Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Step-by-step recomme ...

 Privacy

For some, Twitch streaming brings fame and fortune. The platforms genre diversity has long transcended the boundaries of video games: artists, athletes and even bicycle couriers have all found appreciative audiences. From professional gamers to guitarists, all are united by the desire to connect with fans and earn a   show more ...

crust without falling victim to bullies, pranksters or spammers. Here are the security measures that all Twitch streamers need to take. How to protect personal information Set up separate accounts specifically for Twitch that wont point to the real you in search results, social media or forums. Your Twitch handle should not be your actual name, or even resemble it. This tip will be a recurring theme throughout this post: there is no need whatsoever for your fans to know your name or where you live. Use profile pics that are completely different from the ones on your social networks – similar photos are easy to find. Twitch-related accounts (profiles on Discord, social networks, etc.) must be registered under your Twitch handle and not give away your real name. If you already have personal accounts on Twitter, YouTube and the like, do not use them in conjunction with Twitch, but create new ones. We recommend that active streamers use a separate email and phone number that are linked only to accounts used for streaming (Twitch, Discord, YouTube, etc.). If you accept snail mail (fan letters/gifts, etc.), set up a PO Box. And do not use the box for any other purpose. In some countries, a PO Box can be set up under any name, in which case use your Twitch handle. If thats not an option and you need to give out personal information, ask the post office if theres a way to avoid revealing your real name. If Twitch becomes a regular source of income, consider setting up a legal entity and registering your domains, mailboxes and other assets under it. Check out our detailed guide to Twitch security and privacy settings. Use a strong unique password and two-factor authentication and install a comprehensive security solution for gamers on your computers that does not affect streaming and protects against phishing. How to moderate Twitch chats Draw up a list of chat rules and share it with fans. Youll make life easier for yourself and your moderators. We recommend formulating rules such as: It is forbidden to post links, It is forbidden to disclose names, contact details or other personal information in a chat – this will protect both you and the chat participants. If you dont want fans to ask you about certain aspects of your personal life, you can explicitly set off-limit topics in the rules. Posting links should be banned not only because of the threat of spam; special URL-shortening services can be used to spy on the IP addresses and other data of those who tap or click on the link. Review the automatic chat moderation settings, and enable AutoMod if you think it will help you and your moderators. The level of moderation can be customized for sensitive topics. There is also a manually updatable list of bad words that can be filtered by AutoMod. Avoid sweeping bans on terms and topics – false positives annoy chatters. If there are chat users you know personally (especially offline), ask them separately not to discuss topics that you consider inappropriate. Make sure you are on the same page regarding no-go topics. If a chat user reveals any personal information about you (name, address or anything else), just delete the message and do not respond in any way. Do not comment on the veracity of the information. And delete personal information that someone has clearly made up – again without responding. How to hide personal information in Twitch videos Before you start streaming, make sure theres nothing in shot that shouldnt be there. Here are some things that can give away personal information to eagle-eyed viewers: Envelopes, documents, bills, autographed photos, framed certificates. Personalized or souvenir clothing. Besides your own name, the name of a school, university or company on a souvenir T-shirt, for example, could be used to identify you. Personalized backpacks, mugs, plates, etc. Distinctive pieces of furniture and jewelry. Window views, even partial. Underwear or very personal items. Housemates, family members, pets. Create a signature backdrop (physical or virtual), and use it in all your streams. We recommend setting a short broadcast delay (from ten seconds to one minute) to give you time to react to potential glitches and incidents. This will make things much harder for stream snipers. Turn off your smart speakers and other voice-activated gadgets, or move them to another room. There have been cases of voice assistants leaking information during streams. If you are IRL streaming outside, always turn on your camera a good distance from home, so you dont reveal the name of your street or a view of where you live. And its a bad idea to show buildings that could easily lead to you: school, workplace, nearby bus stops, stores, etc. If youre streaming from a public place, be aware that interlopers, including IRL stream snipers, can get in your shot. Be prepared: practice emergency muting and wallpapering, and more importantly, have a plan of action to get rid of the intruder. How to hide personal information in Twitch screencasts A lot of streamers show their screens. This is especially true for game streaming, but sometimes you may need to show something in your browser, Discord, or another app. Test all such apps in advance to make sure there is no inappropriate information on the screen. When streaming, make sure that only the apps you need are running. Anything extraneous should be turned off, closed or moved to another monitor that is not in the stream. Pay close attention to the contents of the Dock/Taskbar, tray icons (including the clock) and files on the desktop. Check that pop-ups and notifications are disabled or displayed on a non-streaming monitor. We recommend showing web content in a private browser used exclusively for this purpose, preferably in incognito mode. Make sure that you are not signed in to any personal accounts not related to streaming, such as email and other services. Make sure your streaming browser is configured to block ads and tracking. Keep in mind that contextual advertising may reveal your interests and approximate location, so turn it off during streaming. Use Kaspersky Premium settings to minimize ads and privacy risks. Again, set a slight delay in streaming (from ten seconds to one minute) to give yourself time to calmly deal with unforeseen situations and make the job of stream snipers more difficult. Prepare animated background images – saying Starting in a couple of minutes, Thank you, Be right back, and so on – to keep your audience engaged while setting up or dealing with technical issues. These are easily added in OBS Studio. Certain games and game consoles offer special tools to protect the privacy of streamers. Look for features that allow you to hide your alias and avatar, PSN username, region information and pings to game servers. How to protect personal information in donations and wishlists If Twitch is a regular source of income for you, consider creating a legal entity to pay your earnings into and help protect your real identity. Twitch donations are usually made through PayPal. Any user can go to their payment history and view the real names of senders and recipients. To avoid such crude unmasking, use a PayPal business account. If your country doesnt allow PayPal or you cant switch to a PayPal business account, choose a service that accepts bank card donations and doesnt show the recipients real name. If you receive gifts or snail mail in your PO Box, make sure that all name and address labels, post office stamps and other such information have been removed before showing such items to your viewers. Your PO Box for Twitch must not be used for anything else. It is becoming common practice to create wishlists on marketplaces like Amazon. Create a separate account for your Twitch wishlist – do not put it under an account that you use for everyday purchases. If possible, register the account under your Twitch handle. General privacy tips for Twitch streamers Its a good idea to start thinking about privacy from day one, without waiting until you become a super-streamer – its better to build a safety net right away than try to wipe your data off the internet later. Use our guide to design your own personal threat landscape, as practiced in corporate security. And for maximum privacy protection, use an all-in-one security solution like Kaspersky Premium: Protects against viruses and phishing. Prevents intrusion attempts, including through remote access tools. Blocks ads. Removes traces of your activity. Prevents online collection of personal data. Detects leaks of personal data containing email addresses and phone numbers. Provides encrypted storage of data and documents. Offers premium priority technical support. Includes a password manager with generation of two-factor authentication codes. Your Kaspersky Premium subscription covers all your devices. For more information on features and capabilities, please see our separate posts on protection for computers and Android/iOS smartphones.

image for Transatlantic Cable  ...

 News

We kick off Episode 311 of the Transatlantic Cable Podcast by talking about how Mexican cartels are using the US governments CBP One app to help immigrants make their way through Mexico to the US borders. Then, were heading over to Finland, where theyve seen a crazy increase in ransomware attacks ever since they   show more ...

joined NATO. And hey, ever wondered why Google guzzled up a whopping 5.6 billion gallons of water last year? Weve got the scoop on that too! Wrapping things up, well dive into the world of hacking, as a sneaky group of North Korean hackers managed to break into the computer networks of a major Russian missile developer. Mexican cartels exploit US governments CBP One app Finland sees fourfold spike in ransomware attacks since joining NATO, senior cyber official says GOOGLE IS USING A FLABBERGASTING AMOUNT OF WATER ON AI North Korean hackers breached top Russian missile maker

 Incident Response, Learnings

Tampa General Hospital is facing at least three proposed federal class action lawsuits filed in recent days following the nonprofit Florida healthcare provider's disclosure late last month of a data theft incident that affected 1.3 million people.

 Companies to Watch

The $17.7 million insider funding round brings the total raised by the data security company to more than $35 million. ForgePoint Capital, Prefix Capital, W11 Capital Management, and TSG (The Syndicate Group) participated in the latest funding round.

 Malware and Vulnerabilities

German software giant SAP has fixed more than a dozen new vulnerabilities with its August 2023 Patch Tuesday updates, including a critical flaw affecting the company’s PowerDesigner data modeling and enterprise architecture product.

 Trends, Reports, Analysis

Ransomware groups are shifting their tactics from relying on phishing methods and are now prioritizing the exploitation of vulnerabilities to exfiltrate data from victims' systems. Additionally, these groups have adopted a more assertive strategy to extort and capitalize on vulnerabilities. They even invest in   show more ...

various avenues for financial profit, such as collaborating with other hackers to identify weaknesses in their ransomware code or leveraging Initial Access Brokers (IABs) to gain entry to their target victims.

 Trends, Reports, Analysis

Over the course of three months beginning in January 2023, Sophos X-Ops investigated four different ransomware attacks, one involving Hive, two by Royal, and one by Black Basta, and noticed distinct similarities between the attacks.

 Security Culture

Alternative education options, such as vocational-technical schooling and industry-relevant certifications, offer cost-effective pathways for aspiring cybersecurity professionals.

 Trends, Reports, Analysis

Proofpoint came across EvilProxy, a phishing platform, being used in a large-scale campaign targeting MFA-protected Microsoft 365 accounts, with over 120,000 phishing emails sent to more than hundreds of organizations. The campaign primarily targeted high-ranking executives. Organizations must enhance their email and web security to defend against advanced hybrid threats.

 Threat Intel & Info Sharing

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory detailing the malware, dubbed “Whirlpool.” It claimed the backdoor established a TLS reverse shell to a command-and-control (C2) server.

 Breaches and Incidents

Security researchers at Akamai say they have identified a server-side template injection campaign aimed at Magneto 2 shops that have yet to address CVE-2022-24086, an input validation flaw with a CVSS score of 9.8.

 Feed

Debian Linux Security Advisory 5475-1 - Daniel Moghimi discovered Gather Data Sampling (GDS), a hardware vulnerability for Intel CPUs which allows unprivileged speculative access to data which was previously stored in vector registers. This mitigation requires updated CPU microcode provided in the intel-microcode   show more ...

package. Daniel Trujillo, Johannes Wikner and Kaveh Razavi discovered INCEPTION, also known as Speculative Return Stack Overflow (SRSO), a transient execution attack that leaks arbitrary data on all AMD Zen CPUs. An attacker can mis-train the CPU BTB to predict non-architectural CALL instructions in kernel space and use this to control the speculative target of a subsequent kernel RET, potentially leading to information disclosure via a speculative side-channel.

 Feed

Ubuntu Security Notice 6278-2 - USN-6278-1 fixed several vulnerabilities in .NET. This update provides the corresponding updates for Ubuntu 22.04 LTS. It was discovered that .NET did properly handle the execution of certain commands. An attacker could possibly use this issue to achieve remote code execution.

 Feed

Ubuntu Security Notice 6277-2 - USN-6277-1 fixed vulnerabilities in Dompdf. This update provides the corresponding updates for Ubuntu 22.04 LTS. It was discovered that Dompdf was not properly validating untrusted input when processing HTML content under certain circumstances. An attacker could possibly use this issue to expose sensitive information or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS.

 Feed

Ubuntu Security Notice 6282-1 - Jackson Henry discovered that Velocity Tools incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code.

 Feed

A set of 16 high-severity security flaws have been disclosed in the CODESYS V3 software development kit (SDK) that could result in remote code execution and denial-of-service under specific conditions, posing risks to operational technology (OT) environments. The flaws, tracked from CVE-2022-47378 through CVE-2022-47393 and dubbed CoDe16, carry a CVSS score of 8.8 with the exception of

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched security flaw in Microsoft's .NET and Visual Studio products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-38180 (CVSS score: 7.5), the high-severity flaw relates to a case denial-of-service (DoS) impacting .NET and Visual Studio. It

 Feed

An unknown threat actor has been linked to a cyber attack on a power generation company in South Africa with a new variant of the SystemBC malware called DroxiDat as a precursor to a suspected ransomware attack. "The proxy-capable backdoor was deployed alongside Cobalt Strike Beacons in a South African nation's critical infrastructure," Kurt Baumgartner, principal security researcher at

 Feed

Google has announced plans to add support for quantum-resistant encryption algorithms in its Chrome browser, starting with version 116. "Chrome will begin supporting X25519Kyber768 for establishing symmetric secrets in TLS, starting in Chrome 116, and available behind a flag in Chrome 115," Devon O'Brien said in a post published Thursday. Kyber was chosen by the U.S. Department of Commerce's

 Feed

The Chinese threat actor known as APT31 (aka Bronze Vinewood, Judgement Panda, or Violet Typhoon) has been linked to a set of advanced backdoors that are capable of exfiltrating harvested sensitive information to Dropbox. The malware is part of a broader collection of more than 15 implants that have been put to use by the adversary in attacks targeting industrial organizations in Eastern Europe

 Feed

A hitherto undocumented threat actor operating for nearly a decade and codenamed MoustachedBouncer has been attributed to cyber espionage attacks aimed at foreign embassies in Belarus. "Since 2020, MoustachedBouncer has most likely been able to perform adversary-in-the-middle (AitM) attacks at the ISP level, within Belarus, in order to compromise its targets," ESET security researcher Matthieu

2023-08
Aggregator history
Friday, August 11
TUE
WED
THU
FRI
SAT
SUN
MON
AugustSeptemberOctober