Online Security
2 min read
48

Cring Ransomware Gang Exploits 11-Year-Old ColdFusion Bug

September 21, 2021
0

Unidentified threat actors breached a server running an unpatched, 11-year-old version of Adobe’s ColdFusion 9 software in minutes to remotely take over control and deploy file-encrypting Cring ransomware on the target’s network 79 hours after the hack. The server, which belonged to an unnamed services company, was used to collect

Continue Reading
Online Security
1 min read
41

Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters

September 20, 2021
0

Law enforcement agencies in Italy and Spain have dismantled an organized crime group linked to the Italian Mafia that was involved in online fraud, money laundering, drug trafficking, and property crime, netting the gang about €10 million ($11.7 million) in illegal proceeds in just a year. “The suspects defrauded hundreds

Continue Reading
Online Security
3 min read
40

Update Google Chrome to Patch 2 New Zero-Day Flaws Under Attack

September 19, 2021
0

Google on Monday released security updates for Chrome web browser to address a total of 11 security issues, two of which it says are actively exploited zero-days in the wild. Tracked as CVE-2021-30632 and CVE-2021-30633, the vulnerabilities concern an out of bounds write in V8 JavaScript engine and a use

Continue Reading
Online Security
1 min read
35

Critical Flaws Discovered in Azure App That Microsoft Secretly Installs on Linux VMs

September 18, 2021
0

Microsoft on Tuesday addressed a quartet of security flaws as part of its Patch Tuesday updates that could be abused by adversaries to target Azure cloud customers and elevate privileges as well as allow for remote takeover of vulnerable systems. The list of flaws, collectively called OMIGOD by researchers from

Continue Reading
Online Security
1 min read
37

New Malware Targets Windows Subsystem for Linux to Evade Detection

September 17, 2021
0

A number of malicious samples have been created for the Windows Subsystem for Linux (WSL) with the goal of compromising Windows machines, highlighting a sneaky method that allows the operators to stay under the radar and thwart detection by popular anti-malware engines. The “distinct tradecraft” marks the first instance where

Continue Reading
Online Security
1 min read
42

Travis CI Flaw Exposes Secrets of Thousands of Open Source Projects

September 16, 2021
0

Continuous integration vendor Travis CI has patched a serious security flaw that exposed API keys, access tokens, and credentials, potentially putting organizations that use public source code repositories at risk of further attacks. The issue — tracked as CVE-2021-41077 — concerns unauthorized access and plunder of secret environment data associated

Continue Reading
Online Security
1 min read
43

Download the Essential Guide to Response Automation

September 15, 2021
0

In the classic children’s movie ‘The Princess Bride,’ one of the characters utters the phrase, “You keep using that word. I do not think it means what you think it means.” It’s freely used as a response to someone’s misuse or misunderstanding of a word or phrase. “Response Automation” is

Continue Reading
Online Security
1 min read
49

Linux Implementation of Cobalt Strike Beacon Targeting Organizations Worldwide

September 14, 2021
0

Researchers on Monday took the wraps off a newly discovered Linux and Windows re-implementation of Cobalt Strike Beacon that’s actively set its sights on government, telecommunications, information technology, and financial institutions in the wild. The as-yet undetected version of the penetration testing tool — codenamed “Vermilion Strike” — marks one

Continue Reading
Online Security
1 min read
30

New SpookJS Attack Bypasses Google Chrome’s Site Isolation Protection

September 13, 2021
0

A newly discovered side-channel attack demonstrated on modern processors can be weaponized to successfully overcome Site Isolation protections weaved into Google Chrome and Chromium browsers and leak sensitive data in a Spectre-style speculative execution attack. Dubbed “Spook.js” by academics from the University of Michigan, University of Adelaide, Georgia Institute of

Continue Reading
Online Security
2 min read
42

WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud

September 12, 2021
0

WhatsApp on Friday announced it will roll out support for end-to-end encrypted chat backups on the cloud for Android and iOS users, paving the way for storing information such as chat messages and photos in Apple iCloud or Google Drive in a cryptographically secure manner. The feature, which will go

Continue Reading
Online Security
1 min read
37

Mēris Botnet Hit Russia’s Yandex With Massive 22 Million RPS DDoS Attack

September 11, 2021
0

Russian internet giant Yandex has been the target of a record-breaking distributed denial-of-service (DDoS) attack by a new botnet called Mēris. The botnet is believed to have pummeled the company’s web infrastructure with millions of HTTP requests, before hitting a peak of 21.8 million requests per second (RPS), dwarfing a

Continue Reading
Online Security
1 min read
51

Moving Forward After CentOS 8 EOL

September 10, 2021
0

The Linux community was caught unprepared when, in December 2020, as part of a change in the way Red Hat supports and develops CentOS, Red Hat suddenly announced that it’s cutting the official CentOS 8 support window from ten years – to just two, with support ending Dec 31, 2021.

Continue Reading
Online Security
1 min read
34

Russian Ransomware Group REvil Back Online After 2-Month Hiatus

September 9, 2021
0

The operators behind the REvil ransomware-as-a-service (RaaS) staged a surprise return after a two-month hiatus following the widely publicized attack on technology services provider Kaseya on July 4. Two of the dark web portals, including the gang’s Happy Blog data leak site and its payment/negotiation site, have resurfaced online, with

Continue Reading
Online Security
1 min read
40

3 Ways to Secure SAP SuccessFactors and Stay Compliant

September 8, 2021
0

The work-from-anywhere economy has opened up the possibility for your human resources team to source the best talent from anywhere. To scale their operations, organizations are leveraging the cloud to accelerate essential HR functions such as recruiting, onboarding, evaluating, and more. SAP is leading this HR transformation with its human

Continue Reading
Online Security
1 min read
30

Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server

September 7, 2021
0

The maintainers of Jenkins—a popular open-source automation server software—have disclosed a security breach after unidentified threat actors gained access to one of their servers by exploiting a recently disclosed vulnerability in Atlassian Confluence service to install a cryptocurrency miner. The “successful attack,” which is believed to have occurred last week,

Continue Reading
Online Security
1 min read
46

ProtonMail Shares Activist’s IP Address With Authorities Despite Its “No Log” Claims

September 6, 2021
0

End-to-end encrypted email service provider ProtonMail has drawn criticism after it ceded to a legal request and shared the IP address of anti-gentrification activists with law enforcement authorities, leading to their arrests in France. The Switzerland-based company said it received a “legally binding order from the Swiss Federal Department of

Continue Reading
Online Security
1 min read
51

Microsoft Says Chinese Hackers Were Behind SolarWinds Serv-U SSH 0-Day Attack

September 5, 2021
0

Microsoft has shared technical details about a now-fixed, actively exploited critical security vulnerability affecting SolarWinds Serv-U managed file transfer service that it has attributed with “high confidence” to a threat actor operating out of China. In mid-July, the Texas-based company remedied a remote code execution flaw (CVE-2021-35211) that was rooted

Continue Reading
Online Security
1 min read
42

Apple Delays Plans to Scan Devices for Child Abuse Images After Privacy Backlash

September 4, 2021
0

Apple is temporarily hitting the pause button on its controversial plans to screen users’ devices for child sexual abuse material (CSAM) after receiving sustained blowback over worries that the tool could be weaponized for mass surveillance and erode the privacy of users. “Based on feedback from customers, advocacy groups, researchers,

Continue Reading