FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayThe Register - Security

It costs just $7 to rent DCRat to backdoor your network

Budget-friendly tool breaks the you-get-what-you-pay-for rule

A budget-friendly remote access trojan (RAT) that's under active development is selling on underground Russian forums for about $7 for a two-month subscription, according to BlackBerry researchers today. …

  • May 9th 2022 at 19:29

Biden signs cybercrime tracking bill into law

All part of a larger push by the Feds to improve cybersecurity reporting

US President Joe Biden has signed into law a bill that aims to improve how the federal government tracks and prosecutes cybercrime.…

  • May 9th 2022 at 22:09

Industry pushes back against India's data security breach reporting requirements

Filling in a form at 4am improves infosec or privacy how, exactly?

Opposition is building to India's recently introduced rules on reporting computer security breaches, which have come under fire for being impractical, ineffective, and impinging on privacy.…

  • May 10th 2022 at 02:47

Malware goes regional as attackers change tactics

SEO techniques employed to increase visibility of poisoned documents claims Netskope

Most malware attacks now originate from the same region as the victim, according to a new report, a sign that malicious actors are changing their tactics.…

  • May 10th 2022 at 14:30

US, Europe formally blame Russia for data wiper attacks against Ukraine, Viasat

Thank goodness someone cleared that one up

The US and the European Union have officially blamed Russia for a series of destructive data-wiping malware infections in Ukrainian government and private-sector networks – and said they will "take steps" to defend against and respond to Kremlin-orchestrated attacks.…

  • May 10th 2022 at 20:58

Email domain for NPM lib with 6m downloads a week grabbed by expert to make a point

Campaign to coax GitHub-owned outfit to improve security starts showing results

Special report Security consultant Lance Vick recently acquired the expired domain used by the maintainer of a widely used NPM package to remind the JavaScript community that the NPM Registry still hasn't implemented adequate security.…

  • May 10th 2022 at 22:36

Microsoft closes Windows LSA hole under active attack

Plus many more flaws. And Adobe, Android, SAP join the bug-squashing frenzy

Microsoft patched 74 security flaws in its May Patch Tuesday batch of updates. That's seven critical bugs, 66 deemed important, and one ranked low severity.…

  • May 11th 2022 at 01:15

Yahoo Japan strives for universal passwordless authentication

30! million! users! already! moved! to! TXT! and/or! FIDO! Attacks! and! support! requests! both! down!

Yahoo Japan has revealed that it plans to go passwordless, and that 30 million of its 50 million monthly active users have already stopped using passwords in favor of a combination of FIDO and TXT messages.…

  • May 11th 2022 at 08:19

Fresh ransomware samples indicate REvil is back

Secureworks' investigation only the latest evidence Kaseya and JBS attackers are on the move again

New ransomware samples analyzed by Secureworks' threat intelligence team are the latest indication that high-profile ransomware operation REvil is once again up and running after months of relative inactivity.…

  • May 11th 2022 at 14:30

Five Eyes turn spotlight on MSPs: Potential weak links in IT supply-chain security

We can think of one thing the S stands for in some unfortunate cases

Miscreants are targeting managed service providers (MSPs) to break into their customers' networks and deploy ransomware, steal data, and spy on them, the Five Eyes nations' cybersecurity authorities have formally warned in a joint security alert.…

  • May 11th 2022 at 21:44

Ukraine war a sorting hat for cyber-governance loyalties: Black Hat founder Jeff Moss

Private orgs that flex with Russian bans may do more harm – to themselves – than good

Black Hat Asia The war in Ukraine, and the Declaration for the Future of the Internet signed by 60 nations in late April, should be understood in the context of a global effort to recruit the nations of the world into blocs with different attitudes to internet governance.…

  • May 12th 2022 at 04:59

Europe proposes tackling child abuse by killing privacy, strong encryption

If we're gonna go through this again, can we just literally go back in time?

Proposed European regulations that purport to curb child abuse by imposing mass surveillance would be a "disaster" for digital privacy and strong encryption, say cybersecurity experts.…

  • May 12th 2022 at 06:35

It's time to kick China off social media, says tech governance expert

'Mischief abroad' is the Middle Kingdom's goal – without the possibility of using Chinese sites to fight back

Black Hat Asia The time has come to remove Chinese voices from global social media, according to Samir Saran, president of Delhi-based think tank Observer Research Foundation (ORF), a commissioner of The Global Commission on the Stability of Cyberspace, and a member of Microsoft's Digital Peace Now Initiative.…

  • May 12th 2022 at 06:57

APT gang 'Sidewinder' goes on two-year attack spree across Asia

Launches almost 1,000 raids, plenty with upgraded malware

Black Hat Asia The advanced persistent threat gang known as SideWinder has gone on an attack spree in the last two years, conducting almost 1,000 raids and deploying increasingly sophisticated attack methods.…

  • May 12th 2022 at 08:04

Ransomware the final nail in coffin for small university

Lincoln College shuttering after 157 years, ransomware attack from Iran final straw

A December attack against a long-standing US college has pushed the institution to permanently close. …

  • May 12th 2022 at 14:10

If you've got Intel inside, you probably need to get these security patches inside, too

So. Many. BIOS. Bugs

Intel has disclosed high-severity bugs in its firmware that's used in datacenter servers, workstations, mobile devices, storage products, and other gear. These flaws can be exploited to escalate privileges, leak information, or stop things from working.…

  • May 12th 2022 at 21:06

Anatomy of a campaign to inject JavaScript into compromised WordPress sites

Reverse-engineered code redirects visitors to dodgy corners of the internet

A years-long campaign by miscreants to insert malicious JavaScript into vulnerable WordPress sites, so that visitors are redirected to scam websites, has been documented by reverse-engineers.…

  • May 13th 2022 at 04:09

To predict the targets of Chinese malware, look at the target of Chinese laws

Around the time Beijing banned online gambling, RATs started targeting operators, say Taiwanese researchers

Black Hat Asia Keep an eye on new Chinese government policies, if you want to anticipate malware attacks, a threat intelligence analyst suggested at the Black Hat Asia conference on Thursday.…

  • May 13th 2022 at 04:57

Researchers find 134 flaws in the way Word, PDFs, handle scripts

β€˜Cooperative mutation’ spots problems that checking code alone will miss

Black Hat Asia Security researchers have devised a tool that detects flaws in the way apps like Microsoft Word and Adobe Acrobat process JavaScript, and it's proven so effective they've found 134 bugs – 59 of them considered worthy of a fix by vendors, 33 assigned a CVE number, and 17 producing bug bounty payments totaling $22,000.…

  • May 13th 2022 at 07:54

Iran-linked Cobalt Mirage extracts money, info from US orgs – report

Khamenei, can you just not? Not right now, fam

The Iran-linked Cobalt Mirage crew is running attacks against America for both financial gain and for cyber-espionage purposes, according to Secureworks' threat intelligence team.…

  • May 13th 2022 at 12:11

'Peacetime in cyberspace is a chaotic environment' says senior US advisor

The internet is now the first battleground of any new war – before the shooting starts

Black Hat Asia Cyber war has become an emerged aspect of broader armed conflicts, commencing before the first shot is fired, cybersecurity expert Kenneth Geers told the audience at the Black Hat Asia conference on Friday.…

  • May 13th 2022 at 13:24

Most organizations hit by ransomware would pay up if hit again

Nine out of ten organizations would do it all over again, keeping attackers in business

Almost nine in 10 organizations that have suffered a ransomware attack would choose to pay the ransom if hit again, according to a new report, compared with two-thirds of those that have not experienced an attack.…

  • May 13th 2022 at 14:11

Software patching must work like car safety recalls, says US cyber boss

Adds infosec regulation coming to more industries but with a light touch, more collaboration

Black Hat Asia Software made unsafe by dependencies should be fixed without users needing to interact with the source of the problem, according to US National Cyber Director Chris Inglis, who serves in the Executive Office of the President.…

  • May 13th 2022 at 16:00

Another ex-eBay exec admits cyberstalking web souk critics

David Harville is seventh to cop to harassment campaign

David Harville, eBay's former director of global resiliency, pleaded guilty this week to five felony counts of participating in a plan to harass and intimidate journalists who were critical of the online auction business.…

  • May 13th 2022 at 20:04

Ukrainian crook jailed in US for selling thousands of stolen login credentials

Touting info on 6,700 compromised systems will get you four years behind bars

A Ukrainian man has been sentenced to four years in a US federal prison for selling on a dark-web marketplace stolen login credentials for more than 6,700 compromised servers.…

  • May 13th 2022 at 22:16

Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner...

We take a look at low, low subscription prices – not that we want to give anyone any ideas

A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.…

  • May 14th 2022 at 00:16

San Francisco police use driverless cars for surveillance

Plus: Tech giants commit $30m to open-source security, miscreants breach DEA portal, and US signs cybercrime treaty

In brief San Francisco police have been using driverless cars for surveillance to assist in law enforcement investigations.…

  • May 16th 2022 at 10:36

Hackers are after your data. So why are you making it so easy for them?

Here’s how to tailor a security suite that suits you

Webinar Some cyberattackers are out to cause mayhem, but the pros are really after one thing. Your data, whether that’s through exfiltration or encryption.…

  • May 16th 2022 at 17:15

US brings first-of-its-kind criminal charges of Bitcoin-based sanctions-busting

Citizen allegedly moved $10m-plus in BTC into banned nation

US prosecutors have accused an American citizen of illegally funneling more than $10 million in Bitcoin into an economically sanctioned country.…

  • May 16th 2022 at 22:45

China reveals its top five sources of online fraud

'Brushing' tops the list, as quantity of forbidden content continue to rise

China’s Ministry of Public Security has revealed the five most prevalent types of fraud perpetrated online or by phone.…

  • May 17th 2022 at 03:31

Venezuelan cardiologist charged with 'designing and selling ransomware'

If his surgery was as bad as his opsec, this chap has caused a lot of trouble, allegedly

The US Attorney’s Office has charged a 55-year-old cardiologist with creating and selling ransomware and profiting from revenue-share agreements with criminals who deployed his product.…

  • May 17th 2022 at 05:15

Europe moves closer to stricter cybersecurity standards, reporting regs

More types of biz fall under expanded rules – and fines for those who fall short

Europe has moved closer toward new cybersecurity standards and reporting rules following a provisional network and information systems agreement dubbed NIS2 by the European Council and Parliament. …

  • May 17th 2022 at 07:26

Facebook rated least safe e-commerce option in government rankings

Singapore's safety scheme measures scam-combatting capability

A newly implemented e-commerce rating system in the city-state of Singapore has rated Facebook's Marketplace as the least trustworthy e-commerce platform, behind Amazon and its Alibaba-owned Asian analogue Lazada.…

  • May 17th 2022 at 07:55

Google assuring open-source code to secure software supply chains

Java and Python packages are the first on the list

Google has a plan β€” and a new product plus a partnership with developer-focused security shop Snyk β€” that attempts to make it easier for enterprises to secure their open source software dependencies.…

  • May 17th 2022 at 16:00

Pentester pops open Tesla Model 3 using low-cost Bluetooth module

Anything that uses proximity-based BLE is vulnerable, claim researchers

Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.…

  • May 17th 2022 at 16:30

FBI warns of North Korean cyberspies posing as foreign IT workers

Looking for tech talent? Kim Jong-un's friendly freelancers, at your service

Pay close attention to that resume before offering that work contract.…

  • May 17th 2022 at 22:58

Monero-mining botnet targets Windows, Linux web servers

Sysrv-K malware infects unpatched tin, Microsoft warns

The latest variant of the Sysrv botnet malware is menacing Windows and Linux systems with an expanded list of vulnerabilities to exploit, according to Microsoft.…

  • May 18th 2022 at 07:27

State of internet crime in Q1 2022: Bot traffic on the rise, and more

According to this cybersecurity outfit that wants your business, anyway

The fraud industry, in some respects, grew in the first quarter of the year, with crooks putting more human resources into some attacks while increasingly relying on bots to carry out things like credential stuffing and fake account creation.…

  • May 18th 2022 at 09:00

Microsoft warns partners to revoke unused authorizations that drive your software

June debut of zero trust GDAP tool should make it harder for crims to attack through MSPs and resellers

Microsoft has advised its reseller community it needs to pay attention to the debut of improved security tooling aimed at making it harder for attackers to worm their way into your systems through partners.…

  • May 18th 2022 at 09:45

Your data's auctioned off up to 987 times a day, NGO reports

Irish Council on Civil Liberties said this is first time the scope of real-time bidding is being measured

The average American has their personal information shared in an online ad bidding war 747 times a day. For the average EU citizen, that number is 376 times a day. In one year, 178 trillion instances of the same bidding war happen online in the US and EU.…

  • May 18th 2022 at 13:35

How these crooks backdoor online shops and siphon victims' credit card info

FBI and co blow lid off latest PHP tampering scam

The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.…

  • May 18th 2022 at 18:47

Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware

Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.…

  • May 18th 2022 at 21:01

Patch your VMware gear now – or yank it out, Uncle Sam tells federal agencies

Critical authentication bypass revealed, older flaws under active attack

Uncle Sam's Cybersecurity and Infrastructure Security Agency (CISA) has issued two warnings in a single day to VMware users, as it believes the virtualization giant's products can be exploited by miscreants to gain control of systems.…

  • May 19th 2022 at 00:41

Your snoozing iOS 15 iPhone may actually be sleeping with one antenna open

No, you're not really gonna be hacked. But you may be surprised

Some research into the potentially exploitable low-power state of iPhones has sparked headlines this week.…

  • May 19th 2022 at 06:02

The cyber threat isn’t going anywhere, but the fight back starts in London

CyberThreat 22 returns this September

Sponsored Post It might feel like you’re facing down the cyber bad guys all on your own sometimes but be assured that’s not the case. In fact, if you head to CyberThreat 22 this Autumn you can draw on the expertise of some of the world’s most experienced practitioners.…

  • May 19th 2022 at 07:15

Hot glare of the spotlight doesn’t slow BlackByte ransomware gang

Crew's raids continue worldwide, Talos team warns

The US government's alert three months ago warning businesses and government agencies about the threat of BlackByte has apparently done little to slow down the ransomware group's activities.…

  • May 19th 2022 at 09:56

Iran, China-linked gangs join Putin's disinformation war online

They're using the invasion 'to take aim at the usual adversaries,' Mandiant told The Reg

Pro-Beijing and Iran miscreants are using the war in Ukraine to spread disinformation that supports these countries' political interests β€” namely, advancing anti-Western narratives – according to threat-intel experts at Mandiant.…

  • May 19th 2022 at 14:00

US recovers a record $15m from the 3ve ad-fraud crew

Swiss banks cough up around half of the proceeds of crime

The US government has recovered over $15 million in proceeds from the 3ve digital advertising fraud operation that cost businesses more than $29 million for ads that were never viewed.…

  • May 19th 2022 at 20:30

US won’t prosecute β€˜good faith’ security researchers under CFAA

Well, that clears things up? Maybe not

The US Justice Department has directed prosecutors not to charge "good-faith security researchers" with violating the Computer Fraud and Abuse Act (CFAA) if their reasons for hacking are ethical β€”Β things like bug hunting, responsible vulnerability disclosure, or above-board penetration testing.…

  • May 20th 2022 at 00:07

India slightly softens infosec incident reporting and data retention rules

But also makes it plain that offshore entities must comply

India has slightly softened its controversial new reporting requirements for information security incidents and made it plain they apply to multinational companies.…

  • May 20th 2022 at 04:30

Canada bans Huawei and ZTE from 5G networks, citing national security risks

Ban on shopping from September, rip and replace order with 2024 deadline

The Canadian government has joined many of its allies and banned the use of Huawei and ZTE tech in its 5G networks, as part of a new telecommunications security framework.…

  • May 20th 2022 at 05:30

Protecting data now as the quantum era approaches

Startup QuSecure is the latest vendor to jump into the field with its as-a-service offering

Analysis Startup QuSecure will this week introduce a service aimed at addressing how to safeguard cybersecurity once quantum computing renders current public key encryption technologies vulnerable.…

  • May 20th 2022 at 07:30

Microsoft Bing censors politically sensitive Chinese terms

Research claims it fails to autofill certain names in Han characters, Microsoft says it's technical error

Updated Microsoft search engine Bing censors terms deemed sensitive in China from its autosuggestion feature internationally, according to research from Citizen Lab.…

  • May 20th 2022 at 10:37

Microsoft patches the patch that broke Windows authentication

May 10 update addressed serious vulns but also had problems of its own

Microsoft has released an out-of-band patch to deal with an authentication issue that was introduced in the May 10 Windows update.…

  • May 20th 2022 at 13:00

China-linked Twisted Panda caught spying on Russian defense R&D

Because Beijing isn't above covert ops to accomplish its five-year goals

Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.…

  • May 20th 2022 at 20:03

Conti: Russian-backed rulers of Costa Rican hacktocracy?

Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. …

  • May 21st 2022 at 11:01

South Korean and US presidents gang up on North Korea's cyber-offensives

Less than two weeks into his new gig, Yoon cozies up to Biden as China and DPRK loom

US president Biden and South Korea's new president Yoon Suk Yeol have pledged further co-operation in many technologies, including joint efforts to combat North Korea.…

  • May 23rd 2022 at 05:25

Microsoft sounds the alarm on – wait for it – a Linux botnet

Redmond claims the numbers are scary, but won't release them

Microsoft has sounded the alarm on DDoS malware called XorDdos that targets Linux endpoints and servers.…

  • May 23rd 2022 at 06:57

How to find NPM dependencies vulnerable to account hijacking

Security engineer outlines self-help strategy for keeping software supply chain safe

Following the recent disclosure of a technique for hijacking certain NPM packages, security engineer Danish Tariq has proposed a defensive strategy for those looking to assess whether their web apps include dependencies tied to subvertable email domains.…

  • May 23rd 2022 at 07:58

Screencastify fixes bug that would have let rogue websites spy on webcams

School-friendly Chrome extension still not fully protected, privacy guru warns

Screencastify, a popular Chrome extension for capturing and sharing videos from websites, was recently found to be vulnerable to a cross-site scripting (XSS) flaw that allowed arbitrary websites to dupe people into unknowingly activating their webcams.…

  • May 24th 2022 at 00:17
❌