Month: May 2021

Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors

31 May 2021

Starting June 8, Amazon will automatically enable a feature on your Alexa, Echo, or other Amazon device that will share some of your Internet bandwidth with your neighbors—unless you choose to opt out. Amazon intends to register its family of hardware devices that are operational in the U.S.—including Echo speakers, Ring Video Doorbells, Ring Floodlight […]

Read More

Can Your Business Email Be Spoofed? Check Your Domain Security Now!

31 May 2021

Are you aware of how secure your domain is? In most organizations, there is an assumption that their domains are secure and within a few months, but the truth soon dawns on them that it isn’t. Spotting someone spoofing your domain name is one way to determine if your security is unsatisfactory – this means […]

Read More

A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely

31 May 2021

Siemens on Friday shipped firmed updates to address a severe vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs) that could be exploited by a malicious actor to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution, in what the researchers describe as an attacker’s “holy grail.” […]

Read More

Researchers Demonstrate 2 New Hacks to Modify Certified PDF Documents

29 May 2021

Cybersecurity researchers have disclosed two new attack techniques on certified PDF documents that could potentially enable an attacker to alter a document’s visible content by displaying malicious content over the certified content without invalidating its signature. “The attack idea exploits the flexibility of PDF certification, which allows signing or adding annotations to certified documents under […]

Read More

‘OMG it’s a bug!’ Beware the bells and whistles around vulnerability disclosures

28 May 2021

A website for the M1racles M1 Apple chip flaw discovered by independent researcher Hector Martin. Some in the security research community are concerned that over marketing of vulnerability disclosures are misleading the public about their true impact. Earlier this week, a well-respected security researcher released new details on a hardware flaw in a brand new […]

Read More

Have I Been Pwned teams with FBI, gives open-source access to code

28 May 2021

FBI’s cyber division personnel in front of a computer screen. (FBI) The breach aggregator Have I Been Pwned, one of the most popular tools to test the real-world strength of passwords, made two significant announcements on Friday: A collaboration with the FBI to obtain new, hacked passwords, and contributing some of its code-base to the […]

Read More

Researchers Warn of Facefish Backdoor Spreading Linux Rootkits

28 May 2021

Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux systems. The malware dropper has been dubbed “Facefish” by Qihoo 360 NETLAB team owing its capabilities to deliver different rootkits at different times and the use of Blowfish cipher to encrypt communications to […]

Read More

SolarWinds Hackers Target Think Tanks With New ‘NativeZone’ Backdoor

28 May 2021

Microsoft on Thursday disclosed that the threat actor behind the SolarWinds supply chain hack returned to the threat landscape to target government agencies, think tanks, consultants, and non-governmental organizations located across 24 countries, including the U.S. “This wave of attacks targeted approximately 3,000 email accounts at more than 150 different organizations,” Tom Burt, Microsoft’s Corporate […]

Read More

Focus-in on the changing techniques for lateral movement within SaaS applications

28 May 2021

Today’s columnist, Morey Haber of BeyondTrust, points out that in the SolarWinds case, lateral movement took place via auto-updates and not asset-to-asset and device-to-device. sfoskett CreativeCommons CC BY-NC-SA 2.0 We often hear the term lateral movement in the course of an attack. It’s used in relation to threat actors leveraging the stolen credentials of one […]

Read More

Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices

28 May 2021

Cybersecurity researchers from FireEye unmasked additional tactics, techniques, and procedures (TTPs) adopted by Chinese threat actors who were recently found abusing Pulse Secure VPN devices to drop malicious web shells and exfiltrate sensitive information from enterprise networks. FireEye’s Mandiant threat intelligence team, which is tracking the cyberespionage activity under two threat clusters UNC2630 and UNC2717, […]

Read More