Cybersecurity

30 readers
5 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 2 years ago
MODERATORS
351
 
 

New wave of ‘fake interviews’ use 35 #npm packages to spread #malware

https://www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/

#cybersecurity #NorthKorea #JobHunting

352
 
 

"The FBI listed some indicators of compromise (IoCs) in the PSA for consumers to tell if they were impacted. But the average person isn’t running network detection infrastructure in their homes, and cannot hope to understand what IoCs can be used to determine if their devices generate “unexplained or suspicious Internet traffic.” Here, we will attempt to help give more comprehensive background information about these IoCs. If you find any of these on devices you own, then we encourage you to follow through by contacting the FBI's Internet Crime Complaint Center (IC3) at www.ic3.gov.

The FBI lists these IoC:

  • The presence of suspicious marketplaces where apps are downloaded.

  • Requiring Google Play Protect settings to be disabled.

  • Generic TV streaming devices advertised as unlocked or capable of accessing free content.

  • IoT devices advertised from unrecognizable brands.

  • Android devices that are not Play Protect certified.

  • Unexplained or suspicious Internet traffic.

The following adds context to above, as well as some added IoCs we have seen from our research."

https://www.eff.org/deeplinks/2025/06/fbi-warning-iot-devices-how-tell-if-you-are-impacted

#CyberSecurity #Privacy #IoT #SmartObjects #InternetOfThings

353
 
 

#Citrix warns of #NetScaler vulnerability exploited in DoS attacks

https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/

#cybersecurity

354
 
 

#WinRAR patches bug letting #malware launch from extracted archives

https://www.bleepingcomputer.com/news/security/winrar-patches-bug-letting-malware-launch-from-extracted-archives/

#cybersecurity

355
 
 

New '#CitrixBleed 2' #NetScaler flaw let hackers hijack sessions

https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/

#cybersecurity #Citrix #NetScaler

356
 
 

#BreachForums hacking forum operators reportedly arrested in #France

https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-operators-reportedly-arrested-in-france/

#cybercrime #cybersecurity #DataBreach #privacy

357
 
 

A group of hackers gained remote access to a hydroelectric dam’s control systems in Norway and fully opened a drainage valve, releasing a large amount of water.

For four hours it went unnoticed.

This wasn’t a hacker’s prank. This was a critical piece of infrastructure being remotely manipulated by an unauthorised party.

#Cybersecurity

358
 
 

#SonicWall warns of trojanized #NetExtender stealing #VPN logins

https://www.bleepingcomputer.com/news/security/sonicwall-warns-of-trojanized-netextender-stealing-vpn-logins/

#cybersecurity #malware

359
 
 

#Microsoft fixes known issue that breaks #Windows11 updates

https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-known-issue-that-breaks-windows-11-updates/

#cybersecurity

360
 
 

#Windows10 users can get extended security updates using #Microsoft points

https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-10-extended-security-updates-available-using-reward-points/

#cybersecurity

361
 
 

#Trezor’s support platform abused in #crypto theft #phishing attacks

https://www.bleepingcomputer.com/news/security/trezors-support-platform-abused-in-crypto-theft-phishing-attacks/

#cybersecurity

362
 
 

#Ubuntu To Disable #Intel Graphics Security Mitigations To Boost GPU Performance By Up To 20%

https://news.slashdot.org/story/25/06/23/2046259/ubuntu-to-disable-intel-graphics-security-mitigations-to-boost-gpu-performance-by-up-to-20

#cybersecurity #FOSS #Linux

363
 
 

#APT28 hackers use #Signal chats to launch new #malware attacks on #Ukraine

https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/

#Russia #BeardShell #SlimAgent #cybersecurity

364
 
 

#Malware on #GooglePlay, #Apple #AppStore stole your photos—and #crypto

https://www.bleepingcomputer.com/news/security/malware-on-google-play-app-store-stole-your-photos-and-crypto/

#cybersecurity #SparkCat #SparKitty

365
 
 

#Canada says #Sal Typhoon hacked #telecom firm via #Cisco flaw

https://www.bleepingcomputer.com/news/security/canada-says-salt-typhoon-hacked-telecom-firm-via-cisco-flaw/

#cybersecurity #China

366
 
 

#McLaren #HealthCare says #DataBreach impacts 743,000 patients

https://www.bleepingcomputer.com/news/security/mclaren-health-care-says-data-breach-impacts-743-000-patients/

#cybersecurity #privacy

367
 
 

#Steel giant #Nucor confirms hackers stole data in recent breach

https://www.bleepingcomputer.com/news/security/steel-giant-nucor-confirms-hackers-stole-data-in-recent-breach/

#DataBreach #cybersecurity #privacy

368
 
 

#CoinMarketCap briefly hacked to drain #crypto wallets via fake #Web3 popup

https://www.bleepingcomputer.com/news/security/coinmarketcap-briefly-hacked-to-drain-crypto-wallets-via-fake-web3-popup/

#cybersecurity

369
 
 

#Oxford City Council suffers breach exposing two decades of data

https://www.bleepingcomputer.com/news/security/oxford-city-council-suffers-breach-exposing-two-decades-of-data/

#DataBreach #cybersecurity #privacy #UK

370
 
 

Russian hackers bypass #Gmail #MFA using stolen app #passwords

https://www.bleepingcomputer.com/news/security/russian-hackers-bypass-gmail-mfa-using-stolen-app-passwords/

#cybersecurity #Russia

371
 
 

#WordPress #Motors theme flaw mass-exploited to hijack admin accounts

https://www.bleepingcomputer.com/news/security/wordpress-motors-theme-flaw-mass-exploited-to-hijack-admin-accounts/

#cybersecurity

372
 
 

"Regulators around the world are working to address competition issues in digital markets, particularly on mobile devices. Several new laws have already been passed, including the UK’s Digital Markets, Competition and Consumers Act (DMCC), Japan’s Smartphone Act, and the EU’s Digital Markets Act (DMA). Australia and the United States are also considering similar legislation with the U.S. Department of Justice pursuing an antitrust case against Apple. Across all of these efforts, common questions arise: How should competition, user choice, and utility be balanced against security concerns? What is proportionate and necessary in relation to security? And how effective is app store review in practice?

The DMA is a helpful act to look at as it has been in force the longest and many of these other acts are loosely based on it. The DMA aims to restore contestability, interoperability, choice and fairness back to digital markets in the EU. These fundamental properties of an effectively functioning digital market have been eroded by the extreme power gatekeepers wield via their control of “core platform services”.

Under the DMA gatekeepers are only allowed to have strictly necessary, proportionate and justified security measures to protect the integrity of the operating system."

https://open-web-advocacy.org/blog/balancing-security-and-fair-competition/

#EU #DMA #Monopolies #Oligopolies #Antitrust #Competition #Interoperability #CyberSecurity #WebSecurity #OpenWeb

373
 
 

Earlier this month, hackers stole an unknown amount of customer information from the US insurance company Aflac, @Techcrunch reports. Here’s more on the data breach, when it occurred and what type of info was taken.

https://flip.it/K_qTwE

#Tech #CyberSecurity #Hacking #Technology

374
 
 

🛡️ #CRA & #NIS2 readiness takes the stage at #openSUSE Conference! Dive into vital #workshops shaping #opensource legal compliance in #Europe. Learn, discuss, and prepare your projects for the changing #cybersecurity landscape. https://events.opensuse.org/

375
 
 

Insecure defaults can lead to surprises. When creating FIFO sockets with systemd, be sure to note that SocketMode defaults to 0666 - that is world readable and writable. That is: any local user can communicate with the FIFO. If your FIFO is used to perform privileged operations you must ensure that either the FIFO file itself is located in secured location or set SocketMode to stricter value.

I spotted one such insecure use in cloud-init: the hotplug FIFO was world writable. This is CVE-2024-11584 and fixed in cloud-init 25.1.3.

The commit fixing this is in https://github.com/canonical/cloud-init/pull/6265

#CVE_2024_11584 #ubuntu #systemd #infosec #cybersecurity

view more: ‹ prev next ›