Cybersecurity News
SMB Security Catches Up to Large Companies, Data Shows
Small and midsize businesses face issues similar to those of large organizations and have updated security practices to respond with threat hunting, patch management, and dedicated personnel.How InfoSec Pros Can Help Healthcare During the Coronavirus Pandemic

Attackers Exploit SaltStack Flaws to Compromise Open Source OS & Blogging Platform
Intruders gained access to core systems at the Android-based LineageOS project and the Ghost platform.Hackers Exploit Critical Flaw in Ghost Platform with Cryptojacking Attack

Zoom Installers Used to Spread WebMonitor RAT
Researchers warn the installers are legitimate but don't come from official sources of the Zoom app, including the Apple App Store and Google Play.Government investigates data breach revealing details of 774,000 migrants

Guardian Australia on Sunday revealed SkillSelect app allowed users to see partial names of applicants for skilled visas
The home affairs and employment departments are investigating a data breach revealing the personal details of 774,000 migrants and people aspiring to migrate to Australia, despite playing down the seriousness of the breach.
On Sunday, Guardian Australia revealed the government’s SkillSelect app allowed users to see unique identifiers of applicants for skilled visas, including partial names, which could then be used through searches with multiple filters to reveal other information about applicants.
Related: Immigrants don't take Australian jobs. They create jobs for others | Jock Collins
Continue reading...Academics turn PC power units into speakers to leak secrets from air-gapped systems
POWER-SUPPLaY technique uses "singing capacitor" phenomenon for data exfiltration.Microsoft warns of multiple malspam campaigns carrying malicious disk image files
Microsoft: Threat group uses malware-laced ISO and IMG files to infect companies with a remote access trojan.Oracle: Unpatched Versions of WebLogic App Server Under Active Attack

Ghost blogging platform servers hacked to mine cryptocurrency
Ghost wasn’t the only victim of break-ins over the weekend that exploited critical holes in infrastructure automation software for which patches were available
The post Ghost blogging platform servers hacked to mine cryptocurrency appeared first on WeLiveSecurity
The Cybersecurity Hiring Conundrum: Youth vs. Experience
How working together across the spectrum of young to old makes our organizations more secure.Beware of Online Skimming Threats During the COVID-19 Crisis
PCI SSC and the U.S. Chamber of Commerce shares guidance and information on protecting against online skimming attacks in the face of the COVID-19 crisis.
7 Tips for Security Pros Patching in a Pandemic

Hackers are targeting UK universities to steal coronavirus research, NCSC warns
State-sponsored hackers from Russia, Iran, and China are suspected.CursedChrome turns your browser into a hacker's proxy
CursedChrome shows how hackers can take full control over your Chrome browser using just one extension.Ghost blogging platform servers hacked and infected with crypto-miner
Ghost platform got hacked via the same vulnerability that allowed hackers to breach LineageOS servers hours before.Hackers breach LineageOS servers via unpatched vulnerability
LineageOS source code, OS builds, and signing keys were unaffected, developers said.UK NCSC to stop using 'whitelist' and 'blacklist' due to racial stereotyping
UK cyber-security agency to use "allow list" and "deny list" on its website, going forward.Hacker leaks 15 million records from Tokopedia, Indonesia's largest online store
The Tokopedia data has been published on a well-known hacking forum.Upgraded Cerberus Spyware Spreads Rapidly via MDM
