FreshRSS

πŸ”’
☐ β˜† βœ‡ The first stop for security news | Threatpost

Unpatched DNS Bug Puts Millions of Routers, IoT Devices at Risk

By Elizabeth Montalbano β€” May 4th 2022 at 10:27
A flaw in all versions of the popular C standard libraries uClibc and uClibc-ng can allow for DNS poisoning attacks against target devices.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Attackers Use Event Logs to Hide Fileless Malware

By Nate Nelson β€” May 4th 2022 at 13:24
A sophisticated campaign utilizes a novel anti-detection method.
☐ β˜† βœ‡ The first stop for security news | Threatpost

China-linked APT Caught Pilfering Treasure Trove of IP

By Nate Nelson β€” May 4th 2022 at 17:32
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data.
☐ β˜† βœ‡ The first stop for security news | Threatpost

VHD Ransomware Linked to North Korea’s Lazarus Group

By Elizabeth Montalbano β€” May 5th 2022 at 12:20
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said.
☐ β˜† βœ‡ The first stop for security news | Threatpost

F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems

By Sagar Tiwari β€” May 5th 2022 at 12:48
The vulnerability is 'critical'Β with a CVSS severity rating of 9.8 out of 10.
☐ β˜† βœ‡ The first stop for security news | Threatpost

CANs Reinvent LANs for an All-Local World

By David Canellos β€” May 5th 2022 at 13:00
A close look at a new type of network, known as a Cloud Area Network.
☐ β˜† βœ‡ The first stop for security news | Threatpost

USB-based Wormable Malware Targets Windows Installer

By Elizabeth Montalbano β€” May 6th 2022 at 11:10
Activity dubbed β€˜Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Podcast: The State of the Secret Sprawl

By Jeffrey Esposito β€” May 9th 2022 at 10:43
In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, as well as ways that developers can keep their code safe.
☐ β˜† βœ‡ The first stop for security news | Threatpost

FBI: Rise in Business Email-based Attacks is a $43B Headache

By Sagar Tiwari β€” May 9th 2022 at 17:23
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Low-rent RAT Worries Researchers

By Nate Nelson β€” May 10th 2022 at 00:24
Researchers say a hacker is selling access to quality malware for chump change.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Conti Ransomware Attack Spurs State of Emergency in Costa Rica

By Elizabeth Montalbano β€” May 10th 2022 at 11:54
The threat group has leaked data that it claims was stolen in the breach and is promising more government-targeted attacks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Hackers Actively Exploit F5 BIG-IP Bug

By Threatpost β€” May 10th 2022 at 12:35
The bug has a severe rating of 9.8, public exploits are released.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Ransomware Deals Deathblow to 157-year-old College

By Nate Nelson β€” May 11th 2022 at 11:02
Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Actively Exploited Zero-Day Bug Patched by Microsoft

By Elizabeth Montalbano β€” May 11th 2022 at 11:12
Microsoft's May Patch Tuesday roundup also included critical fixes for a number of flaws found in infrastructure present in many enterprise and cloud environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Novel Phishing Trick Uses Weird Links to Bypass Spam Filters

By Nate Nelson β€” May 11th 2022 at 12:13
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Intel Memory Bug Poses Risk for Hundreds of Products

By Sagar Tiwari β€” May 11th 2022 at 12:27
Dell and HP were among the first to release patches and fixes for the bug.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Novel β€˜Nerbian’ Trojan Uses Advanced Anti-Detection Tricks

By Elizabeth Montalbano β€” May 12th 2022 at 10:45
The stealthy, feature-rich malware has multistage evasion tactics to fly under the radar of security analysis, researchers at Proofpoint have found.
☐ β˜† βœ‡ The first stop for security news | Threatpost

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro β€” May 12th 2022 at 11:57
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Malware Builder Leverages Discord Webhooks

By Nate Nelson β€” May 12th 2022 at 13:01
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Threat Actors Use Telegram to Spread β€˜Eternity’ Malware-as-a-Service

By Elizabeth Montalbano β€” May 13th 2022 at 12:06
An account promoting the projectβ€”which offers a range of threat activity from info-stealing to crypto-mining to ransomware as individual modulesβ€”has more than 500 subscribers.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors

By Sagar Tiwari β€” May 16th 2022 at 11:46
Microsoft's May Patch Tuesday update is triggering authentication errors.
☐ β˜† βœ‡ The first stop for security news | Threatpost

iPhones Vulnerable to Attack Even When Turned Off

By Elizabeth Montalbano β€” May 17th 2022 at 13:19
Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Sysrv-K Botnet Targets Windows, Linux

By Sagar Tiwari β€” May 17th 2022 at 13:53
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.
☐ β˜† βœ‡ The first stop for security news | Threatpost

April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

By Sagar Tiwari β€” May 18th 2022 at 13:54
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
☐ β˜† βœ‡ The first stop for security news | Threatpost

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

By Elizabeth Montalbano β€” May 18th 2022 at 14:01
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.
☐ β˜† βœ‡ The first stop for security news | Threatpost

DOJ Says Doctor is Malware Mastermind

By Nate Nelson β€” May 18th 2022 at 14:36
The U.S. Department of Justice indicts middle-aged doctor, accusing him of being a malware mastermind.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

By Elizabeth Montalbano β€” May 19th 2022 at 13:03
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
☐ β˜† βœ‡ The first stop for security news | Threatpost

380K Kubernetes API Servers Exposed to Public Internet

By Elizabeth Montalbano β€” May 20th 2022 at 11:11
More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Closing the Gap Between Application Security and Observability

By Threatpost β€” May 20th 2022 at 12:42
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.β€―
☐ β˜† βœ‡ The first stop for security news | Threatpost

Snake Keylogger Spreads Through Malicious PDFs

By Elizabeth Montalbano β€” May 23rd 2022 at 12:07
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

By Threatpost β€” May 23rd 2022 at 12:47
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Fronton IOT Botnet Packs Disinformation Punch

By Sagar Tiwari β€” May 24th 2022 at 13:59
Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Verizon Report: Ransomware, Human Error Among Top Security Risks

By Elizabeth Montalbano β€” May 25th 2022 at 12:45
2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Zoom Patches β€˜Zero-Click’ RCE Bug

By Sagar Tiwari β€” May 25th 2022 at 13:02
The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Link Found Connecting Chaos, Onyx and Yashma Ransomware

By Nate Nelson β€” May 25th 2022 at 13:18
A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cybergang Claims REvil is Back, Executes DDoS Attacks

By Elizabeth Montalbano β€” May 26th 2022 at 10:30
Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Critical Flaws in Popular ICS Platform Can Trigger RCE

By Elizabeth Montalbano β€” May 27th 2022 at 10:32
Cisco Talos discovered eight vulnerabilities in the Open Automation Software, two of them critical, that pose risk for critical infrastructure networks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Zero-Day β€˜Follina’ Bug Lays Microsoft Office Open to Attack

By Sagar Tiwari β€” May 30th 2022 at 14:53
Malware loads itself from remote servers and bypasses Microsoft's Defender AV scanner, according to reports.
☐ β˜† βœ‡ The first stop for security news | Threatpost

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

By Elizabeth Montalbano β€” May 31st 2022 at 11:38
The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn.
☐ β˜† βœ‡ The first stop for security news | Threatpost

EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

By Sagar Tiwari β€” May 31st 2022 at 12:24
Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Microsoft Releases Workaround for β€˜One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano β€” June 1st 2022 at 10:38
Threat actors already are exploiting vulnerability, dubbed β€˜Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Being Prepared for Adversarial Attacks – Podcast

By Jeffrey Esposito β€” June 2nd 2022 at 10:20
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s […]
☐ β˜† βœ‡ The first stop for security news | Threatpost

International Authorities Take Down Flubot Malware Network

By Elizabeth Montalbano β€” June 2nd 2022 at 11:18
The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Scammers Target NFT Discord Channel

By Sagar Tiwari β€” June 2nd 2022 at 11:44
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cybercriminals Expand Attack Radius and Ransomware Pain Points

By Threatpost β€” June 2nd 2022 at 13:08
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Evil Corp Pivots LockBit to Dodge U.S. Sanctions

By Elizabeth Montalbano β€” June 3rd 2022 at 12:42
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again

By Nate Nelson β€” June 3rd 2022 at 13:46
Deja-Vu data from this year's DBIR report feels like we are stuck in the movie 'Groundhog Day.'
☐ β˜† βœ‡ The first stop for security news | Threatpost

Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw

By Elizabeth Montalbano β€” June 7th 2022 at 11:21
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Follina Exploited by State-Sponsored Hackers

By Nate Nelson β€” June 7th 2022 at 12:45
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Conducting Modern Insider Risk Investigations

By Sponsored Content β€” June 7th 2022 at 12:45
Insider Risk Management requires a different approach than to those from external threats. IRM is unique from other domains of security in that the data sources which serve as inputs are as often people as they are tools. Shifting the analystβ€˜s mindset when handling risks presented by insiders requires us to move through the stages of inquiry, investigation, and determining outcomes.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cyber Risk Retainers: Not Another Insurance Policy

By Matt Dunn β€” June 7th 2022 at 13:25
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Black Basta Ransomware Teams Up with Malware Stalwart Qbot

By Elizabeth Montalbano β€” June 8th 2022 at 11:17
The novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Paying Ransomware Paints Bigger Bullseye on Target’s Back

By Nate Nelson β€” June 8th 2022 at 13:05
Ransomware attackers often strike targets twice, regardless of whether the ransom was paid.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Taming the Digital Asset Tsunami

By Rob N. Gurzeev β€” June 8th 2022 at 13:36
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Feds Forced Travel Firms to Share Surveillance Data on Hacker

By Elizabeth Montalbano β€” June 9th 2022 at 17:44
Sabre and Travelport had to report the weekly activities of former β€œCardplanet” cybercriminal Aleksei Burkov for two years, info that eventually led to his arrest and prosecution.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Potent Emotet Variant Spreads Via Stolen Email Credentials

By Elizabeth Montalbano β€” June 10th 2022 at 11:02
The dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing campaigns.
☐ β˜† βœ‡ The first stop for security news | Threatpost

U.S. Water Utilities Prime Cyberattack Target, Experts

By Nate Nelson β€” June 10th 2022 at 13:27
Environmentalists and policymakers warn water treatment plants are ripe for attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

By Sagar Tiwari β€” June 13th 2022 at 12:36
Researchers demonstrated a possible way to track individuals via Bluetooth signals.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Linux Malware Deemed β€˜Nearly Impossible’ to Detect

By Elizabeth Montalbano β€” June 14th 2022 at 10:55
Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

By Elizabeth Montalbano β€” June 14th 2022 at 11:08
Attackers gained access to private account details through an email compromise incident that occurred in April.
❌