Daily NCSC-FI news followup 2020-11-29

Hacker Lexicon: What Is the Signal Encryption Protocol?

www.wired.com/story/signal-encryption-protocol-hacker-lexicon/ LAST WEEK, WITH little fanfare, Google announced a change that could soon make its 2 billion Android users worldwide far harder to surveil: The tech giant says it’s rolling out a beta version of its Android messaging app that will now use end-to-end encryption by default. That level of encryption, while limited to one-on-one conversations, is designed to prevent anyone else from eavesdroppingnot phone carriers, not intelligence agencies, not a hacker who has taken over the local Wi-Fi router, not even Google itself will have the keys to decrypt and read those billions of messages.. The news isn’t just a win for global privacy. It’s also a win for one particular encryption system: the Signal protocol, which is well on its way to accounting for a majority of the world’s real-time text conversations.

Älypuhelimeen saa ujutettua haittaohjelman tavalla, jota useimmat eivät tule ajatelleeksi

www.is.fi/digitoday/tietoturva/art-2000007646405.html Älypuhelimen kameralla skannattavat qr-koodit, eli neliönmuotoiset hieroglyfit ovat yleinen tapa avata esimerkiksi verkkosivu puhelimen selaimessa. Tämän tietävät myös rikolliset, tietoturvayhtiö Check Point varoittaa. On muistettava, ettei qr-koodi ole muuta kuin nopea ja kätevä tapa käyttää nettipalveluja. Emme voi olla varmoja, että koodi on aito ennen kuin olemme jo skannanneet sen ja silloin hyökkäys on jo voinut käynnistyä, toteaa Check Point Softwaren Suomen maajohtaja Sampo Vehkaoja tiedotteessa.

Quick Tip: Using JARM With a SOCKS Proxy

isc.sans.edu/forums/diary/Quick+Tip+Using+JARM+With+a+SOCKS+Proxy/26834/ Rik talked about JARM yesterday “Threat Hunting with JARM”. JARM is a tool to fingerprint TLS servers. I made some changes to the JARM code to support a SOCKS proxy.

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

www.forbes.com/sites/louiscolumbus/2020/11/29/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/ Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 25 cybersecurity startups are all based on Crunchbase Pro analysis done today. New startups and established vendors are attracting record levels of investment as all organizations look to thwart increasingly complex, costly and unpredictable cyberattacks.

HS: Kansainvälinen sijoitushuijausverkosto vienyt suomalaisilta kymmeniätuhansia euroja

yle.fi/uutiset/3-11671748? Sadat suomalaiset ovat menettäneet merkittäviä summia rahaa bitcoin-sijoitushuijausverkoston uhreina. Näin kertoo Helsingin Sanomat, joka on selvittänyt asiaa kansainvälisen toimittajaryhmän kanssa. HS:n lainaamien viranomaisarvioiden mukaan suomalaisten menetykset nousevat kymmeniintuhansiin euroihin. Maailmanlaajuisesti huijauksen uhreilta on kiskottu vuosittain miljardeja euroja.

Pennsylvania county pays 500K ransom to DoppelPaymer ransomware

www.bleepingcomputer.com/news/security/pennsylvania-county-pays-500k-ransom-to-doppelpaymer-ransomware/ Delaware County, Pennsylvania has paid a $500,000 ransom after their systems were hit by the DoppelPaymer ransomware last weekend. On Monday, Delaware County disclosed that they had taken portions of their computer network offline after discovering that their network was compromised. “The County of Delaware recently discovered a disruption to portions of its computer network. We commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event. We are working diligently to restore the functionality of our systems,” the Delaware County alert stated.

You might be interested in …

Daily NCSC-FI news followup 2020-06-09

CallStranger UPnP bug allows data theft, DDoS attacks, LAN scans www.bleepingcomputer.com/news/security/callstranger-upnp-bug-allows-data-theft-ddos-attacks-lan-scans/ A vulnerability in the Universal Plug and Play protocol implemented in billions of devices can be exploited to exfiltrate data, turn them into bots for distributed denial-of-service attacks (DDoS), and scan internal networks. US energy providers hit with new malware in targeted attacks www.bleepingcomputer.com/news/security/us-energy-providers-hit-with-new-malware-in-targeted-attacks/ […]

Read More

Daily NCSC-FI news followup 2019-08-21

Group-IBs new report on Silence: Damage from Silence APT operations increases fivefold. The gang deploys new tools on its worldwide tour www.group-ib.com/media/silence-attacks/ Group-IB, a Singapore-based cybersecurity company that specializes in preventing cyberattacks, has exposed the most recent campaigns carried out by Silence, a Russian-speaking APT group, in the new “Silence 2.0: Going Global” report. Group-IB […]

Read More

Daily NCSC-FI news followup 2020-03-29

Source code of Dharma ransomware pops up for sale on hacking forums www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/ The source code of a major ransomware strain named Dharma has been put up for sale on two Russian hacker forums over the weekend.. The FBI, in a talk at the RSA security conference this year, ranked Dharma the second most lucrative […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.