Qakbot Botnet Sprouts Fangs, Injects Malware into Email ThreadsThe ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.
APT41 Spies Broke Into 6 US State Networks via a Livestock AppThe China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to hack into multiple government networks.
Microsoft Patch Tuesday, March 2022 EditionMicrosoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users (that we know of), and relatively few "critical" fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here's a look at the security weaknesses Microsoft says are most likely to be targeted first.
Most ServiceNow Instances Misconfigured, ExposedCustomers aren't locking down access correctly, leading to ~70 percent of ServiceNow implementations being vulnerable to malicious data extraction.
Russian APTs Furiously Phish Ukraine – GoogleAlso on the rise: DDoS attacks against Ukrainian sites and phishing activity capitalizing on the conflict, with China's Mustang Panda targeting Europe.
Securing healthcare: An IT health check on the state of the sector
No sector or organization is immune to rapidly escalating cyberthreats, but when it comes to healthcare, the stakes couldn’t be higher
The post Securing healthcare: An IT health check on the state of the sector appeared first on WeLiveSecurity
Internet Backbone Giant Lumen Shuns .RULumen Technologies, an American company that operates one of the largest Internet backbones and carries a significant percentage of the world's Internet traffic, said today it will stop routing traffic for organizations based in Russia. Lumen's decision comes just days after a similar exit by backbone provider Cogent, and amid a news media crackdown in Russia that has already left millions of Russians in the dark about what is really going on with their president's war in Ukraine.
Microsoft Addresses 3 Zero-Days & 3 Critical Bugs for March Patch TuesdayThe computing giant patched 71 security vulnerabilities in an uncharacteristically light scheduled update, including its first Xbox bug.
The Uncertain Future of IT AutomationWhile IT automation is growing, big challenges remain. Chris Hass, director of information security and research at Automox, discusses how the future looks.
Zero-Click Flaws in Widely Used UPS Devices Threaten Critical InfratructureThe 'TLStorm' vulnerabilities, found in APC Smart-UPS products, could allow attackers to cause both cyber and physical damage by taking down critical infrastructure.
Bug in the Linux Kernel Allows Privilege Escalation, Container EscapeA missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel.
Conti Ransomware Group Diaries, Part IV: CryptocrimeThree stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti evaded law enforcement and intelligence agencies, what it was like on a typical day at the Conti office, and how Conti secured the digital weaponry used in their attacks. This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.
Novel Attack Turns Amazon Devices Against ThemselvesResearchers have discovered how to remotely manipulate the Amazon Echo through its own speakers.
Samsung Confirms Lapsus$ Ransomware Hit, Source Code LeakThe move comes just a week after GPU-maker NVIDIA was hit by Lapsus$ and every employee credential was leaked.
Nvidia’s Stolen Code-Signing Certs Used to Sign MalwareNvidia certificates are being used to sign malware, enabling malicious programs to pose as legitimate and slide past security safeguards on Windows machines.
Critical Firefox Zero-Day Bugs Allow RCE, Sandbox EscapeBoth vulnerabilities are use-after-free issues in Mozilla's popular web browser.
Cyber‑readiness in the face of an escalated gray zone conflict
Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large
The post Cyber‑readiness in the face of an escalated gray zone conflict appeared first on WeLiveSecurity
How the tech community has rallied to Ukraine’s cyber-defence | Joyce Hakmeh and Esther Naylor
From an army of volunteers to EU and Nato teams, the variety of online actors working for the cause is unprecedented
As the conflict in Ukraine escalates, expert cyber-watchers have been speculating about the kind of cyber-attacks that Russia might conduct. Will the Kremlin turn off Ukraine’s power grid, dismantle Ukraine’s transport system, cut off the water supply or target the health system? Or would cybercriminals operating from Russia, who could act as proxies for the Russian regime, conduct these activities?
Over the past decade, Ukraine has experienced many major cyber-attacks, most of which have been attributed to Russia. From election interference in 2014, which compromised the central electoral system and jeopardised the integrity of the democratic process; to a hack and blackout attack in a first-of-its-kind fully remote cyber-attack on a power grid in 2015, resulting in countrywide power outages; to one of the costliest malicious software attacks, NotPetya, in 2017, which significantly disrupted access to banking and government services in Ukraine and, subsequently, spilled over to France, Germany, Italy, Poland, Russia, the UK, the US and Australia.
Joyce Hakmeh is a senior research fellow for the International Security Programme at Chatham House. Esther Naylor is a research analyst at the International Security ProgrammeContinue reading...