Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Unraveling the Intri ...

 Dark Web News

A new information stealer has arrived on the dark web markets. Known as the qBit stealer, this information stealer came into the spotlight when the QBit Ransomware-as-a-Service (RaaS) group posted its capabilities and features on its dark web portal.  The ransomware associated with the stealer is capable of obtaining   show more ...

files from its victim systems, hindering detection from the on-board security systems. The qBit stealer was introduced by the ransomware group on October 9, 2023, boasting its unique capabilities and features.  Understanding the QBit Stealer; Features and Capabilities Source: Cyble The Cyble Research and Intelligence Labs (CRIL) found the QBit stealer’s source code being sold for free on dark web channels. The information stealer is claimed to be undetectable by Endpoint Detection and Response solutions (EDRs) and features sophisticated facets to target its victims.  This tool demonstrates its prowess by swiftly uploading files to Mega[.]nz, employing an advanced concurrency engine. According to CRIL, the QBit stealer, unlike other information stealers on the markets, selectively targets files with specific extensions, hinting at its potential role as an exfiltration tool in ransomware operations. CRIL’s analysis revealed that qBitStealer’s source code comprises several key files, including compile.bat, config.json, internal.go, qBitStealer.go, functions.go, and megaFunc.go. Additionally, the code employs anti-debugging and anti-virtualization/sandbox techniques, ensuring a higher level of evasion. Details from Leaked Source Code Source: Cyble The leaked source code includes a batch script and a configuration file named “config.json”. This file outlines critical parameters, such as API credentials for Mega[.]nz authentication, file system path, stolen folder name, maximum file size, split size for large files, targeted file extensions, and operation mode (manual or automatic). Source: Cyble Additionally, QBit Stealer adopts a meticulous approach to data exfiltration. It creates an instance of the Mega[.]nz API, targets specified paths for stealing data and converts stolen data into a “.tar.gz” file. The file is then split into smaller chunks for concurrent uploading, demonstrating a sophisticated and efficient exfiltration process. Mitigation Against QBit Stealer The QBit stealer marks yet another threat being promoted on dark web platforms. The Cyber Express previously covered new information stealers with unique capabilities and hindering detections for weeks. This particular information stealers comes packed with features and easy of access even to low-grade hackers and ransomware groups, making it a looming dark web threat. The release of qBitStealer’s source code poses an elevated risk, as it may attract less sophisticated threat actors — inadvertently increasing the number of cyberattacks. Its unique file-targeting feature aligns with evolving tactics in ransomware attacks, making the ransomware group threatening to users across industries.  CRIL recommends strengthening endpoint security with updated EDR solutions, deploying Data Loss Prevention (DLP) solutions to monitor and block unauthorized data transfers, and utilizing reputable antivirus and internet security software on all devices. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

 Features

By Neelesh Kriplani, Chief Technology Officer, Clover Infotech As we move ahead with the latest trends and innovations in the ever-evolving landscape of technology, one topic that demands our attention is the profound impact of the convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) –   show more ...

the AIoT. The AIoT has emerged as a powerful force that promises to transform various industries, and one area where its impact is particularly significant is the security industry. In this article, we will explore five key ways in which AIoT will reshape the security industry in 2024, revolutionizing the way organizations protect their assets, data, and people. AIoT Trends 2024 Unleashing Advanced Threat Detection and Prevention Imagine AIoT-powered security systems gathering and analyzing colossal amounts of data in real-time, proactively identifying threats. The amalgamation of AI and IoT equips intelligent devices with the ability to recognize patterns and anomalies, empowering us to respond swiftly and effectively to potential security breaches. With data from various sensors, cameras, and devices at our disposal, we can detect and mitigate suspicious activities, bolstering our security measures. Predictive and Proactive Security Measures Gone are the days of reactive security measures. The advent of AIoT enables us to predict and proactively address security challenges. By leveraging AI algorithms and machine learning, we can analyze historical data, identify trends, and anticipate potential threats before they manifest. Armed with this knowledge, security teams can stay ahead of the game, minimizing risks and vulnerabilities in real-time. Revolutionizing Surveillance and Monitoring Surveillance and monitoring capabilities are about to transform. Thanks to AIoT, we can bid farewell to manual video analysis and welcome intelligent systems that automate video analytics. These systems can identify specific objects, behaviors, or even individuals of interest with remarkable accuracy. Facial recognition, anomaly detection, and object tracking empower us to enhance our security infrastructure while freeing up the workforce to focus on critical tasks. Reinventing Access Control and Authentication In the era of AIoT, traditional access control and authentication methods are being revolutionized. Facial recognition, voice recognition, and other AI-powered biometric authentication technologies are taking center stage, providing enhanced security and convenience. With AIoT, we can manage access to physical spaces, systems, and sensitive data more reliably and efficiently. The era of secure, seamless, and frictionless access control for authorized personnel is upon us. Safeguarding Data Security and Privacy As the volume of IoT-generated data skyrockets, our concerns around data security and privacy intensify. AIoT can help us to address those concerns with intelligent data protection mechanisms. AI algorithms can identify anomalies, potential data breaches, and safeguard against unauthorized access. By integrating AIoT solutions into our security infrastructure, we can ensure compliance with data protection regulations, earning the trust of our customers while handling their data securely and ethically. Wrap up We foresee a future where the AIoT revolution will become an indispensable aspect of our security landscape. To prepare for this future, CIOs must assess their organization’s security infrastructure critically. They must identify areas where AIoT can be seamlessly integrated and collaborate with trusted technology partners. This will help them to design and implement tailored AIoT security solutions. Embracing AIoT for security purposes will grant us a competitive edge, enabling us to enhance resilience, agility, and responsiveness. Together, we can shape a secure and prosperous future for our organizations. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

 Feed

Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. "These threats are unique in their approach, targeting a wide range of blockchain networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and almost 20 other networks by using a crypto wallet-draining technique," Check Point researchers Oded Vanunu,

 Cyber Security News

Source: krebsonsecurity.com – Author: BrianKrebs KrebsOnSecurity celebrates its 14th year of existence today! I promised myself this post wouldn’t devolve into yet another Cybersecurity Year in Review. Nor do I wish to hold forth about whatever cyber horrors may await us in 2024. But I do want to thank you   show more ...

all for your continued readership, […] La entrada Happy 14th Birthday, KrebsOnSecurity! – Source: krebsonsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Albanian

Source: thehackernews.com – Author: . Dec 29, 2023NewsroomCyber Attack / Web Security The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country’s National Authority for Electronic Certification and Cyber Security (AKCESK) revealed this   show more ...

week. “These infrastructures, under the legislation in force, are not currently classified […] La entrada Albanian Parliament and One Albania Telecom Hit by Cyber Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CERT-UA

Source: thehackernews.com – Author: . Dec 29, 2023NewsroomEmail Security / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28 group to deploy previously undocumented malware such as OCEANMAP, MASEPIE, and   show more ...

STEELHOOK to harvest sensitive information. The activity, which was detected by the agency […] La entrada CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer Source: leonello calvetti via Alamy Stock Photo A previously undocumented hardware feature within Apple’s iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass   show more ...

hardware-based memory protection. The vulnerability plays a central role in the sophisticated advanced persistent threat (APT) “Operation […] La entrada ‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Closes

Source: www.darkreading.com – Author: PRESS RELEASE SANTA CLARA, Calif., Dec. 28, 2023 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced that it has completed the acquisition of Talon Cyber Security, a pioneer of enterprise browser technology. “We   show more ...

are thrilled to welcome Talon to Palo Alto Networks,” said Nikesh Arora, chairman and CEO of Palo […] La entrada Palo Alto Networks Closes Talon Cybersecurity Acquisition – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer Source: cn0ra via Alamy Stock Photo With the aim of fortifying defenses and navigating changing risks, IT security leaders shared their New Year’s resolutions, with a focus on their planned initiatives and strategic objectives to   show more ...

bolster organizational security posture. The New Year’s resolutions discussed by CISOs and […] La entrada I Securely Resolve: CISOs, IT Security Leaders Share 2024 Resolutions – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 banks

Source: www.darkreading.com – Author: Nick Rego, Contributing Writer 3 Min Read Source: Engdao Wichitpunya via Alamy Stock Photo For the United Arab Emirates (UAE), an aggressive push for a more digitized economy attracted plenty of interest and subsequent investment — but also made it a prime candidate for   show more ...

relentless cyberattacks. With nearly 50,000 cyberattacks reportedly […] La entrada UAE Banks on AI to Boost Cybersecurity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Lawrence Abrams It’s been a quiet week, with even threat actors appearing to take some time off for the holidays. We did not see much research released on ransomware this week, with most of the news focusing on new attacks and LockBit affiliates increasingly   show more ...

targeting hospitals. These attacks include ones against […] La entrada The Week in Ransomware – December 29th 2023 – LockBit targets hospitals – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Two not-for-profit hospitals in New York are seeking a court order to retrieve data stolen in an August ransomware attack and now stored on the servers of a Boston cloud storage company. Carthage Area Hospital and Claxton-Hepburn Medical Center (the   show more ...

attack’s victims) have founded the North Star Health Alliance, […] La entrada Hospitals ask courts to force cloud storage firm to return stolen data – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas Multiple information-stealing malware families are abusing an undocumented Google OAuth endpoint named “MultiLogin” to restore expired authentication cookies and log into users’ accounts, even if an account’s password was reset.   show more ...

Session cookies are a special type of browser cookie that contains authentication information, allowing a person to automatically log […] La entrada Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push Epsilon information stealer malware using the Steam update system. As developer Michael Mayhem told BleepingComputer, the compromised   show more ...

package is the prepackaged standalone modified version of the original game and not a […] La entrada Steam game mod breached to push password-stealing malware – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Cristian Neagu Over 1.3 million customers across the U.S. are being alerted by mortgage servicing company LoanCare that a data breach at its parent company, Fidelity National Financial, may have compromised their private information. With 1.2 million loans and $390 billion   show more ...

in balances under management, LoanCare is a major player in […] La entrada Data Breach Impacts LoanCare Customers – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: heimdalsecurity.com – Author: Cristian Neagu Katholische Hospitalvereinigung Ostwestfalen (KHO), a German hospital network, has confirmed that a cyberattack launched by the Lockbit ransomware group is the cause of recent service disruptions at three hospitals in its network. The attack occurred in the   show more ...

early morning of December 24, 2023, and it drastically impacted the systems […] La entrada Lockbit Ransomware Attack Affects Three German Hospitals – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Beware

Source: thehackernews.com – Author: . Dec 30, 2023NewsroomCryptocurrency / Phishing Scam Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. “These threats are unique in their approach, targeting a wide range of blockchain   show more ...

networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and almost 20 other […] La entrada Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: 1 Access Management , Cybercrime , Cybercrime as-a-service Google OAuth2 Vulnerability Being Actively Abused by Attackers, Researchers Warn Chris Riotta (@chrisriotta) • December 29, 2023     Image: Shutterstock Multiple malware-as-a-service info stealers now   show more ...

include the ability to manipulate authentication tokens to give users persistent access to a victim’s Google account, […] La entrada Info-Stealing Malware Now Includes Google Session Hijacking – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Beefing

Source: www.govinfosecurity.com – Author: 1 Business Continuity Management / Disaster Recovery , Critical Infrastructure Security , Cybercrime Steve Zuromski, CIO at Bridgewater State University, on New ‘Cyber Range’ and SOC Marianne Kolbasuk McGee (HealthInfoSec) • December 29, 2023     11   show more ...

Minutes    Steve Zuromski, CIO, Bridgewater State University, Massachusetts (Image: BSU) Educational institutions – […] La entrada How One University Is Beefing Up Cyber Defenses, Programs – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Ukrainian Cyber Defenders Trace Government Agency Hits to Phishing Campaign Mihir Bagwe (MihirBagwe) • December 29, 2023     The Ukrainian capital of Kyiv after Russian shelling on March 29,   show more ...

2022 (Image: Shutterstock) Ukrainian cyber defenders report that fast-acting Russian military […] La entrada Russian Military Intelligence Blamed for Blitzkrieg Hacks – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: 1 Legislation & Litigation , Standards, Regulations & Compliance Media Giant Alleges ‘Billions of Dollars in Statutory and Actual Damages’ Rashmi Ramesh (rashmiramesh_) • December 29, 2023     Image: Shutterstock The New York Times is suing   show more ...

OpenAI and its major backer Microsoft for alleged copyright infringement. See Also: Securing Your […] La entrada OpenAI and Microsoft Face New York Times Copyright Lawsuit – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Patch Management Attackers Have Been Exploiting App Installer to Evade Malware Defenses in Windows Mihir Bagwe (MihirBagwe) • December 29, 2023     Microsoft has deactivated a tool designed to simplify the installation of   show more ...

Windows applications after hacking groups began exploiting it to distribute malware […] La entrada Microsoft Disables Abused Application Installation Protocol – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: SecurityWeek News Noteworthy stories that might have slipped under the radar: Ubisoft investigating alleged hack, NASA releases security guidance, TikTok scares iPhone users.  The post In Other News: Ubisoft Hack, NASA Security Guidance, TikTok Requests iPhone Passcode   show more ...

appeared first on SecurityWeek. Original Post URL: https://www.securityweek.com/in-other-news-ubisoft-hack-nasa-security-guidance-tiktok-requests-iphone-passcode/ Category & Tags: Data Breaches,Malware & […] La entrada In Other News: Ubisoft Hack, NASA Security Guidance, TikTok Requests iPhone Passcode – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Compliance

Source: www.securityweek.com – Author: Ionut Arghire DoD is requesting public opinion on proposed changes to the Cybersecurity Maturity Model Certification program rules. The post Pentagon Wants Feedback on Revised Cybersecurity Maturity Model Certification Program appeared first on SecurityWeek. Original Post   show more ...

URL: https://www.securityweek.com/pentagon-wants-feedback-on-revised-cybersecurity-maturity-model-certification-program/ Category & Tags: Compliance,Government,Pentagon – Compliance,Government,Pentagon La entrada Pentagon Wants Feedback on Revised Cybersecurity Maturity Model Certification Program – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: www.securityweek.com – Author: Ionut Arghire Two flaws in Google Kubernetes Engine could be exploited to escalate privileges and take over the Kubernetes cluster. The post Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover appeared first on SecurityWeek. Original Post URL:   show more ...

https://www.securityweek.com/vulnerabilities-in-google-kubernetes-engine-could-allow-cluster-takeover/ Category & Tags: Cloud Security,Vulnerabilities,GKE,Kubernetes – Cloud Security,Vulnerabilities,GKE,Kubernetes La entrada Vulnerabilities in Google Kubernetes Engine Could Allow Cluster Takeover – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team 2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do so. 1.7 million ransomware attacks are happening every day. It is a kind of   show more ...

malware attack that encodes the […] La entrada The Evolving Landscape of Ransomware Attacks – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation while wary of potential setbacks. This paper zeroes in on the core elements of digital transformation, leveraging case studies   show more ...

to illustrate both the golden opportunities and inherent challenges. The […] La entrada The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Spotify music converter TuneFab puts users at risk Pierluigi Paganini December 30, 2023 TuneFab converter, used to convert copyrighted music from streaming platforms such as Spotify, Amazon’s Audible, or Apple Music, has exposed its users’ private   show more ...

data. Cybernews research showed that the platform has exposed more than 151 million […] La entrada Spotify music converter TuneFab puts users at risk – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Albania

Source: securityaffairs.com – Author: Pierluigi Paganini Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Pierluigi Paganini December 29, 2023 Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania, a government agency reported.   show more ...

Albania’s National Authority for Electronic Certification and Cyber Security (AKCESK) […] La entrada Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked APT28 used new malware in a recent phishing campaign Pierluigi Paganini December 29, 2023 Ukraine’s CERT (CERT-UA) warned of a new phishing campaign by the APT28 group to deploy previously undocumented malware strains. The Computer   show more ...

Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign […] La entrada Russia-linked APT28 used new malware in a recent phishing campaign – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2023-12
Aggregator history
Saturday, December 30
FRI
SAT
SUN
MON
TUE
WED
THU
DecemberJanuaryFebruary