Daily NCSC-FI news followup 2019-08-29

Critical Cisco VM Bug Allows Remote Takeover of Routers

threatpost.com/critical-cisco-bug-remote-takeover-routers/147826/

Five More Hackers Become Millionaires on HackerOne

www.bleepingcomputer.com/news/security/five-more-hackers-become-millionaires-on-hackerone/

Google adds all Android apps with +100m installs to its bug bounty program

www.zdnet.com/article/google-adds-all-android-apps-with-100m-installs-to-its-bug-bounty-program/

Google Targets Data-Abusing Apps with Bug Bounty Launch

threatpost.com/google-targets-data-abusing-apps-bug-bounty/147825/

Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem

www.darkreading.com/vulnerabilities—threats/vulnerability-management/bug-bounties-continue-to-rise-but-market-has-its-own-1–problem/d/d-id/1335689 The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.. Of the more than half-million hackers that have signed up for a HackerOne-managed challenge, only about 5,000 are really doing well, says CEO Marten Mickos.

Microsoft: We’re detecting 5 billion cybersecurity threats on devices a month

www.zdnet.com/article/microsoft-were-detecting-5-billion-cybersecurity-threats-on-devices-a-month/ Microsoft offers a new snapshot of the data that feeds into its Intelligence Security Graph.

U.S. Cyberattack Hurt Irans Ability to Target Oil Tankers, Officials Say

www.nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html

Inside the APT28 DLL Backdoor Blitz

threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html We perform a deep dive into the same APT28 sample by analyzing its capabilities and providing insight into its features.

Heatstroke Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information

blog.trendmicro.com/trendlabs-security-intelligence/heatstroke-campaign-uses-multistage-phishing-attack-to-steal-paypal-and-credit-card-information/

Threat Actor ITG08 (aka Fin6) is actively attacking multinational organizations, targeting specific employees with spear phishing emails advertising fake job advertisements and repeatedly deploying malware

securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/

Huawei plans high-end phone launch under cloud of Google ban

www.reuters.com/article/us-huawei-tech-alphabet-idUSKCN1VI240 ARM severed relations with Huawei after the U.S. ban because its designs contain technology of U.S. origin. . Huawei last week said it has perpetual ownership of the ARMv8 license and chips based on it would not be affected by the ban.

Google to shift Pixel smartphone production from China to Vietnam

asia.nikkei.com/Spotlight/Tech-scroll-Asia/Google-to-shift-Pixel-smartphone-production-from-China-to-Vietnam

PerCSoft, a company that manages a remote data backup for dental offices across the US, is struggling to restore access to client systems after falling victim to a ransomware attack.

krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/

Small governments make up two-thirds of ransomware infection victims observed by researches

www.theregister.co.uk/2019/08/28/ransomware_government_attacks/

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs

www.bleepingcomputer.com/news/security/attackers-target-govt-and-financial-orgs-with-orcus-revenge-rats/

Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking

www.bleepingcomputer.com/news/security/starbucks-abandons-azure-site-exposed-subdomain-to-hijacking/

Wi-Fi 6 Will Be Here Soon. What Is It?

www.wired.com/story/what-is-wi-fi-6/ The new standard promises to improve the speed and reliability of your home Wi-Fi network. And it arrives as soon as this fall.

ICS Design: IT, OT and Control Systems

icsmodel.infracritical.com/

You might be interested in …

Daily NCSC-FI news followup 2019-11-28

Threat Spotlight: Machete Info-Stealer threatvector.cylance.com/en_us/home/threat-spotlight-machete-info-stealer.html Machete is an info-stealing malware that can harvest user credentials, chat logs, screenshots, webcam pictures, geolocation, and perform keylogging. It can also copy files to a USB device and take control of the clipboard to exfiltrate information. DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy www.schneier.com/blog/archives/2019/11/dhs_mandates_fe.html The DHS is […]

Read More

Daily NCSC-FI news followup 2021-01-13

Cloud Threat Hunting: Attack & Investigation Series- Lateral Movement Under the Radar blog.checkpoint.com/2021/01/13/cloud-threat-hunting-attack-investigation-series-lateral-movement-under-the-radar/ A sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge of many techniques. In this latest installation of the Cloud Threat Hunting: Attack and Investigation Series, we present the most […]

Read More

Daily NCSC-FI news followup 2019-10-11

Hakkeriryhmä testasi Jyväskylän yliopiston tietoturvaa www.jyu.fi/fi/ajankohtaista/arkisto/2019/10/hakkeriryhma-testasi-jyvaskylan-yliopiston-tietoturvaa Useiden Jyväskylän yliopiston tietojärjestelmien tietoturvaa testattiin syyskuussa normaalista poikkeavalla tavalla, kun valkohattuhakkeriryhmä Team ROT etsi niistä tietoturvaongelmia toteuttamassaan tietoturvatestauksessa.. Tietoturvatestaus toteutettiin viikonlopun aikana niin, että se haittasi mahdollisimman vähän yliopiston normaalia toimintaa. Testaajilla ei ollut fyysistä pääsyä yliopiston järjestelmiin, vaan yhteys niihin muodostettiin etäältä avoimen verkon kautta juuri niin […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.