Cybersecurity News
2021 in review: The biggest cybersecurity stories of the year
As we close out another year like no other, let's look back at some of the most notable cybersecurity stories that shaped 2021
The post 2021 in review: The biggest cybersecurity stories of the year appeared first on WeLiveSecurity
4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code

Telegram Abused to Steal Crypto-Wallet Credentials

‘Spider-Man: No Way Home’ Download Installs Cryptominer

PYSA Emerges as Top Ransomware Actor in November

All in One SEO Plugin Bug Threatens 3M Websites with Takeovers

Critical Apache HTTPD Server Bugs Could Lead to RCE, DoS

Four Bugs in Microsoft Teams Left Platform Vulnerable Since March

This holiday season, give your children the gift of cybersecurity awareness
Don't leave your kids to their own devices – give them a head start with staying safe online instead
The post This holiday season, give your children the gift of cybersecurity awareness appeared first on WeLiveSecurity
Time to Ditch Big-Brother Accounts for Network Scanning

Java Code Repository Riddled with Hidden Log4j Bugs; Here’s Where to Look

Half-Billion Compromised Credentials Lurking on Open Cloud Server

Two Active Directory Bugs Lead to Easy Windows Domain Takeover

FBI: Another Zoho ManageEngine Zero-Day Under Active Attack

Conti Ransomware Gang Has Full Log4Shell Attack Chain

Robocalls More Than Doubled in 2021, Cost Victims $30B

Third Log4J Bug Can Trigger DoS; Apache Issues Patch

Don’t forget to unplug your devices before you leave for the holidays!
As you down tools for the holiday season, be sure to also switch off the standby lights – it’s both cost effective and better for the environment
The post Don’t forget to unplug your devices before you leave for the holidays! appeared first on WeLiveSecurity
UN-backed investigator into possible Yemen war crimes targeted by spyware

Analysis of Kamel Jendoubi’s mobile phone reveals he was targeted in August 2019
The mobile phone of a UN-backed investigator who was examining possible war crimes in Yemen was targeted with spyware made by Israel’s NSO Group, a new forensic analysis of the device has revealed.
Kamel Jendoubi, a Tunisian who served as the chairman of the now defunct Group of Eminent Experts in Yemen (GEE)– a panel mandated by the UN to investigate possible war crimes – was targeted in August 2019, according to an analysis of his mobile phone by experts at Amnesty International and the Citizen Lab at the University of Toronto.
Continue reading...How cut-and-pasted programming is putting the internet and society at risk | John Naughton

A vulnerability has been exposed in Minecraft, the bestselling video game of all time – and the security implications outside the world of gaming are vast
In one of those delicious coincidences that warm the cockles of every tech columnist’s heart, in the same week that the entire internet community was scrambling to patch a glaring vulnerability that affects countless millions of web servers across the world, the UK government announced a grand new National Cyber Security Strategy that, even if actually implemented, would have been largely irrelevant to the crisis at hand.
Initially, it looked like a prank in the amazingly popular Minecraft game. If someone inserted an apparently meaningless string of characters into a conversation in the game’s chat, it would have the effect of taking over the server on which it was running and download some malware that could then have the capacity to do all kinds of nefarious things. Since Minecraft (now owned by Microsoft) is the best-selling video game of all time (more than 238m copies sold and 140 million monthly active users), this vulnerability was obviously worrying, but hey, it’s only a video game…
Continue reading...