Daily NCSC-FI news followup 2020-07-03

New Apple macOS Big Sur feature to hamper adware operations

www.zdnet.com/article/new-apple-macos-big-sur-feature-to-hamper-adware-operations/#ftag=RSSbaffb68 Apple has disabled the ability to silently install macOS profiles from the CLI in macOS 11, a measure that was widely employed by adware and malware gangs.

Windows 10: Microsoft Defender ATP now rates your security configurations

www.zdnet.com/article/windows-10-microsoft-defender-atp-now-rates-your-security-configurations/#ftag=RSSbaffb68 New Microsoft Defender ATP service will help weed out unneeded administrator accounts before attackers find them.. Microsoft Defender Advanced Threat Protection (ATP) now gives your devices and network a security score that tells admins the health of their environment based on how it’s configured.

LinkedIn says iOS clipboard snooping after every key press is a bug, will fix

www.zdnet.com/article/linkedin-says-ios-clipboard-snooping-after-every-key-press-is-a-bug-will-fix/#ftag=RSSbaffb68 In a video shared on Twitter, the Urspace developer showed how LinkedIn’s app was reading the clipboard content after every user key press, even accessing the shared clipboard feature that allows iOS apps to read content from a user’s macOS clipboard.

Syytös Teliaa vastaan: Asiakkaiden reitittimet kaapattavissa Ei koske Suomea

www.is.fi/digitoday/tietoturva/art-2000006561336.html?ref=rss Teleoperaattori Telia selvittää kummallista haavoittuvuusraporttia, joka julkaistiin verkossa kesäkuun lopussa. Raportin mukaan Telian liettualaisten asiakkaiden reitittimet on mahdollista kaapata ja luoda niistä Liettuan voimakkain, pysyvin ja huomaamattomin bottiverkko.

Building Security Strategies in Sub-Saharan Africa: Trends and Concerns

www.darkreading.com/operations/building-security-strategies-in-sub-saharan-africa-trends-and-concerns/d/d-id/1338276 IDC data shows sub-Saharan Africa’s ICT market is predicted to grow from $95.4 billion in 2020 to $104.2 billion by 2023. Technologies including cloud, social media, and big data are all key areas of growth and components to a sharp rise in digital crime. The World Economic Forum considers cybercrime one of the three greatest threats to Africa, where sub-Saharan nations lose millions of dollars to . cyberattacks each year a very large sum in proportion to their GDP.

You might be interested in …

Daily NCSC-FI news followup 2021-01-09

Excelerating Analysis Tips and Tricks to Analyze Data with Microsoft Excel www.fireeye.com/blog/threat-research/2019/12/tips-and-tricks-to-analyze-data-with-microsoft-excel.html Incident response investigations dont always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Mandiant, we frequently encounter incidents that involve a number of systems and solutions that utilize custom logging or artifact data. Determining what happened in an […]

Read More

Daily NCSC-FI news followup 2021-02-06

Google fixes Chrome zero-day actively exploited in the wild www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-actively-exploited-in-the-wild/ Google has addressed an actively exploited zero-day security vulnerability in the Chrome 88.0.4324.150 version released today, February 4th, 2020, to the Stable desktop channel for Windows, Mac, and Linux users. Eletrobras, Copel energy companies hit by ransomware attacks www.bleepingcomputer.com/news/security/eletrobras-copel-energy-companies-hit-by-ransomware-attacks/ Centrais Eletricas Brasileiras (Eletrobras) and Companhia […]

Read More

Daily NCSC-FI news followup 2021-04-05

Supply chain attacks: what we know about the SolarWinds Sunburst’ exploit, and why it still matters blog.checkpoint.com/2021/04/05/supply-chain-attacks-what-we-know-about-the-solarwinds-sunburst-exploit-and-why-it-still-matters/ In a press conference, more than 2 months after the incident, the U.S. deputy national security advisor said that investigators were still in the “beginning stages” of understanding the scope and scale of the attack. What makes the […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.