Daily NCSC-FI news followup 2019-08-29

Critical Cisco VM Bug Allows Remote Takeover of Routers


Five More Hackers Become Millionaires on HackerOne


Google adds all Android apps with +100m installs to its bug bounty program


Google Targets Data-Abusing Apps with Bug Bounty Launch


Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem

www.darkreading.com/vulnerabilities—threats/vulnerability-management/bug-bounties-continue-to-rise-but-market-has-its-own-1–problem/d/d-id/1335689 The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.. Of the more than half-million hackers that have signed up for a HackerOne-managed challenge, only about 5,000 are really doing well, says CEO Marten Mickos.

Microsoft: We’re detecting 5 billion cybersecurity threats on devices a month

www.zdnet.com/article/microsoft-were-detecting-5-billion-cybersecurity-threats-on-devices-a-month/ Microsoft offers a new snapshot of the data that feeds into its Intelligence Security Graph.

U.S. Cyberattack Hurt Irans Ability to Target Oil Tankers, Officials Say


Inside the APT28 DLL Backdoor Blitz

threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html We perform a deep dive into the same APT28 sample by analyzing its capabilities and providing insight into its features.

Heatstroke Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information


Threat Actor ITG08 (aka Fin6) is actively attacking multinational organizations, targeting specific employees with spear phishing emails advertising fake job advertisements and repeatedly deploying malware


Huawei plans high-end phone launch under cloud of Google ban

www.reuters.com/article/us-huawei-tech-alphabet-idUSKCN1VI240 ARM severed relations with Huawei after the U.S. ban because its designs contain technology of U.S. origin. . Huawei last week said it has perpetual ownership of the ARMv8 license and chips based on it would not be affected by the ban.

Google to shift Pixel smartphone production from China to Vietnam


PerCSoft, a company that manages a remote data backup for dental offices across the US, is struggling to restore access to client systems after falling victim to a ransomware attack.


Small governments make up two-thirds of ransomware infection victims observed by researches


Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs


Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking


Wi-Fi 6 Will Be Here Soon. What Is It?

www.wired.com/story/what-is-wi-fi-6/ The new standard promises to improve the speed and reliability of your home Wi-Fi network. And it arrives as soon as this fall.

ICS Design: IT, OT and Control Systems


You might be interested in …

Daily NCSC-FI news followup 2020-12-17

Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations – Alert (AA20-352A) us-cert.cisa.gov/ncas/alerts/aa20-352a The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor […]

Read More

Daily NCSC-FI news followup 2020-04-11

How Apple and Google Are Enabling Covid-19 Contact-Tracing www.wired.com/story/apple-google-bluetooth-contact-tracing-covid-19/ The tech giants have teamed up to use a Bluetooth-based framework to keep track of the spread of infections without compromising location privacy. The Challenge of Proximity Apps For COVID-19 Contact Tracing www.eff.org/deeplinks/2020/04/challenge-proximity-apps-covid-19-contact-tracing Around the world, a diverse and growing chorus is calling for the use […]

Read More

Daily NCSC-FI news followup 2019-11-04

Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more www.theregister.co.uk/2019/11/04/security_roundup_november1/ Including Spanish camgirl sites spill info, domain registrars hacked Happy Birthday, CVE! Naked Security nationalcybersecurity.com/happy-birthday-cve-naked-security/ It was October 1999. Macs had just got embedded Wi-Fi, Napster had launched, and Yahoo had purchased Geocities for $3.6bn. Something else happened that escaped most computer […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.