Cybersecurity News


Anatomy of native IIS malware

ESET researchers publish a white paper putting IIS web server threats under the microscope

The post Anatomy of native IIS malware appeared first on WeLiveSecurity

06 August 2021

Black Hat: BadAlloc bugs expose millions of IoT devices to hijack

BadAlloc vulnerabilities impact millions of devices worldwide.
06 August 2021

HTTP/2 Implementation Errors Exposing Websites to Serious Risks

Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
05 August 2021

CISA Launches JCDC, the Joint Cyber Defense Collaborative

"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
05 August 2021

Black Hat: New CISA Head Woos Crowd With Public-Private Task Force

Black Hat: New CISA Head Woos Crowd With Public-Private Task Force Day two Black Hat keynote by CISA Director Jen Easterly includes launch of private-public partnership with Amazon, Google and Microsoft to fight cybercrime.
05 August 2021

Incident Responders Explore Microsoft 365 Attacks in the Wild

Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
05 August 2021

Black Hat: How cybersecurity incidents can become a legal minefield

Facing a cyberattack? Pick up the phone and talk to legal help as well as incident response.
05 August 2021

Auditors: Feds’ Cybersecurity Gets the Dunce Cap

Auditors: Feds’ Cybersecurity Gets the Dunce Cap Out of eight agencies, four were given D grades in a report for the Senate, while the Feds overall got a C-. 
05 August 2021

Black Hat: Enterprise players face 'one-two-punch' extortion in ransomware attacks

Intrusions have become even more costly to the enterprise due to double-extortion tactics.
05 August 2021

Researchers Find Significant Vulnerabilities in macOS Privacy Protections

Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
05 August 2021

A New Approach to Securing Authentication Systems' Core Secrets

Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
05 August 2021

MacOS Flaw in Telegram Retrieves Deleted Messages

MacOS Flaw in Telegram Retrieves Deleted Messages Telegram declined to fix a scenario in which the flaw can be exploited, spurring a Trustwave researcher to decline a bug bounty and to disclose his findings instead.
05 August 2021

Organizations Still Struggle to Hire & Retain Infosec Employees: Report

Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
05 August 2021

Is your personal information being abused?

Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major companies contributes to the deluge of nuisance emails, texts and phone calls.

The post Is your personal information being abused? appeared first on WeLiveSecurity

05 August 2021

Black Hat: Microsoft’s Patch for Windows Hello Bypass Bug is Faulty, Researchers Say

Black Hat: Microsoft’s Patch for Windows Hello Bypass Bug is Faulty, Researchers Say Researchers show how to circumvent Microsoft’s Windows Hello biometric authentication using a spoofed USB camera.
05 August 2021

Black Hat: Charming Kitten Leaves More Paw Prints

Black Hat: Charming Kitten  Leaves More Paw Prints IBM X-Force detailed the custom-made "LittleLooter" data stealer and 4+ hours of ITG18 operator training videos revealed by an opsec goof.
05 August 2021

The Importance of Properly Scoping Cloud Environments


PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) recently released a joint industry threat bulletin highlighting the importance of properly scoping cloud environments. In this blog, the PCI SSC and CSA share guidance and best practices for properly scoping cloud environments.

05 August 2021

Why Supply Chain Attacks Are Destined to Escalate

In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
05 August 2021

Ransomware Gangs and the Name Game Distraction

It's nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. We hang on to these occasional victories because history tells us that most ransomware moneymaking collectives don't go away so much as reinvent themselves under a new name, with new rules, targets and weaponry. Indeed, some of the most destructive and costly ransomware groups are now in their third incarnation over as many years. Reinvention is a basic survival skill in the cybercrime business. Among the oldest tricks in the book is to fake one's demise or retirement and invent a new identity. A key goal of such subterfuge is to throw investigators off the scent or to temporarily direct their attention elsewhere. Cybercriminal syndicates also perform similar disappearing acts whenever it suits them. These organizational reboots are an opportunity for ransomware program leaders to set new ground rules for their members -- such as which types of victims aren't allowed (e.g., hospitals, governments, critical infrastructure), or how much of a ransom payment an affiliate should expect for bringing the group access to a new victim network.
05 August 2021

There's been a rise in stalkerware. And the tech abuse problem goes beyond smartphones

No matter how stalkerware is marketed, it is part of a wider problem: the use of technology in coercive control.
05 August 2021