Port 22

How Cyber Sleuths Cracked an ATM Shimmer Gang
June 23, 2021

In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to clone data from chip card transactions. Authorities in the United States and abroad had seized many of these shimmers, but for years couldn’t decrypt the data on the devices. This is a story of ingenuity and happenstance, and how one former Secret Service agent helped crack a code that revealed the contours of a global organized crime ring.

How to confuse antimalware neural networks. Adversarial attacks and protection
June 23, 2021

ybersecurity companies implement a variety of methods to discover previously unknown malware files. Machine learning (ML) is a powerful and widely used approach for this task. But can we rely entirely on machine learning approaches in the battle with the bad guys? Or could powerful AI itself be vulnerable?

Pakistan-linked hackers targeted Indian power company with ReverseRat
June 23, 2021

A threat actor with suspected ties to Pakistan has been striking government and energy organizations in the South and Central Asia regions to deploy a remote access trojan on compromised Windows systems, according to new research. “Most of the organizations that exhibited signs of compromise were in India, and a small number were in Afghanistan,” Lumen’s Black Lotus Labssaidin a Tuesday

[Whitepaper] Automate Your Security with Cynet to Protect from Ransomware
June 23, 2021

It seems like every new day brings with it a new ransomware news item new attacks, methods, horror stories, and data being leaked. Ransomware attacks are on the rise, and they’ve become a major issue for organizations across industries. A recent report estimated that by 2031, ransomware attacks would cost the world over $260 billion. A new whitepaper from XDR provider Cynet demonstrates how

Patch Tor Browser Bug to Prevent Tracking of Your Online Activities
June 23, 2021

Open-source Tor browser has been updated to version 10.0.18 with fixes for multiple issues, including a privacy-defeating bug that could be used to uniquely fingerprint users across different browsers based on the apps installed on a computer. In addition toupdatingTor to 0.4.5.9, the browser’s Android version has been upgraded to Firefox to version 89.1.1, alongside incorporating patches

SonicWall Left a VPN Flaw Partially Unpatched Amidst 0-Day Attacks
June 22, 2021

A critical vulnerability in SonicWall VPN appliances that was believed to have been patched last year has been now found to be “botched,” with the company leaving a memory leak flaw unaddressed, until now, that could permit a remote attacker to gain access to sensitive information. The shortcoming was rectified in an update rolled out to SonicOS on June 22. Tracked asCVE-2021-20019(CVSS score

Unpatched Supply-Chain Flaw Affects 'Pling Store' Platforms for Linux Users
June 22, 2021

Cybersecurity researchers have disclosed a critical unpatched vulnerability affecting Pling-based free and open-source software (FOSS) marketplaces for Linux platform that could be potentially abused to stage supply chain attacks and achieve remote code execution (RCE). “Linux marketplaces that are based on the Pling platform are vulnerable to a wormable [cross-site scripting] with potential for

Behind the scenes with the head of Kasperskys GReAT
June 22, 2021

Costin Raiu has been with Kaspersky since 2000. In 2010, he became Director of our Global Research and Analysis Team (GReAT). In our interview with Costin, he spoke about the job of a security researcher, its challenges and advantages, and offered some advice for newcomers to cybersecurity.

Wormable DarkRadiation Ransomware Targets Linux and Docker Instances
June 22, 2021

Cybersecurity researchers have disclosed a new ransomware strain called “DarkRadiation” that’s implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications. “The ransomware is written inBashscript and targets Red Hat/CentOS and Debian Linux distributions,” researchers from Trend Microsaidin

NVIDIA Jetson Chipsets Found Vulnerable to High-severity Flaws
June 22, 2021

U.S. graphics chip specialist NVIDIA has releasedsoftware updatesto address a total of 26 vulnerabilities impacting its Jetson system-on-module (SOM) series that could be abused by adversaries to escalate privileges and even lead to denial-of-service and information disclosure. <!–adsense–> Tracked from CVE202134372 through CVE202134397, the flaws affect products Jetson TX1, TX2 series,

How Cyber Safe is Your Drinking Water Supply?
June 21, 2021

Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven’t inventoried some or any of their information technology systems – a basic first step in protecting networks from cyberattacks.

5 Critical Steps to Recovering From a Ransomware Attack
June 21, 2021

Hackers are increasingly using ransomware as an effective tool to disrupt businesses and fund malicious activities. A recent analysis by cybersecurity company Group-IB revealedransomware attacks doubled in 2020, while Cybersecurity Venture predicts that aransomware attack will occur every 11 secondsin 2021. Businesses must prepare for the possibility of a ransomware attack affecting their

DroidMorph Shows Popular Android Antivirus Fail to Detect Cloned Malicious Apps
June 21, 2021

A new research published by a group of academics has found that anti-virus programs for Android continue to remain vulnerable against different permutations of malware, in what could pose a serious risk as malicious actors evolve their toolsets to better evade analysis. “Malware writers use stealthy mutations (morphing/obfuscations) to continuously develop malware clones, thwarting detection by

Beware! Connecting to This Wireless Network Can Break Your iPhone's Wi-Fi Feature
June 21, 2021

A wireless network naming bug has been discovered in Apple’s iOS operating system that effectively disables an iPhone’s ability to connect to a Wi-Fi network. The issue was spotted by security researcherCarl Schou, who found that the phone’s Wi-Fi functionality gets permanently disabled after joining a Wi-Fi network with the unusual name “%p%s%s%s%s%n” even after rebooting the phone or changing

North Korea Exploited VPN Flaw to Hack South's Nuclear Research Institute
June 18, 2021

South Korea’s state-run Korea Atomic Energy Research Institute (KAERI) on Friday disclosed that its internal network was infiltrated by suspected attackers operating out of its northern counterpart. The intrusion is said to have taken place on May 14 through a vulnerability in an unnamed virtual private network (VPN) vendor and involved atotal of 13 IP addresses, one of which “27.102.114[.]89

Cyber espionage by Chinese hackers in neighbouring nations is on the rise
June 18, 2021

A string of cyber espionage campaigns dating all the way back to 2014 and focused on gathering military intelligence from neighbouring countries have been linked to a Chinese military-intelligence apparatus. In a wide-ranging report published by Massachusetts-headquartered Recorded Future this week, the cybersecurity firm’s Insikt Group said it identified ties between a group it tracks as “

First American Financial Pays Farcical $500K Fine
June 18, 2021

In May 2019, KrebsOnSecurity broke the news that the website of mortgage settlement giant First American Financial Corp. [NYSE:FAF] was leaking more than 800 million documents – many containing sensitive financial data – related to real estate transactions dating back more than 16 years. This week, the U.S. Securities and Exchange Commission settled its investigation into the matter after the Fortune 500 company agreed to pay a paltry penalty of less than $500,000.

Page 1 of 13 Older Posts →