Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How scammers are exp ...

 Threats

Since Elon Musk bought Twitter, theres been such a constant stream of changes on the social platform that its been genuinely difficult to keep up — especially for those who dont spend all their free time on Twitter. One significant change that looks likely its here to stay concerns Xs account verification system —   show more ...

the notorious blue checkmarks. So lets investigate what has changed, what the unpleasant consequences are, and why you simply cant trust blue badges anymore. Why you cant trust accounts with blue checkmarks anymore: scammers on Twitter X Many users are not fully aware of whats happening with the account verification system on Twitter X, and continue to consider blue-badged accounts to be verified. Of course, scammers see this as a great opportunity. They target people using the social network to complain about the poor service of large companies such as hotel booking systems, airlines, banks, and so on. It used to be a fairly effective way to seek justice. Official, verified accounts of the companies responded to posts to help solve the problem, even if those posts had just a few likes and shares. Now, fraudsters can respond to the complaints of disgruntled customers from official profiles. After all, anyone can buy a blue checkmark, which until recently was a reliable indicator that you were dealing with a verified, official account. Scammers use these profiles to promise refunds and then, under this pretext, get their victims to reveal their financial data. Often, they ask the user to provide a phone number and then switch the communication to instant messengers and/or voice calls. Recently, a case was reported in which a Booking.com customer, tired of waiting for a promised refund, decided to complain about the company on X. The customer received a response from an account pretending to belong to Booking.com support, inviting him to continue the conversation in private messages. The criminals then called the victim on WhatsApp and promised to refund the money through a partner, for which the victim was asked to download a certain app. The fake Booking.com support account looked quite convincing. Only a couple of details gave the scammers away: an unexpected hyphen in the account name and the date of joining X — July 2023. Fortunately, the user suspected something was wrong in time; he stopped communicating with the criminals and contacted journalists, who incidentally ultimately helped him get a real refund from the booking platform. Its safe to assume that not all victims of scammers on ex-Twitter are so lucky. What checkmarks and badges are now available on X? It really isnt easy to make sense of whats been happening on the microblogging platform over the past year. Lets retrace how events unfolded with the infamous blue checkmark and the X Premium subscription: The Twitter Blue paid subscription concept was developed before the deal with Musk, and the idea of buying blue checkmarks was in no way planned. It was launched in test mode for users in Australia and Canada in June 2021, adding several useful features such as bookmark folders, Reader Mode, and the ability to edit tweets. In November 2022, shortly after the deal with Musk, Twitter launched a new version of Twitter Blue, introducing the opportunity for anyone to get a blue checkmark. Additional gray checkmarks also appeared — these were given to verified accounts that had previously had blue checkmarks. However, this feature was quickly discontinued, since it deprived the paid blue check mark of any meaning (because it simply highlighted paid profiles). Due to an influx of fake accounts, Twitter Blue subscription purchases were blocked for a while. But this option reappeared in December 2022 — this time with new gold and gray checkmarks added (but with completely different meanings — more on that below). For the next few months, accounts with blue checkmarks purchased as part of the Twitter Blue subscription coexisted alongside profiles that received the blue badge the traditional way — through verification. In April 2023, the platform began revoking old badges of verified accounts. However, its not entirely clear whether they were revoked from all profiles. For example, Stephen King claimed that his blue checkmark remained, and was included in the number of Twitter Blue subscribers, although he did not pay for it. Finally, in July 2023, Twitter was renamed X, and got a new logo and address: x.com (at the time of writing this text, this address works along twitter.com). Meanwhile, the Twitter Blue subscription was renamed X Premium. Confused? Thats understandable. The rate of change on this platform is quite remarkable. So lets talk about what badges were left with now on X, after all this turmoil. Blue checkmark: means almost nothing The blue checkmark next to a profile name basically means just one thing: this account has an active X Premium subscription. Most likely, the account owner paid for this subscription, although there may be some exceptions (like Stephen King). What the blue checkmark on X means: the account has an active X Premium (Twitter Blue) subscription So, the blue checkmark is no longer a guarantee that its owner can be trusted. Its just a premium account icon. Gold checkmark: official accounts of commercial organizations Simultaneously with giving out blue checkmarks to anyone who wants one, X has introduced a couple of other badges. Company accounts are now marked with a yellow icon (gold as they call it on the platform). Also, their profile picture is square-shaped (regular accounts still have round user pics). What the yellow checkmark on X means: an official company account This subscription type is called X Verified Organizations and costs much more — $1000 per month versus $8 for blue X Premium profiles. A gold business account can add other profiles to its list of affiliates and get blue, yellow, or gray badges for them. These cost an additional $50 for each affiliated account. Gray checkmark: accounts of government organizations and officials The blueish-gray checkmarks in the current X color scheme indicate accounts of state and supranational organizations as well as their officials. What the gray checkmark on X means: a government organization account If the account with the gray checkmark is for an organization, the account gets a square-shaped user pic, while for individuals its still round. What the gray checkmark on X means: an official figures account Logo icon: accounts affiliated with companies Besides the checkmark next to the profile name, its now also possible to add the logo of the organization the account is affiliated with. What the logo icon next to the name on X means: the account is affiliated with a company However, for some reason, profiles of government organizations (the ones with gray checkmarks) cannot add affiliated accounts. So, for example, the account of the head of Microsoft is affiliated with the account of the company itself. But the account of the UN Secretary-General is unfortunately in no way connected with the account of the UN itself. For some reason, government organizations are not allowed affiliate accounts How to protect yourself from scammers on X Unfortunately, the new system of multi-colored paid checkmarks on X is quite confusing. Lets take the example of Microsoft to illustrate. There are various Microsoft departments and projects with X accounts marked with gold checkmarks, but none of them are affiliated with the main company account. Among the affiliated profiles are top Microsoft executives, but you wont find @Windows or @Microsoft365 there. The list of accounts affiliated with the Microsoft X account only includes the companys top executives The genuine Microsoft tech-support X account — @MicrosoftHelps — is not affiliated with the main @Microsoft account or any of the others. Whats more, this X account (of one of the worlds largest technology companies) has no checkmark at all — not even a blue one! The genuine support account @MicrosoftHelps has no checkmarks and is not affiliated with any other account of the company Because of this confusion, its difficult to give clear advice on how to verify the authenticity of X accounts. Therefore, here are a few general considerations: Accounts with blue checkmarks should not be trusted. Anyone can buy this badge now, and the verification process seems to be quite superficial. Profiles with gold or gray checkmarks are more reliable on paper — obtaining these badges is definitely more expensive, and the verification is probably more thorough. But the chaos on the platform gives plenty of reasons to doubt their reliability. Perhaps the most useful indicator of a profiles authenticity is the creation date — this cannot be bought (at least, yet). If a profile was created a long time ago, theres some reason to trust it (although its important to remember that a profile can always be renamed). Recently created official accounts, on the other hand, are very suspicious even with colored checkmarks. In any case, you shouldnt give financial information to anyone on X, employees of some company or not; whoever requested it is highly likely a scammer, and its best to shut down all communication with them.

image for Transatlantic Cable  ...

 News

The latest episode of the Transatlantic Cable kicks off with news that Sony have are the latest victim in the MoveIT vulnerability campaign. From there, the team discuss how NATO, the military alliance, was recently hit by a databreach. To wrap up, the team discuss the data leak at 23andMe, the DNA sequencing company,   show more ...

as well as how Fortnite is being leveraged by oil businesses. If you like what you heard, please consider subscribing. Sony Confirms Second Data Breach in Months Hackers advertise sale of 23andMe data on leaked data forum Gay furry hackers brag of second NATO break-in Fortnite Influencers Push Shells Propaganda on Kids

image for What does it cost sm ...

 Business

In this Expert Insight, Derek Kernus, the Director of Cybersecurity Operations at DTS talks about the challenges facing small businesses that are under pressure to adopt cybersecurity best practices without breaking their budget. Derek offers suggestions for prioritizing cybersecurity investments - and things to watch   show more ...

out for as you build out an...Read the whole entry... » Related StoriesAttacks on APIs demand a Security Re-ThinkThe surveys speak: supply chain threats are freaking people outIs a DEF CON Village the right way to assess AI risk?

 Trends, Reports, Analysis

According to a Splunk report, nearly half (47%) of global CISOs now report to their CEO, and the vast majority (78%) are backed by a board-level cybersecurity committee, signaling the growing influence of cyber risk management in organizations.

 Trends, Reports, Analysis

ReadyToRun (R2R) stomping is a new method that allows for hidden implanted code in .NET binaries, altering the original intermediate language (IL) code and prioritizing pre-compiled native code for execution.

 Trends, Reports, Analysis

According to a survey by Splunk, 9 out of 10 CISOs reported experiencing a major cyberattack in the past year, with almost half stating that their organizations were hit by multiple disruptive cyberattacks.

 Breaches and Incidents

Amid the Israeli-Palestinian conflict, cybercriminals from both sides have turned to cyberattacks in the form of distributed DDoS and also targeting bugs in ICS and SCADA systems. Several Israeli and Palestine organizations have left their Modbus, a SCADA communications protocol, exposed. To mitigate these   show more ...

threats, entities should bolster their security measures, focusing on patching exposed SCADA systems and ensuring stringent access controls for critical communication protocols.

 Govt., Critical Infrastructure

The three-day operation took place in the Dutch municipality of Apeldoorn, with officers from all 22 EU member states and four “third countries” taking part, alongside representatives from Interpol, the European Labour Authority, and others.

 Feed

Debian Linux Security Advisory 5525-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix, which might result in denial of service, information disclosure or privilege escalation.

 Feed

Debian Linux Security Advisory 5524-1 - Kevin Backhouse discovered an out-of-bounds array access in Libcue, a library for parsing CD metadata, which could result in the execution of arbitrary code.

 Feed

Ubuntu Security Notice 6425-2 - USN-6425-1 fixed vulnerabilities in Samba. Due to a build issue on Ubuntu 20.04 LTS, the update introduced regressions in macro handling and possibly other functionality. This update fixes the problem. Sri Nagasubramanian discovered that the Samba acl_xattr VFS module incorrectly   show more ...

handled read-only files. When Samba is configured to ignore system ACLs, a remote attacker could possibly use this issue to truncate read-only files. Andrew Bartlett discovered that Samba incorrectly handled the DirSync control. A remote attacker with an RODC DC account could possibly use this issue to obtain all domain secrets. Andrew Bartlett discovered that Samba incorrectly handled the rpcecho development server. A remote attacker could possibly use this issue to cause Samba to stop responding, resulting in a denial of service. Kirin van der Veer discovered that Samba incorrectly handled certain RPC service listeners. A remote attacker could possibly use this issue to cause Samba to start multiple incompatible RPC listeners, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.

 Feed

Ubuntu Security Notice 6429-2 - USN-6429-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that curl incorrectly handled cookies when an application duplicated certain handles. A local attacker could possibly create a cookie file and inject arbitrary cookies into subsequent connections.

 Feed

High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that's designed to deploy basic backdoors and loaders for delivering next-stage malware. Cybersecurity company Check Point is tracking the activity under the name Stayin' Alive. Targets include organizations located in Vietnam, Uzbekistan, Pakistan, and Kazakhstan. "The simplistic

 Feed

Patches have been released for two security flaws impacting the Curl data transfer library, the most severe of which could potentially result in code execution. The list of vulnerabilities is as follows - CVE-2023-38545 (CVSS score: 7.5) - SOCKS5 heap-based buffer overflow vulnerability CVE-2023-38546 (CVSS score: 5.0) - Cookie injection with none file CVE-2023-38545 is the more severe of the

 Feed

Cybersecurity researchers have shed light on a new sophisticated strain of malware that masquerades a WordPress plugin to stealthily create administrator accounts and remotely control a compromised site. "Complete with a professional looking opening comment implying it is a caching plugin, this rogue code contains numerous functions, adds filters to prevent itself from being included in the list

 Feed

A malicious package hosted on the NuGet package manager for the .NET Framework has been found to deliver a remote access trojan called SeroXen RAT. The package, named Pathoschild.Stardew.Mod.Build.Config and published by a user named Disti, is a typosquat of a legitimate package called Pathoschild.Stardew.ModBuildConfig, software supply chain security firm Phylum said in a report today. While

 Feed

The threat actors behind ShellBot are leveraging IP addresses transformed into its hexadecimal notation to infiltrate poorly managed Linux SSH servers and deploy the DDoS malware. "The overall flow remains the same, but the download URL used by the threat actor to install ShellBot has changed from a regular IP address to a hexadecimal value," the AhnLab Security Emergency response Center (ASEC)

 Feed

ChatGPT has transformed the way businesses generate textual content, which can potentially result in a quantum leap in productivity. However, Generative AI innovation also introduces a new dimension of data exposure risk, when employees inadvertently type or paste sensitive business data into ChatGPT, or similar applications. DLP solutions, the go-to solution for similar challenges, are

 Feed

Microsoft on Wednesday said that a user containment feature in Microsoft Defender for Endpoint helped thwart a "large-scale remote encryption attempt" made by Akira ransomware actors targeting an unknown industrial organization in early June 2023. The tech giant's threat intelligence team is tracking the operator as Storm-1567. The attack leveraged devices that were not onboarded to Microsoft

2023-10
Aggregator history
Thursday, October 12
SUN
MON
TUE
WED
THU
FRI
SAT
OctoberNovemberDecember