Daily NCSC-FI news followup 2019-08-29

Critical Cisco VM Bug Allows Remote Takeover of Routers

threatpost.com/critical-cisco-bug-remote-takeover-routers/147826/

Five More Hackers Become Millionaires on HackerOne

www.bleepingcomputer.com/news/security/five-more-hackers-become-millionaires-on-hackerone/

Google adds all Android apps with +100m installs to its bug bounty program

www.zdnet.com/article/google-adds-all-android-apps-with-100m-installs-to-its-bug-bounty-program/

Google Targets Data-Abusing Apps with Bug Bounty Launch

threatpost.com/google-targets-data-abusing-apps-bug-bounty/147825/

Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem

www.darkreading.com/vulnerabilities—threats/vulnerability-management/bug-bounties-continue-to-rise-but-market-has-its-own-1–problem/d/d-id/1335689 The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.. Of the more than half-million hackers that have signed up for a HackerOne-managed challenge, only about 5,000 are really doing well, says CEO Marten Mickos.

Microsoft: We’re detecting 5 billion cybersecurity threats on devices a month

www.zdnet.com/article/microsoft-were-detecting-5-billion-cybersecurity-threats-on-devices-a-month/ Microsoft offers a new snapshot of the data that feeds into its Intelligence Security Graph.

U.S. Cyberattack Hurt Irans Ability to Target Oil Tankers, Officials Say

www.nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html

Inside the APT28 DLL Backdoor Blitz

threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html We perform a deep dive into the same APT28 sample by analyzing its capabilities and providing insight into its features.

Heatstroke Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information

blog.trendmicro.com/trendlabs-security-intelligence/heatstroke-campaign-uses-multistage-phishing-attack-to-steal-paypal-and-credit-card-information/

Threat Actor ITG08 (aka Fin6) is actively attacking multinational organizations, targeting specific employees with spear phishing emails advertising fake job advertisements and repeatedly deploying malware

securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/

Huawei plans high-end phone launch under cloud of Google ban

www.reuters.com/article/us-huawei-tech-alphabet-idUSKCN1VI240 ARM severed relations with Huawei after the U.S. ban because its designs contain technology of U.S. origin. . Huawei last week said it has perpetual ownership of the ARMv8 license and chips based on it would not be affected by the ban.

Google to shift Pixel smartphone production from China to Vietnam

asia.nikkei.com/Spotlight/Tech-scroll-Asia/Google-to-shift-Pixel-smartphone-production-from-China-to-Vietnam

PerCSoft, a company that manages a remote data backup for dental offices across the US, is struggling to restore access to client systems after falling victim to a ransomware attack.

krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/

Small governments make up two-thirds of ransomware infection victims observed by researches

www.theregister.co.uk/2019/08/28/ransomware_government_attacks/

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs

www.bleepingcomputer.com/news/security/attackers-target-govt-and-financial-orgs-with-orcus-revenge-rats/

Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking

www.bleepingcomputer.com/news/security/starbucks-abandons-azure-site-exposed-subdomain-to-hijacking/

Wi-Fi 6 Will Be Here Soon. What Is It?

www.wired.com/story/what-is-wi-fi-6/ The new standard promises to improve the speed and reliability of your home Wi-Fi network. And it arrives as soon as this fall.

ICS Design: IT, OT and Control Systems

icsmodel.infracritical.com/

You might be interested in …

Daily NCSC-FI news followup 2020-09-25

Microsoft boots apps out of Azure used by China-sponsored hackers arstechnica.com/information-technology/2020/09/microsoft-boots-apps-used-by-china-sponsored-hackers-out-of-azure/ Active Directory apps used for command-and-control infrastructure are no more. Report: www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/ Feds Hit with Successful Cyberattack, Data Stolen threatpost.com/feds-cyberattack-data-stolen/159541/ The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit. FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations thehackernews.com/2020/09/finspy-malware-macos-linux.html […]

Read More

Daily NCSC-FI news followup 2019-08-06

QualPwn Bugs In Snapdragon SoC Can Attack Android Over the Air www.bleepingcomputer.com/news/security/qualpwn-bugs-in-snapdragon-soc-can-attack-android-over-the-air/ Two serious vulnerabilities in Qualcomm’s Snapdragon system-on-a-chip (SoC) WLAN firmware could be leveraged to compromise the modem and the Android kernel over the air.. The flaws were found in Qualcomm’s Snapdragon 835 and 845 WLAN component. The tests were made on Google Pixel […]

Read More

Daily NCSC-FI news followup 2019-08-24

Kyberhyökkäykset ravistelevat suomalaiskuntia Tampere: “Harjoittelemme säännöllisesti” www.tivi.fi/uutiset/tv/d884768a-4cba-4abb-b990-64620669935d Sähköpostihuijareiden toimintatapoja tarkemmin – eiliseen 80 huijarin kiinniottoon liittyvä analyysi garwarner.blogspot.com/2019/08/los-angeles-court-charges-80-nigerians.html Fortnite-pelin huijausohjelma sisältääkin haittaohjelman ja vaatii lunnaat www.kaspersky.com/blog/ransomware-in-fortnite-cheats/28104/ FireEyen tuore raportti sote-sektorin toistuvasta kohdennuksesta ja altistumisesta tietovuodoille www.fireeye.com/blog/threat-research/2019/08/healthcare-research-data-pii-continuously-targeted-by-multiple-threat-actors.html Facebook jakoi vuosittaisen Internet Defence Prize -palkintonsa saksalaisille tutkijoille: 100’000 USD uudesta suojausmekanismista. www.zdnet.com/article/facebook-awards-100000-prize-for-new-code-isolation-technique/ Esineiden internet: älyuunit päälle keskellä […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.