Daily NCSC-FI news followup 2019-08-29

Critical Cisco VM Bug Allows Remote Takeover of Routers

threatpost.com/critical-cisco-bug-remote-takeover-routers/147826/

Five More Hackers Become Millionaires on HackerOne

www.bleepingcomputer.com/news/security/five-more-hackers-become-millionaires-on-hackerone/

Google adds all Android apps with +100m installs to its bug bounty program

www.zdnet.com/article/google-adds-all-android-apps-with-100m-installs-to-its-bug-bounty-program/

Google Targets Data-Abusing Apps with Bug Bounty Launch

threatpost.com/google-targets-data-abusing-apps-bug-bounty/147825/

Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem

www.darkreading.com/vulnerabilities—threats/vulnerability-management/bug-bounties-continue-to-rise-but-market-has-its-own-1–problem/d/d-id/1335689 The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.. Of the more than half-million hackers that have signed up for a HackerOne-managed challenge, only about 5,000 are really doing well, says CEO Marten Mickos.

Microsoft: We’re detecting 5 billion cybersecurity threats on devices a month

www.zdnet.com/article/microsoft-were-detecting-5-billion-cybersecurity-threats-on-devices-a-month/ Microsoft offers a new snapshot of the data that feeds into its Intelligence Security Graph.

U.S. Cyberattack Hurt Irans Ability to Target Oil Tankers, Officials Say

www.nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html

Inside the APT28 DLL Backdoor Blitz

threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html We perform a deep dive into the same APT28 sample by analyzing its capabilities and providing insight into its features.

Heatstroke Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information

blog.trendmicro.com/trendlabs-security-intelligence/heatstroke-campaign-uses-multistage-phishing-attack-to-steal-paypal-and-credit-card-information/

Threat Actor ITG08 (aka Fin6) is actively attacking multinational organizations, targeting specific employees with spear phishing emails advertising fake job advertisements and repeatedly deploying malware

securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/

Huawei plans high-end phone launch under cloud of Google ban

www.reuters.com/article/us-huawei-tech-alphabet-idUSKCN1VI240 ARM severed relations with Huawei after the U.S. ban because its designs contain technology of U.S. origin. . Huawei last week said it has perpetual ownership of the ARMv8 license and chips based on it would not be affected by the ban.

Google to shift Pixel smartphone production from China to Vietnam

asia.nikkei.com/Spotlight/Tech-scroll-Asia/Google-to-shift-Pixel-smartphone-production-from-China-to-Vietnam

PerCSoft, a company that manages a remote data backup for dental offices across the US, is struggling to restore access to client systems after falling victim to a ransomware attack.

krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/

Small governments make up two-thirds of ransomware infection victims observed by researches

www.theregister.co.uk/2019/08/28/ransomware_government_attacks/

Attackers Target Govt and Financial Orgs With Orcus, Revenge RATs

www.bleepingcomputer.com/news/security/attackers-target-govt-and-financial-orgs-with-orcus-revenge-rats/

Starbucks Abandons Azure Site, Exposed Subdomain to Hijacking

www.bleepingcomputer.com/news/security/starbucks-abandons-azure-site-exposed-subdomain-to-hijacking/

Wi-Fi 6 Will Be Here Soon. What Is It?

www.wired.com/story/what-is-wi-fi-6/ The new standard promises to improve the speed and reliability of your home Wi-Fi network. And it arrives as soon as this fall.

ICS Design: IT, OT and Control Systems

icsmodel.infracritical.com/

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.