Security News > 2021 > May

Ransomware Is Getting Ugly
2021-05-14 11:30

Modern ransomware has two dimensions: pay to get your data back, and pay not to have your data dumped on the Internet. The DC police are the victims of this ransomware, and the criminals have just posted personnel records - "Including the results of psychological assessments and polygraph tests; driver's license images; fingerprints; social security numbers; dates of birth; and residential, financial, and marriage histories" - for two dozen police officers.

NHS-backed org reacted to GitHub leak disclosure with legal threats and police call, complains IT pro
2021-05-14 10:02

IT pro Rob Dyke says an NHS-backed company not only threatened him with legal action after he flagged up an exposed GitHub repository containing credentials and insecure code, it even called the police on him. What happened next united infosec professionals across the world as well as triggering a crowdfundraiser and a behind-the-scenes legal war: we're told Apperta sent Dyke legal demands, and followed those up by alleging to the cops that he broke Britain's computer security laws.

Hackers Using Microsoft Build Engine to Deliver Malware Filelessly
2021-05-14 09:01

Threat actors are abusing Microsoft Build Engine to filelessly deliver remote access trojans and password-stealing malware on targeted Windows systems. The actively ongoing campaign is said to have emerged last month, researchers from cybersecurity firm Anomali said on Thursday, adding the malicious build files came embedded with encoded executables and shellcode that deploy backdoors, allowing the adversaries to take control of the victims' machines and steal sensitive information.

Cross-browser tracking vulnerability tracks you via installed apps
2021-05-14 07:30

Researchers have developed a way to track a user across different browsers on the same machine by querying the installed applications on the device. "Cross-browser anonymity is something that even a privacy conscious internet user may take for granted. Tor Browser is known to offer the ultimate in privacy protection, though due to its slow connection speed and performance issues on some websites, users may rely on less anonymous browsers for their every day surfing," explains a new vulnerability report by FingerprintJS' Konstantin Darutkin.

Report to Your Management with the Definitive 'Incident Response for Management' Presentation Template
2021-05-14 06:14

Many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process with their management a much more challenging task. Cynet addresses this gap with the IR Reporting for Management PPT template, providing CISOs and CIOs with a clear and intuitive tool to report both the ongoing IR process and its conclusion.

New infosec products of the week: May 14, 2021
2021-05-14 05:30

Elevate Security unveils human attack surface management platform. Pioneering a new category in cybersecurity, human attack surface management, the Elevate Security Platform ingests the entirety of an organization's data to gain benchmarked visibility into human error, enabling CISOs to proactively tailor security controls and create 'safety nets' for the riskiest employees.

DevOps didn’t kill WAF, because WAF will never truly die
2021-05-14 05:15

You can only get rid of WAF if you fully implement security into your development process and audit the process via code reviews and annual tests. DevSecOps can't be realistically implemented for all web apps in the enterprise environment, so WAF will stick around because it still has a job to do.

Maximizing a hybrid cloud approach with colocation
2021-05-14 05:00

In response, we have seen a noticeable shift to companies adopting hybrid cloud environments - a solution that takes advantage of the best qualities of both the public and private cloud. Companies are increasingly deploying a hybrid cloud approach to balance the benefits and challenges presented by both the public and private cloud.

Nearly All Wi-Fi Devices Are Vulnerable to New FragAttacks
2021-05-14 04:46

IEEE 802.11 provides the basis for all modern devices using the Wi-Fi family of network protocols, allowing laptops, tablets, printers, smartphones, smart speakers, and other devices to communicate with each other and access the Internet via a wireless router. Introduced in January 2018, WPA3 is a third-generation security protocol that's at the heart of most Wi-Fi devices with several enhancements such as robust authentication and increased cryptographic strength to safeguard wireless computer networks.

Magecart Hackers Now hide PHP-Based Backdoor In Website Favicons
2021-05-14 04:45

Cybercrime groups are distributing malicious PHP web shells disguised as a favicon to maintain remote access to the compromised servers and inject JavaScript skimmers into online shopping platforms with an aim to steal financial information from their users. Injecting web skimmers on e-commerce websites to steal credit card details is a tried-and-tested modus operandi of Magecart, a consortium of different hacker groups who target online shopping cart systems.