Cyber Attacks, Threats, and Vulnerabilities
Lockdown does not mean vacation: APT groups continue to update and diversify their arsenal (Zawya) The COVID-19 pandemic is actively used as bait for many campaigns, large and small
Interpol warns of 'alarming rate' of cyberattacks amid pandemic (UPI) Interpol said it has observed an "alarming rate" of cyberattacks targeting governments and corporations amid the coronavirus pandemic as employees around the world are forced to work remotely due to COVID-19.
Chinese-speaking hackers increase activity and diversify cyberattack methods (TechRadar) Some nation-states treat Covid crisis as a continuation of the age-old game of tit-for-tat, Cybereason says
NSA Warns Cellphone Location Data Could Pose National-Security Threat (Wall Street Journal) The National Security Agency issued new guidance for military and intelligence-community personnel, warning about the risks of cellphone location tracking through apps, wireless networks and Bluetooth technology.
Iranian hacker group becomes first known APT to weaponize DNS-over-HTTPS (DoH) (ZDNet) Kaspersky says Oilrig (APT34) group has been using DoH to silently exfiltrate data from hacked networks.
Russian hackers stole trade secrets from Liam Fox's email account (teiss) Russian hackers stole confidential U.S.-UK trade documents after breaching the email account of Conservative MP and former trade minister Liam Fox.
Liam Fox targeted by Russian hackers in reminder of “uncomfortable truth” (Verdict) Cybersecurity experts are calling for greater vigilance after it emerged that Russian hackers targeted former trade minister and Conservative MP Liam Fox.
Hacker leaks passwords for 900+ enterprise VPN servers (ZDNet) EXCLUSIVE: The list has been shared on a Russian-speaking hacker forum frequented by multiple ransomware gangs.
Hacker Exposes More than 900 Enterprise VPN Servers (KoDDoS Blog) A hacker leaked the plaintext usernames, passwords, and IP addresses of over 900 Pulse Secure VPN enterprise servers on a darknet forum. Threat intelligence firm, KELA, verified the originality of the list using different sources in the cybersecurity community.
Trend Micro Research Reveals Dangerous Design Flaws and Vulnerabilities in Legacy Programming Languages (PR Newswire) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced new research highlighting design...
NodeJS module downloaded 7M times lets hackers inject code (BleepingComputer) A Node.js module downloaded millions of times has a security flaw that can enable attackers to perform a denial-of-service (DoS) attack on a server or get full-fledged remote shell access.
Facebook plugin bug lets hackers hijack WordPress sites’ chat (BleepingComputer) A high severity bug found in Facebook's official chat plugin for WordPress websites with over 80,000 active installations could allow attackers to intercept messages sent by visitors to the vulnerable sites' owner.
()
Security flaws within remote work access devices uncovered by RiskIQ (Information Age) The Vulnerability Landscape report from RiskIQ shows critical security flaws to be present within 12 widely used remote work access devices
FBI: Networks exposed to attacks due to Windows 7 end of life (BleepingComputer) The U.S. Federal Bureau of Investigation (FBI) has warned private industry partners of increased security risks impacting computer network infrastructure because of devices still running Windows 7 after the operating system reached its end of life on January 14.
Google flags several major zero-day security threats (TechRadar) 11 zero-day vulnerabilities have been discovered so far this year
Google and Amazon most impersonated brands in phishing attacks (TechRepublic) WhatsApp, Facebook, and Microsoft rounded out the top five as the most spoofed brands last quarter, says Check Point Research.
Another allegation that DJI's software has security issues (DroneDJ) First, there were allegations against the Android version of the DJI GO 4 app. Now, similar concerns have been raised about DJI's Android Pilot app.
DJI refutes allegations against Android 'Pilot' app (DroneDJ) DJI has denied claims by a tech firm that its Android "Pilot" app has problems with security. DJI says the app keeps user data secure & the report is false
New 'Meow' Cyber Attack That Wipes Unsecured Databases Is a Malicious Throwback (CPO Magazine) 'Meow' cyber attack seeks out unsecured databases and simply wipes them out without seeking either fame or material gain, as a form of activism or perhaps just for fun.
Robots Running the Industrial World Are Open to Cyber Attacks (Claims Journal) Industrial robots are now being used to assemble everything from airplanes to smartphones, using human-like arms to mechanically repeat the same processes
The Cyber Security Threats Lurking In Your HVAC System (Propmodo) As the Internet of Things proliferates in smart buildings, devices requesting third party access to building systems pose a cybersecurity risk.
Treck TCP/IP Stack (Update F) (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 10.0
ATTENTION: Exploitable remotely
Vendor: Treck Inc.
Equipment: TCP/IP
Vulnerabilities: Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or Wraparound, Improper Null Termination, Improper Access Control
Delta Industrial Automation CNCSoft ScreenEditor (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.8
ATTENTION: Low skill level to exploit
Vendor: Delta Electronics
Equipment: Industrial Automation CNCSoft ScreenEditor
Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Read, Access of Uninitialized Pointer
2.
Robot Motion Servers (CISA) 1 EXECUTIVE SUMMARY
CISA is aware of a public report of a vulnerability affecting robot motion servers. The motion servers are programs written in OEM exclusive programming languages and run on the robot controller. Motion servers enable receiving target values and optionally sending actual values.
Is Your WhatsApp At Risk From This Dangerous Hack? (Forbes) This is the WhatsApp hack that will most likely hijack your account—here's how you stay safe.
Avoiding Dating Disasters: Check Point Research Helps to Mitigate Significant Vulnerabilities in OkCupid's Website and Mobile App (MarketScreener) Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. , a leading provider of cyber security solutions globally, recently identified and helped mitigate...
Haryana police cautions retired govt personnel regarding cyber crime threat | Chandigarh News (The Times of India) The Haryana police have issued advisory requesting citizens, especially the recently retired government employees not to share any persona.
Colorado city pays $45,000 ransom after cyber-attack (Albuquerque Journal) Lafayette, Colorado, officials announced Tuesday the city's computer systems were hacked and they were forced to pay a ransom to regain access. Lafayette officials said hackers disabled the city's network services and…
Cyber attack affects Hudson ISD website (The Lufkin Daily News) Hudson ISD's website was down throughout the weekend and Monday after a cyber attack affected the website's host.
Cyber-attack 'cost council more than £10m' (BBC News) Thousands of people were affected when public services were knocked offline earlier this year.
Are you safe? Your data could be breached in one of 10,000 exposed databases around the world. (Nord Pass) Your data is visible in 10,000 exposed databases around the world. And the U.S is top of the list.
Cyber Trends
()
Venafi Media Alert: Malware Attacks Exploiting Machine Identities Doubles Between 2018 to 2019 (BusinessWire) Commodity malware campaigns utilizing machine identities are increasing rapidly
Venafi Researchers Examine Malware Attacks (Venafi) Malware attacks exploiting machine identities doubles between 2018 and 2019.
Accurics Releases ‘State of DevSecOps Report’ for Summer 2020, Unveils Common but Dangerous Breach Paths in Cloud Deployments (BusinessWire) Research explores security challenges as organizations adopt cloud native technologies and highlights the need for codifying security into development
The State of DevSecOps (Accurics) The adoption of cloud native infrastructure such as serverless, containers, and service mesh are enabling organizations to deliver new innovations to market. Unfortunately, over 30 billion records have been exposed as a result of cloud infrastructure misconfigurations over the last two years and the velocity of cloud breaches continue to increase.
New Study Finds Cloud-Native Patch Management Saves Industry Billions Over Legacy Alternatives (BusinessWire) A new study has found that cloud-native patch management saves the industry billions over legacy alternatives
Trend Micro: Hackers target hospitals during COVID-19 pandemic, many are still vulnerable (SoyaCincau.com) Trend Micro says hospital systems are often held hostage using ransomware by hackers as they will often pay up quickly in order to save lives.
VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics (TechRepublic) Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.
Ninety-Four Percent of Organizations Have Experienced At Least One Business-Impacting Cyberattack in the Past 12 Months, According to New Industry Study (GlobeNewswire) Yet only four out of 10 security leaders can answer the question, “How secure, or at risk, are we?”
Marketplace
There Is No Cloud Security Market Segment (Forbes) Of 2,337 vendors of security products there are none that can be put in a separate Cloud Security segment.
Agentless Authentication Provider Silverfort Secures $30 Million in Series B Funding (BusinessWire) Silverfort, provider of the industry’s first agentless, proxyless authentication platform, announced today that it has raised $30 million in a series
Startup HeadSpin to Return Funding After Probe of Financial Statements (The Information) HeadSpin, a mobile app testing company recently valued at $1.16 billion, plans to return up to $95 million in funding to investors after an internal review of financial irregularities forced it to restate its financials.The previously unreported review follows the board’s discovery that the ...
Microsoft paid almost $14M in bounties over the last 12 months (BleepingComputer) Microsoft has awarded $13.7 million to security researchers who have reported vulnerabilities over the last 12 months through 15 bug bounty programs, between July 1st, 2019, and June 30th, 2020.
Microsoft goes big in security bug bounties: Its $13.7m is double Google's 2019 payouts (ZDNet) Microsoft has tripled its bug-bounty payouts to security researchers over the past year.
Data Theorem Named a Top Cybersecurity Startup of the Year at Black Hat USA 2020 Virtual Conference (BusinessWire) Data Theorem, Inc., a leading provider of modern application security, today announced that is has been named a Top 100 Cybersecurity Startup for 2020
Cybellum Named Winner as Top 100 Cybersecurity Startup for 2020 (PR Newswire) Cybellum, the leading Automotive Cybersecurity Risk Assessment solution provider, today announced that it has been named a Top 100...
A Patriotic Solution to the Cybersecurity Skills Shortage (Dark Reading) Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.
Cyber Security Firm Expands To Europe To Help Firms Protect Data (Media Post) SecureReview uses several technologies, including facial verification and a secure mail system, to limit access to data.
Tortuga Logic Announces Expansion of Cybersecurity Leadership Team (PR Newswire) Tortuga Logic, Inc., a cybersecurity company specializing in hardware security, today announced that its Board of Directors has appointed...
Respond Software Welcomes George Vukcevich as Vice President of Sales (Respond Software) George Vukcevich has joined Respond Software as VP of sales. The tech sales leader will lead the strategy for the cybersecurity and soc automation market.
Tufin Names Mitch DeBerdt as Country Manager for Japan (BusinessWire) Tufin announced the appointment of Mitch DeBerdt to the position of Country Manager for Japan.
Products, Services, and Solutions
Spin Technology Introduces Cyber Liability Insurance for SpinOne (PRWeb) Spin Technology, Inc., today introduced Cyber Liability Insurance for SpinOne. This additional offering provides a policy that new and existing SpinOne c
Global Payments Makes PCI History in Partnership with Coalfire (PR Newswire) Coalfire, the first cybersecurity firm in the world accredited by the Payment Card Industry Security Standards Council (PCI SSC) to perform...
Tanium and Google Cloud partner to deliver security transformation (Help Net Security) Tanium has expanded its partnership with Google Cloud to help organizations accelerate the transformation to distributed business operations.
Cloudflare Selects ForAllSecure to Bring Increased Application Security to its DevOps Pipeline (PR Newswire) ForAllSecure, Inc., a pioneer in automated application security, announced today that Cloudflare, a security, performance, and reliability...
Lumu Unveils Enhanced Spambox Analysis Capabilities (GlobeNewswire) Lumu Empowers Customers to Unleash the Value of Spambox Threat Intelligence to Continuously Improve their Compromise Detection
Yellowbrick Data and Emtec Enter into a New Partnership (Emtec Inc) New partnership with hybrid cloud data warehouse firm, Yellowbrick data, will expand value of Emtec's enterprise data lake services & strategic business intelligence solutions.
New Spin on a Longtime DNS Intel Tool (Dark Reading) Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.
Thales Offers Solutions to Hotels and Casinos for Enhanced Security and Efficiency (Kiosk Marketplace) InterContinental® Singapore demonstrates flexibility of Thales Gemalto Document Reader solutions.
Cybereason launches program in the Middle East (Security Middle East) Cyberason looks to expand market footprint by joining forces with MSSPs and VARs, offering training, favorable pricing models and more
Enhanced Features Extend ReversingLabs Explainable Threat Intelligence Capabilities for Threat Hunters and Security Operations Teams (GlobeNewswire) MITRE ATT&CK® Mapping, Indicator Transparency and Interactive Storytelling Provide Added Context, Transparency and Prescriptive Recommendations
Cyware Partners with Recorded Future For Enhanced Threat Intelligence Automation and Analysis (PR Newswire) Cyware, the leading provider of cyber fusion solutions, today announced a new partnership with Recorded Future, the largest global security...
Trend Micro Cloud-Powered XDR Drives Monumental Business Value (Eletimes) Organizations can save the cost of 8 full time employees by adopting an XDR approach, says ESG
Unisys enhances CloudForte, the multi-cloud and application optimization platform (Help Net Security) Unisys has enhanced CloudForte, its integrated, multi-cloud and application optimization platform. The new CloudForte capabilities help organizations
SailPoint and Proofpoint Team Up to Fight Security Threats Facing Today’s Digital Workforce (BusinessWire) With more than 90% of today's threats starting with a seemingly innocuous email, SailPoint Technologies Holdings, Inc. (NYSE: SAIL), the leader in ide
Radiflow launches CIARA, a ROI-driven risk assessment and management platform for industrial organizations (Help Net Security) Radiflow CIARA helps meet emerging best practice around risk modelling and management using the ISA/IEC 62443 series of standards.
Palo Alto Networks Introduces Industry's Largest and Most Comprehensive Security Orchestration Marketplace (PR Newswire) Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today introduced a marketplace for Cortex™ XSOAR, its extended security...
Sixgill Joins Palo Alto Networks Cortex XSOAR Marketplace as a Launch Partner (PR Newswire) Sixgill, a leading threat intelligence company, today announced that Darkfeed™, its fully automated stream of indicators of compromise, is now...
SafeBreach Joins Palo Alto Networks Cortex XSOAR Marketplace as a Launch Partner (PR Newswire) SafeBreach, the world's most widely used breach-and-attack-simulation platform, today announced that SafeBreach with the SafeBreach Insights(™)...
Recorded Future Joins Palo Alto Networks Cortex XSOAR Marketplace as a Launch Partner (PR Newswire) Recorded Future, the largest global security intelligence provider, today announced that the Recorded Future Security Intelligence Platform...
RiskIQ Joins Palo Alto Networks Cortex XSOAR Marketplace as a Launch Partner (GlobeNewswire) Cortex XSOAR Marketplace enables organizations to discover, share and consume security orchestration innovations from a global ecosystem to scale up automation
The Future of Cyber Security – The Best Defense is an Impenetrable Offense (Security Boulevard) The post The Future of Cyber Security – The Best Defense is an Impenetrable Offense appeared first on Fidelis Cybersecurity.
CERT NZ provides threat intelligence for InternetNZ's DNS Firewall (Security Brief) It’s important to InternetNZ to keep adding intelligence to Defenz to make sure our customers are protected from known security threats.
GrayMatter deceptionGUARD Responds to Cybersecurity Critical Infrastructure Warnings (PR Newswire) GrayMatter releases its latest cybersecurity offering to protect industrial companies and critical infrastructure from the types of...
Forescout and Arista Networks Join Forces to Deliver Zero Trust Security (GlobeNewswire) Partnership and integration of best-of-breed technologies deliver comprehensive device visibility and enforcement across heterogeneous networks
LogMeIn Introduces New LastPass Security Dashboard and Dark Web Monitoring, Delivering a Complete Command Center for Managing Digital Security (AP NEWS) LastPass by LogMeIn today unveiled a new Security Dashboard, providing end users with a complete overview of the security of their online accounts and actionable steps to strengthen their online security.
Certes Announces New Distributorship Agreement (Certes Networks) Certes Networks Signs Distributorship Agreement with Largest Value-Added Technology Distributor in Turkey
Technologies, Techniques, and Standards
Limiting Location Data Exposure (National Security Agency) Mobile devices store and share device geolocation data by design.
Here's the NSA's advice for reducing the exposure of cellphone location data (CyberScoop) Although cellphone users can work to limit the risk their cellphones are exposing location data, the NSA warns there's no way to eliminate the risk.
()
Why SSO isn’t a silver bullet for enterprise security (1Password Blog) SSO plays a huge role in business security – we love it, we use it, and we understand the enormous contribution it makes. But by itself, SSO doesn’t solve every challenge businesses face with securely signing in to services. And it can’t replace an enterprise password manager. Let’s talk a little bit about why that is.
AT&T Cybersecurity: Do Secure VPNs, Don’t Pay Ransoms (SDxCentral) AT&T research suggests that the vast majority of large businesses believe widespread remote working because of the COVID-19 pandemic makes their companies less secure and more vulnerable to cyberattacks.
Top 5 Security Considerations for Cloud Migration (CPO Magazine) Cloud-based deployments have significantly changed the security paradigm and the foremost consideration for cloud migration involves a security framework that spans the entire cloud infrastructure.
SANS Institute Outlines Path to Effective Security Metrics Use (Herald-Mail Media) Metrics for security are in wide use in organizations today, with over 80% of respondents to a new SANS Institute survey claiming some
New SANS Institute Reports Advocate for Remote Browser Isolation and Assess the Effectiveness of the Cyberinc Isla Isolation Platform (PR Newswire) Cyberinc today announced that SANS Institute, the leading independent provider of security research and education, has published an independent...
The realities of ransomware: A victim’s-eye view of an attack (Sophos News) The Managed Threat Response manager offers a unique perspective on the realities of being the target of ransomware
Maryland IT Strategy Consulting Firm Educates On IT Due Diligence (Digital Journal) Hartman Executive Advisors, a Maryland IT strategy consulting firm, recently released a blog educating business owners on IT due diligence and risk management consulting. The article outlines the benefits of undergoing a comprehensive IT assessment and how it can significantly affect the state of your business.
Design and Innovation
WhatsApp rolling out Search the Web functionality to help fact check viral messages (Android Police) Curb the spread of misinformation online
Research and Development
Ntrepid Awarded Patent for Method to Transmit Network Traffic with a Proxy Device (BusinessWire) Ntrepid announced today that the company was recently awarded a patent for a method to transmit network traffic with a proxy device.
Academia
CSU launches new cybersecurity program (WTVM) CSU unveiled its cybersecurity program with an inaugural class made up of 14 students.
Great Falls College MSU's cyber security program nationally recognized for academic excellence (KHQ Right Now) Great Falls College MSU has received national recognition for it's cyber security program.
Legislation, Policy, and Regulation
First EU Sanctions for Cyberattacks Point to Alignment With U.S. on Foreign Hacking (Wall Street Journal) The European Union imposed sanctions for the first time in response to major cyberattacks, bringing the bloc more in line with the U.S. approach of publicly naming and seeking punishment for nation-state hackers.
Australian PM says no evidence to suggest TikTok should be banned (Reuters) Australia has found no evidence showing it should restrict the popular short-video app TikTok, the country's Prime Minister Scott Morrison said on Tuesday, after U.S. President Donald Trump threatened to ban the Chinese-owned app.
Canada’s Scattered and Uncoordinated Cyber Foreign Policy: A Call for Clarity (Just Security) Authors from the Citizen Lab explain why Canada's scattershot approach to cybersecurity fails to advance fundamental Canadian interests
ByteDance CEO Says Trump’s Real Goal Is to Kill Off TikTok (Bloomberg) U.S. doesn’t really want to see a sale to American buyers. Founder Zhang Yiming issues second letter in two days.
TikTok becomes latest casualty in Trump's tech war with China (TheHill) The future of popular social media platform TikTok in the U.S.
It’s Not Just TikTok. Chinese Firms Face More US Roadblocks (Wired) Chinese companies have been free to expand in the US while American firms were stymied by Beijing. Now, the climate is not as welcoming.
China Is Waging Economic War on America. The Pandemic Is an Opportunity to Turn the Fight Around. (Barron's) China has targeted America’s most productive economic sectors for years. As we rebuild after the pandemic, the U.S. government should stand shoulder to shoulder with industry.
TikTok Standoff Raises Fear of Retaliation Against U.S. App Developers (Wall Street Journal) Digital companies making inroads in China could face heat should Beijing respond in kind to U.S. tactics.
US stress on security will hurt trade (China Daily) By disrupting the world's interconnected economic, social and geopolitical spheres, the COVID-19 pandemic has exposed just how fragile and inequitable the institutions that govern them really are. It has also highlighted how difficult it is to address systemic fragility and inequity amid escalating national security threats.
Huawei ban won’t damage UK tech industry, say IT experts (Yahoo) A survey of industry professionals found the majority do not believe the UK will be adversely affected by the Huawei 5G ban.
Litigation, Investigation, and Law Enforcement
Senate Intel panel approves final Russia report, moves toward public release (TheHill) The Senate Intelligence Committee on Tuesday voted to adopt its fifth and final report on Russia’e election interference efforts in 2016, with committee leaders vowing to keep working towards releasing a declas
Mergers: Commission opens in-depth investigation into the proposed acquisition of Fitbit by Google (European Commission - European Commission) The European Commission has opened an in-depth investigation to assess the proposed acquisition of Fitbit by Google under the EU Merger Regulation.
Tampa teenager accused in Twitter hack pleads not guilty (AP NEWS) A Florida teen identified as the mastermind of a scheme that gained control of Twitter accounts of prominent politicians, celebrities and technology moguls pleaded not guilty on...
The Teenager Allegedly Behind the Twitter Hack and How He Did It (Wall Street Journal) A crucial moment in the worst hack in Twitter’s history was when a Florida teenager convinced a company employee that he was a co-worker, prosecutors say.
Social Engineering: A Plague on Crypto and Twitter, Unlikely to Stop (Yahoo) The SIM swapping community entered the spotlight after helping the Twitter hacker breach the social media platform, but these threat actors have been going after the crypto community for years.
Elizabeth Warren Wants To Know Why This Company Was Spying On BLM Protesters (BuzzFeed News) A group of Democratic lawmakers is demanding answers about protester surveillance conducted by data broker Mobilewalla.
Israeli Spy Firm NSO Can Hack Phones Of Activists And Journalists: 5 Things You Need To Know (Moguldom) Secretive Israeli surveillance firm NSO can hack phones of activists and journalists. Here are five things you need to know.
Inside the Courthouse Break-In Spree That Landed 2 White Hat Hackers in Jail (Wired) When two men were hired to break into an Iowa judicial buildings, they thought it was just another physical security audit—until they were charged with burglary.