October 2021

Well this is a totally different office view! I’m properly getting into working more on the acoustics and aesthetics to make this the most productive environment possible which means this week things are in a bit of disarray due to ongoing works. Speaking of disarray, I’ve

Read More Weekly Update 266

Cisco fixes an OS command-injection flaw, tracked as CVE-2021-1529, in Cisco SD-WAN that could allow privilege escalation and lead to arbitrary code execution. Cisco addressed a high-severity OS command-injection vulnerability, tracked as CVE-2021-1529, in Cisco SD-WAN that could allow privilege escalation and lead to arbitrary code execution. Cisco SD-WAN is a cloud-delivered overlay WAN architecture […]

The post Cisco SD-WAN flaw could lead to arbitrary code execution, patch it now! appeared first on Security Affairs.

Read More Cisco SD-WAN flaw could lead to arbitrary code execution, patch it now!

The U.S. CISA warned of crypto-mining malware hidden in a popular JavaScript NPM library, named UAParser.js, which has millions of weekly downloads. The U.S. Cybersecurity and Infrastructure Security Agency published an advisory to warn of the discovery of a crypto-mining malware in the popular NPM Package UAParser.js. The popular library has million of weekly downloads. “Versions of a popular […]

The post Supply-chain attack on NPM Package UAParser, which has millions of daily downloads appeared first on Security Affairs.

Read More Supply-chain attack on NPM Package UAParser, which has millions of daily downloads

Remote access has helped us become more interconnected than ever before. In the United States alone, two months into the pandemic, approximately 35% of the workforce was teleworking. The growth of remote access allowed individuals to work with organizations and teams they don’t physically see or meet. However, the demand for remote access has critical […]

The post Resilience lies with security: Securing remote access for your business appeared first on Webroot Blog.

Read More Resilience lies with security: Securing remote access for your business

Facebook developed a new tool that allows security experts to look for Server-Side Request Forgery (SSRF) vulnerabilities in their software. Facebook announced to have designed a new tool, named SSRF Dashboard, that allows security researchers to search for Server-Side Request Forgery (SSRF) vulnerabilities. Server-side request forgery is a web security vulnerability that allows an attacker […]

The post Facebook SSRF Dashboard allows hunting SSRF vulnerabilities appeared first on Security Affairs.

Read More Facebook SSRF Dashboard allows hunting SSRF vulnerabilities

Squid are eating Maine shrimp, causing a collapse of the ecosystem. This seems to be a result of climate change.

Maine’s shrimp fishery has been closed for nearly a decade since the stock’s collapse in 2013. Scientists are now saying a species of squid that came into the Gulf of Maine during a historic ocean heatwave the year before may have been a “major player” in the shrimp’s downturn.

In 2012, the Gulf of Maine experienced some of its warmest temperatures in decades. Within a couple of years, the cold-water-loving northern shrimp had rapidly declined and the fishery, a small but valued source of income for fishermen in the offseason, closed…

Read More Friday Squid Blogging: Squid Eating Maine Shrimp

Groove ransomware operators call on other ransomware groups to stop competing and join the forces to fight against the US. The Groove ransomware gang is calling on other ransomware groups to attack US public sector after a an operation of of law enforcement shut down the infrastructure of the REvil gang. “The ransomware group REvil […]

The post Groove ransomware group calls on other ransomware gangs to hit US public sector appeared first on Security Affairs.

Read More Groove ransomware group calls on other ransomware gangs to hit US public sector

As cars become more intricate, so does their repair process. With so many instruments and components to deal with, dealerships sometimes aren’t equipped to repair advanced issues. To cut down on the turnaround time for customers, Mercedes-Benz has partnered with Microsoft to integrate Hololens 2 augmented-reality (AR) headsets into their repair process. This collaboration started […]

The post Mercedes-Benz adopts Microsoft Hololens 2 to fix cars faster first appeared on IT World Canada.

Read More Mercedes-Benz adopts Microsoft Hololens 2 to fix cars faster

Culture is the number one barrier to organizational transformation and success. If you want to get leaner and more agile, definitely assess and streamline your technology. But what about your company’s culture? Many will look to big-name companies for the way forward. They want to innovate like Apple, move with Google’s speed, and predict customer […]

The post Encouraging a culture of speed in your organization first appeared on IT World Canada.

Read More Encouraging a culture of speed in your organization

Darkside and BlackMatter ransomware operators have moved a large amount of their Bitcoin reserves after the recent shutdown of REvil’s infrastructure. The gangs behind the Darkside and BlackMatter ransomware operations have moved 107 BTC ($6.8 million) after the news of the recent shutdown of REvil’s infrastructure by law enforcement agencies. “The ransomware group REvil was […]

The post DarkSide ransomware operators move 6.8M worth of Bitcoin after REvil shutdown appeared first on Security Affairs.

Read More DarkSide ransomware operators move 6.8M worth of Bitcoin after REvil shutdown

Conti ransomware is an extremely damaging malicious actor due to the speed with which encrypts data and spreads to other systems. The cyber-crime action is thought to be led by a Russia-based group that goes under the Wizard Spider pseudonym. Conti Ran…

Read More What Is Conti Ransomware?

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Strong identity authentication is more important than ever as organizations face an unprecedented level of attacks tar…

Read More Recorded Future Identity Intelligence prevents identity fraud and disrupts attackers – learn more now

This episode reports on the discovery of Evil Corp.’s new ransomware strain, a scam that hijacks YouTube accounts and why developers have to scan open-source code libraries

The post Cyber Security Today, Oct. 22, 2012 – A new ransomware strain discovered, a scam hijacks YouTube accounts and watch those open source code libraries first appeared on IT World Canada.

Read More Cyber Security Today, Oct. 22, 2012 – A new ransomware strain discovered, a scam hijacks YouTube accounts and watch those open source code libraries

Someone has been hacking telecommunications networks around the world:

  • LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures.
  • Recent findings highlight this cluster’s extensive knowledge of telecommunications protocols, including the emulation of these protocols to facilitate command and control (C2) and utilizing scanning/packet-capture tools to retrieve highly specific information from mobile communication infrastructure, such as subscriber information and call metadata.
Read More Nation-State Attacker of Telecommunications Networks

FIN7 hacking group created fake cybersecurity companies to hire experts and involve them in ransomware attacks tricking them of conducting a pentest. The FIN7 hacking group is attempting to enter in the ransomware business and is doing it with an interesting technique. The gang space creates fake cybersecurity companies that hire experts requesting them to […]

The post FIN7 cybercrime gang creates fake cybersecurity firm to recruit pentesters for ransomware attacks appeared first on Security Affairs.

Read More FIN7 cybercrime gang creates fake cybersecurity firm to recruit pentesters for ransomware attacks

Bitdefender researchers discovered a new Rootkit named FiveSys that abuses Microsoft-Issued Digital Signature signature to evade detection. FiveSys is a new rootkit discovered by researchers from Bitdefender, it is able to evade detection by abusing a Microsoft-issued digital signature. Driver packages that pass Windows Hardware Lab Kit (HLK) testing can be digitally-signed by Microsoft WHQL (Windows Hardware Quality […]

The post FiveSys, a new digitally-signed rootkit spotted by Bitdefender experts appeared first on Security Affairs.

Read More FiveSys, a new digitally-signed rootkit spotted by Bitdefender experts

Enterprises must embrace business composability to thrive through disruption in 2022 and beyond, according to Gartner’s survey of CIOs and technology executives. Business composability is the mindset, technologies, and set of operating capabilities tha…

Read More Business composability: Mastering the risk of accelerating change and creating new business value