Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Scam websites offeri ...

 Tips

There are lots of websites with tempting offers of quick and easy money working from home. But in reality, theyre likely to be from scammers looking to get gullible users to work for them for free and advertise their business. This post demonstrates the operation principle of several such schemes and gives tips on how   show more ...

to avoid falling victim to them. Many scams in one Who wouldnt want to earn money for doing regular online stuff: taking surveys, watching videos, playing games and other simple tasks? Thats how scammers lure victims to one of the sites. Home page of a scam website offering part-time work doing regular online activities The home page of the platform is overflowing with offers of easy-earning jobs. Scammers promise new recruits a whopping US$200 a day. Plus a US$25 signing-up bonus! Of course, there are numerous reviews from grateful users who have already become rich. But if you bother to read them, youll spot a lot of grammatical mistakes. Reviews from users who supposedly struck gold To earn money on the platform, you are asked to complete various tasks, such as testing apps, playing games, sharing a link to the site with friends, and the like. Tasks you get paid for In fact, all these tasks are just links to other scam resources. By visiting them, users create traffic to cybercriminals sites. This improves their position in search results. And also, cybercriminals may have their own footfall KPIs (key performance indicators). When the victim tries to get their money (the home page promises that this can be done through popular services like Cash App, Venmo, PayPal and others), they discover that they must first earn at least US$200. Message saying you need to earn US$200 to withdraw funds Sure, you wont see any payout even if you do earn 200 bucks. Nor can it be ruled out that the scammers domain wont simply be blocked before user even try — such sites have very short lifespan. After getting blocked, the scammers will get another domain and launch the whole scheme again with new victims. The scam itself is quite international. Besides English, the cybercriminals website is available in nine other languages. Although these versions look less professional. Share it with the whole world Now lets talk about a similar site with a more primitive design, but with a different mechanism for making money from naive users. The victims are offered two ways to earn. The first is to share the link and invite referrals to the website: you get US$1 for every 100 people. Whats more, the site supposedly lets you withdraw funds after accumulating just US$20. To earn this amount through inviting referrals, you need to attract 1500 users to the site (you get US$5 for signing-up). Home page of a site that pays you to share its link Sounds hard, but things arent all that bad, you have a chance to earn US$50 right away. But for this youll have to play the scammers game — by endlessly refreshing the page so that the two images match. They wont of course. Scammers game When the victim goes to the site, they are immediately asked for permission to display browser notifications. Through these, the cybercriminals distribute ads for various other scams or relatively legit adult sites. Thats the main objective: to lure as many victims as possible who will give this permission. And the image-matching game helps the scammers boost traffic to their own site and improve its search visibility. How to avoid falling victim? To avoid falling for online job scams: Dont believe promises of easy money. Dont enter payment information on dubious websites. Read our post on how to spot scammers. Use a robust security solution that will warn you before visiting suspicious sites and keep your money and data out of cybercriminals hands.

 Govt., Critical Infrastructure

A targeted cyberattack against Britain's national healthcare system could lead to larger-scale disruption causing the organization several years to recover, the U.K. government warns.

 Security Products & Services

Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox environments that are easy to deploy and destroy. It is available on GitHub.

 Malware and Vulnerabilities

A malicious package that mimics the VMware vSphere connector module ‘vConnector’ was uploaded on the Python Package Index (PyPI) under the name ‘VMConnect,’ targeting IT professionals.

 Trends, Reports, Analysis

A disconnect is brewing between how C-suite executives and cybersecurity workers perceive security’s role, according to a Cloud Security Alliance report released last week. The study by Expel surveyed 1,000 IT and security professionals in May.

 Trends, Reports, Analysis

A new Zscaler report stresses the need for organizations to reevaluate their security posture and migrate to a zero-trust architecture due to the increasing threat of cybercriminals exploiting VPN vulnerabilities.

 Malware and Vulnerabilities

Reptile, an open-source kernel module rootkit, designed to target Linux systems was found on GitHub. Unlike typical rootkit malware, Reptile not only conceals its presence but also offers a reverse shell, granting threat actors control over compromised systems. It is crucial to regularly inspect systems for vulnerable configurations and ensure all relevant software is up to date.

 Breaches and Incidents

Banks, telecoms providers, media, and tourism companies are thought to have been affected by the attacks, which followed a trip by Prime Minister Pedro Sanchez to Kyiv in which he expressed his government’s support for Ukraine.

 Expert Blogs and Opinion

Multi-modal monitoring through AI enables the identification of both data and conversation types, enhancing the ability to detect and prevent data leakage or any unauthorized activities.

 Malware and Vulnerabilities

MOVEit-hijacker Cl0p ransomware gang has changed its extortion tactics and is now using torrents to distribute data stolen in the MOVEit Transfer breaches. Previously, the group utilized Tor data leak sites, but this method was slow and easier to shut down. Through torrents, criminals are expecting faster transfer   show more ...

speeds making the leak more impactful. As torrents are decentralized, it becomes challenging for law enforcement to shut them down.

 Feed

Red Hat Security Advisory 2023-4497-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4499-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4500-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4495-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4496-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4493-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4494-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Red Hat Security Advisory 2023-4498-01 - D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.

 Feed

Red Hat Security Advisory 2023-4492-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Issues addressed include buffer overflow, bypass, and spoofing vulnerabilities.

 Feed

Debian Linux Security Advisory 5469-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

 Feed

Debian Linux Security Advisory 5468-1 - The following vulnerabilities have been discovered in the WebKitGTK web engine. YeongHyeon Choi discovered that processing web content may disclose sensitive information. Narendra Bhati discovered that a website may be able to bypass the Same Origin Policy. Narendra Bhati,   show more ...

Valentino Dalla Valle, Pedro Bernardo, Marco Squarcina, and Lorenzo Veronese discovered that processing web content may lead to arbitrary code execution. Various other issues were also addressed.

 Feed

The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as legitimate non-fungible token (NFT) developers to steal cryptocurrency and other digital assets from unsuspecting users. In these fraudulent schemes, criminals either obtain direct access to NFT developer social media accounts or create look-alike accounts to promote "exclusive" new NFT releases, often

 Feed

In today's interconnected world, evolving security solutions to meet growing demand is more critical than ever. Collaboration across multiple solutions for intelligence gathering and information sharing is indispensable. The idea of multiple-source intelligence gathering stems from the concept that threats are rarely isolated. Hence, their detection and prevention require a comprehensive

 Feed

A group of academics has devised a "deep learning-based acoustic side-channel attack" that can be used to classify laptop keystrokes that are recorded using a nearby phone with 95% accuracy. "When trained on keystrokes recorded using the video conferencing software Zoom, an accuracy of 93% was achieved, a new best for the medium," researchers Joshua Harrison, Ehsan Toreini, and Maryam Mehrnezhad

 Feed

Vulnerable Redis services have been targeted by a "new, improved, dangerous" variant of a malware called SkidMap that's engineered to target a wide range of Linux distributions. "The malicious nature of this malware is to adapt to the system on which it is executed," Trustwave security researcher Radoslaw Zdonczyk said in an analysis published last week. Some of the Linux distribution SkidMap

 Feed

A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with the goal of delivering a remote access trojan (RAT) capable of stealing sensitive information. Bot mitigation company Kasada said the activity is designed to "exploit trusted criminal networks," describing it as an instance of advanced threat actors "

 Feed

Two different North Korean nation-state actors have been linked to a cyber intrusion against the major Russian missile engineering company NPO Mashinostroyeniya. Cybersecurity firm SentinelOne said it identified "two instances of North Korea related compromise of sensitive internal IT infrastructure," including a case of an email server compromise and the deployment of a Windows backdoor dubbed

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Jotform. Thanks to the great team there for their support! What is form encryption, and why is it important? Whether you’re a pro with forms or just a newbie, it might be helpful to get an understanding of form encryption and why E2EE … Continue reading "Keep your sensitive data secure by using Encrypted Forms 2.0 from Jotform"

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Jotform. Thanks to the great team there for their support! What is form encryption, and why is it important? Whether you’re a pro with forms or just a newbie, it might be helpful to get an understanding of form encryption and why E2EE … Continue reading "Keep your sensitive data secure by using Encrypted Forms 2.0 from Jotform"

2023-08
Aggregator history
Monday, August 07
TUE
WED
THU
FRI
SAT
SUN
MON
AugustSeptemberOctober