Daily NCSC-FI news followup 2020-03-09

A vulnerability is Microsoft Exchange servers is being actively exploited by multiple APT groups, researchers warn.

threatpost.com/microsoft-exchange-server-flaw-exploited-in-apt-attacks/153527/ Multiple threat groups are actively exploiting a vulnerability in Microsoft Exchange servers, researchers warn. If left unpatched, the flaw allows authenticated attackers to execute code remotely with system privileges.. see also


ENTSO-E: cyber intrusion on its office network

www.fingrid.fi/en/pages/news/news/2020/entso-e-cyber-intrusion-on-its-e-office-network/ European Network of Transmission System Operations for Electricity ENTSO-E has informed that some of their IT systems had been subjected to a security attack.. The attack was not directed against Fingrid or other transmission system operators, and it didn’t have any influence on Fingrids customers or other stakeholders.

Terve epäluulo suojaa parhaiten petosrikoksilta

www.poliisi.fi/tietoa_poliisista/tiedotteet/1/1/terve_epaluulo_suojaa_parhaiten_petosrikoksilta_88476?language=fi Rikolliset osaavat häikäilemättä käyttää hyväkseen ihmisten luontaista uskoa hyvään ja toivetta nopeaan vaurastumiseen. Petosrikollisuudelta parhaiten suojaakin usein terve epäluulo.

New Variant of TrickBot Being Spread by Word Document

www.fortinet.com/blog/threat-research/new-variant-of-trickbot-being-spread-by-word-document.html Recently, FortiGuard Labs captured an MS Office Word sample in the wild that is spreading a new variant of TrickBot. I did an analysis on this sample file, and in this post I will explain how it works on the victims machine.

AMD Downplays CPU Threat Opening Chips to Data Leak Attacks

threatpost.com/amd-downplays-cpu-threat-opening-chips-to-data-leak-attacks/153516/ New side-channel attacks have been disclosed in AMD CPUs, however AMD said that they are not new.

Check Point chap: Small firms don’t invest in infosec then hope they won’t get hacked. Spoiler alert: They get hacked

www.theregister.co.uk/2020/03/09/check_point_interview/ One vendor’s security controls aren’t enough, says Dan Wiley

Twitter First: Trump Video Retweet Tagged as ‘Manipulated Media’

www.bleepingcomputer.com/news/security/twitter-first-trump-video-retweet-tagged-as-manipulated-media/ For the first time, Twitter has labeled a video as ‘Manipulated Media’ that attempts to portray Joe Biden as stating that Donald Trump should be re-elected.

Top Tips for Secure Remote Working

blog.checkpoint.com/2020/03/09/top-tips-for-secure-remote-working/ Practical tips to enable employees to work safely from home during the Coronavirus outbreak

International Womens Day: awareness of stalkerware, monitoring, and spyware apps on the rise


Crescendo: Real Time Event Viewer for macOS


You might be interested in …

Daily NCSC-FI news followup 2021-04-06

Spy Operations Target Vietnam with Sophisticated RAT threatpost.com/spy-operations-vietnam-rat/165243/ An advanced cyberespionage campaign targeting government and military entities in Vietnam has been discovered that delivered a remote-access tool (RAT) for carrying out espionage operations, researchers said. Further analysis suggested that this campaign was conducted by a group related to a Chinese-speaking advanced persistent threat (APT) known […]

Read More

Daily NCSC-FI news followup 2019-07-22

Fuzz rising www.cloudatomiclab.com/fuzz/ – From the Debian stats, of the billion or so lines of code, 43% is ANSI C and 24% is C++ which has many of the same problems in many codebases. So 670 million lines of code, in general without enough maintainers to deal with the existing and coming waves of security […]

Read More

Daily NCSC-FI news followup 2020-08-08

Small and mediumsized businesses: Big targets for ransomware attacks www.welivesecurity.com/2020/08/07/small-medium-sized-businesses-big-targets-ransomware-attacks/ Why are SMBs a target for ransomware-wielding gangs and what can they do to protect themselves against cyber-extortion?. While large enterprises may present themselves as more lucrative prey, SMBs are an attractive target due to their lack of resources to defend against such attacks. Iranians, […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.