The CEO of the encrypted communications firm Sky Global has been indicted in the US on charges of facilitating international drug trafficking The head of the Canada-based company Sky Global that provides encrypted communications, Jean-Francois Eap, has been indicted in the US on charges of facilitating international drug trafficking. The Justice Department indicted Jean-Francois Eap […]

The post US DoJ indicted the CEO of Sky Global encrypted chat platform appeared first on Security Affairs.

Read More US DoJ indicted the CEO of Sky Global encrypted chat platform

As organizations connect massive numbers of IoT/OT devices to their networks to optimize operations, boards and management teams are increasingly concerned about the expanding attack surface and corporate liability that they represent.

The post 5 steps to enable your corporate SOC to rapidly detect and respond to IoT/OT threats appeared first on Microsoft Security.

Read More 5 steps to enable your corporate SOC to rapidly detect and respond to IoT/OT threats

A little over a year ago, the FBI and law enforcement partners overseas seized WeLeakInfo[.]com, a wildly popular service that sold access to more than 12 billion usernames and passwords stolen from thousands of hacked websites. In an ironic turn of events, a lapsed domain registration tied to WeLeakInfo let someone plunder and publish account data for 23,000 people who paid to access the service with a credit card.

Read More WeLeakInfo Leaked Customer Payment Info

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security […]

The post ProxyLogon Microsoft Exchange exploit is completely out of the bag by now appeared first on Security Affairs.

Read More ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

Canadian charged as encrypted network allegedly used by criminals disrupted, equipment from Huawei and others called risky to US networks, and updates for Chrome browser, Netgear and Linux
The post Cyber Security Today, March 15, 2021 – Canadian charg…

Read More Cyber Security Today, March 15, 2021 – Canadian charged as encrypted network allegedly used by criminals disrupted, equipment from Huawei called risky to US networks; Chrome updates; Netgear and Linux

Canadian charged as encrypted network allegedly used by criminals disrupted, equipment from Huawei and others called risky to US networks, and updates for Chrome browser, Netgear and Linux
The post Cyber Security Today – Canadian charged as encrypted …

Read More Cyber Security Today – Canadian charged as encrypted network allegedly used by criminals disrupted, equipment from Huawei called risky to US networks; Chrome updates; Netgear and Linux

Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:

Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices using Bluetooth and report an approximate location back to the owner via the Internet. While OF is not the first system of its kind, it is the first to commit to strong privacy goals. In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports. This paper presents the first comprehensive security and privacy analysis of OF. To this end, we recover the specifications of the closed-source OF protocols by means of reverse engineering. We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user’s top locations with an error in the order of 10 meters in urban areas. While we find that OF’s design achieves its privacy goals, we discover two distinct design and implementation flaws that can lead to a location correlation attack and unauthorized access to the location history of the past seven days, which could deanonymize users. Apple has partially addressed the issues following our responsible disclosure. Finally, we make our research artifacts publicly available…

Read More Security Analysis of Apple’s “Find My…” Protocol

After serveral months (actually 15) from the Cybersecurity Observatory launch (you can find it HERE) I experienced a huge increment of classified Malware from the end of January 2021. The following picture shows how the average samples frequency is just more than twice if compared to the beginning of the month and to the past […]

Read More Malware Family Surface 2021 (Q1)

Amazon says no to a Pickering warehouse opening while appealing orders to close a Brampton location due to a COVID-19 outbreak, and Google is accused of tracking users in ‘Incognito’ mode
The post Hashtag Trending, March 15, 2021 – Amazon says no to Pi…

Read More Hashtag Trending, March 15, 2021 – Amazon says no to Pickering and appeals orders to close a Brampton warehouse; Google accused of tracking users in ‘Incognito’ mode

Amazon says no to a Pickering warehouse opening while appealing orders to close a Brampton location due to a COVID-19 outbreak, and Google is accused of tracking users in ‘Incognito’ mode
The post Hashtag Trending, March 15, 2021 – Amazon says no to Pi…

Read More Hashtag Trending, March 15, 2021 – Amazon says no to Pickering and appeals orders to close a Brampton warehouse; Google accused of tracking users in ‘Incognito’ mode

The UK’s National Cyber Security Centre (NCSC) urges UK organizations to install the patches for the recently disclosed vulnerabilities in Microsoft Exchange. The UK’s National Cyber Security Centre is urging UK organizations to install security patches for their Microsoft Exchange installs. The UK agency revealed to have helped UK organisations to secure their installs, around […]

The post NCSC is not aware of ransomware attacks compromising UK orgs through Microsoft Exchange bugs appeared first on Security Affairs.

Read More NCSC is not aware of ransomware attacks compromising UK orgs through Microsoft Exchange bugs

Google has addressed a new zero-day flaw in its Chrome browser that has been actively exploited in the wild, the second one within a month Google has fixed a new actively exploited zero-day in its Chrome browser, this is the second zero-day issue addressed by the IT giant within a month. The flaw, tracked as […]

The post Google fixes the third actively exploited Chrome 0-Day since January appeared first on Security Affairs.

Read More Google fixes the third actively exploited Chrome 0-Day since January

Netgear has released security and firmware updates for its JGS516PE Ethernet switch to address 15 vulnerabilities, including a critica remote code execution issue. Netgear has released security and firmware updates to address 15 vulnerabilities in its JGS516PE Ethernet switch, including an unauthenticated remote code execution flaw rated as critical. The flaws were discovered by researchers […]

The post Experts found 15 flaws in Netgear JGS516PE switch, including a critical RCE appeared first on Security Affairs.

Read More Experts found 15 flaws in Netgear JGS516PE switch, including a critical RCE

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. Chinese hackers allegedly hit thousands of organizations using Microsoft Exchange REvil Ransomware gang uses DDoS attacks and voice […]

The post Security Affairs newsletter Round 305 appeared first on Security Affairs.

Read More Security Affairs newsletter Round 305

Google released proof-of-concept code to conduct Spectre attacks against its Chrome browser to share knowledge of browser-based side-channel attacks. Google released proof-of-concept code for conducting a Spectre attack against its Chrome browser on GitHub. The experts decided to publish the proof of concept code to demonstrate the feasibility of a web-based Spectre exploit.  The PoC […]

The post Google releases Spectre PoC code exploit for Chrome browser appeared first on Security Affairs.

Read More Google releases Spectre PoC code exploit for Chrome browser

Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on vulnerable Linux systems. GRIMM researchers found three vulnerabilities in the SCSI (Small Computer System Interface) component of the Linux kernel, the issues could be exploited by local attackers with basic user privileges to gain root privileges […]

The post Experts found three new 15-year-old bugs in a Linux kernel module appeared first on Security Affairs.

Read More Experts found three new 15-year-old bugs in a Linux kernel module