to determine the scope and impact of the cyberattack.

 Breaches and Incidents

Residents of Cornelius, North Carolina, are dealing with delayed or unavailable services after a ransomware attack earlier this week. Officials said, on July 11, they discovered a cybersecurity incident later determined to be a ransomware attack.

 Companies to Watch

Cisco’s cybersecurity shopping spree hit another gear Thursday with the planned acquisition of Oort, an early-stage startup selling software in the Identity Threat Detection and Response (ITDR) category.

 Malware and Vulnerabilities

The BlackLotus source code that was published on GitHub on Wednesday has been stripped of the ‘Baton Drop’ exploit targeting CVE-2022-21894, and uses the bootlicker UEFI firmware rootkit, but contains the rest of the original code.

 Feed

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

 Feed

Ubuntu Security Notice 6230-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor.

 Feed

Ubuntu Security Notice 6229-1 - It was discovered that LibTIFF was not properly handling variables used to perform memory management operations when processing an image through tiffcrop, which could lead to a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute   show more ...

arbitrary code. It was discovered that LibTIFF was not properly processing numerical values when dealing with little-endian input data, which could lead to the execution of an invalid operation. An attacker could possibly use this issue to cause a denial of service

 Feed

A new malware strain has been found covertly targeting small office/home office (SOHO) routers for more than two years, infiltrating over 70,000 devices and creating a botnet with 40,000 nodes spanning 20 countries. Lumen Black Lotus Labs has dubbed the malware AVrecon, making it the third such strain to focus on SOHO routers after ZuoRAT and HiatusRAT over the past year. "This makes AVrecon one

 Feed

Zimbra has warned of a critical zero-day security flaw in its email software that has come under active exploitation in the wild. "A security vulnerability in Zimbra Collaboration Suite Version 8.8.15 that could potentially impact the confidentiality and integrity of your data has surfaced," the company said in an advisory. It also said that the issue has been addressed and that it's expected to

 Feed

As security practices continue to evolve, one primary concern persists in the minds of security professionals—the risk of employees unintentionally or deliberately exposing vital information. Insider threats, whether originating from deliberate actions or accidental incidents, pose a significant challenge to safeguarding sensitive data. To effectively address insider risks, organizations must

 Feed

All-In-One Security (AIOS), a WordPress plugin installed on over one million sites, has issued a security update after a bug introduced in version 5.1.9 of the software caused users' passwords being added to the database in plaintext format. "A malicious site administrator (i.e. a user already logged into the site as an admin) could then have read them," UpdraftPlus, the maintainers of AIOS, 

 Feed

A malicious actor has been linked to a cloud credential stealing campaign in June 2023 that's focused on Azure and Google Cloud Platform (GCP) services, marking the adversary's expansion in targeting beyond Amazon Web Services (AWS). The findings come from SentinelOne and Permiso, which said the "campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew,"

 Feed

Multiple security vulnerabilities have been discovered in various services, including Honeywell Experion distributed control system (DCS) and QuickBlox, that, if successfully exploited, could result in severe compromise of affected systems. Dubbed Crit.IX, the nine flaws in the Honeywell Experion DCS platform allow for "unauthorized remote code execution, which means an attacker would have

2023-07
SAT
SUN
MON
TUE
WED
THU
FRI
JulyAugustSeptember