Security News > 2021

Swiss hacker charged for leaking proprietary source code
2021-03-19 12:56

Swiss national Till Kottmann, 21, has been charged for conspiracy, wire fraud and aggravated identity theft, the U.S. Department of Justice announced. Kottmann has been at the forefront of numerous leaks involving source code, some of it proprietary or confidential, from dozens of large companies.

Facebook Paid Out $50K for Vulnerabilities Allowing Access to Internal Systems
2021-03-19 12:52

A researcher says he has earned more than $50,000 from Facebook after discovering vulnerabilities that could have been exploited to gain access to some of the social media giant's internal systems. Abdulridha also claimed the account takeover attack may have allowed a hacker to access accounts for other internal Facebook applications as well, but Facebook told SecurityWeek it had not found any evidence to suggest that the flaw could be escalated to access other internal accounts.

3 tips for mitigating cloud-related cybersecurity risks
2021-03-19 12:34

Find out why cloud computing is leading IT security pros to reevaluate their in-house cybersecurity practices as well as resources provided by managed service providers. "As microprocessor speeds have increased, so has memory density and speed," wrote Tom Kulik, an intellectual property & information technology partner at Scheef & Stone, LLP., in his Above the Law article Hey, You, Get Off Of My Cloud: Cybersecurity Considerations For Managed Service Providers.

Automatically mitigate ProxyLogon, detect IoCs associated with SolarWinds attackers’ activities
2021-03-19 12:07

Microsoft has updated its Defender Antivirus to mitigate the ProxyLogon flaw on vulnerable Exchange Servers automatically, while the Cybersecurity and Infrastructure Security Agency has released CHIRP, a forensic tool that can help defenders find IoCs associated with the SolarWinds attackers' activities. Microsoft is determined to do everything in its power to make sure that as many Exchange Servers as possible are made safe from exploits that start with the exploitation of ProxyLogon, the vulnerability recently leveraged by attackers to breach on-premises Microsoft Exchange Servers around the world.

Microsoft Defender adds automatic Exchange ProxyLogon mitigation
2021-03-19 11:40

Microsoft Defender Antivirus will now protect unpatched on-premises Exchange servers from ongoing attacks by automatically mitigating the actively exploited CVE-2021-26855 vulnerability. The Microsoft Defender automatic protection from active attacks targeting unpatched Exchange servers works by breaking the attack chain.

Here's How Security Flaws in GE Relays Could Be Exploited in Real World Attacks
2021-03-19 11:29

Advisories published this week by the U.S. Cybersecurity and Infrastructure Security Agency and GE Grid Solutions inform customers that more than a dozen UR protection and control relays are impacted by a series of vulnerabilities to which 10 different CVE identifiers have been assigned. The vendor has released firmware updates that should patch the vulnerabilities.

Easy SMS Hijacking
2021-03-19 11:21

For businesses, sending text messages to hundreds, thousands, or perhaps millions of customers can be a laborious task. A wide ecosystem of these companies exist, each advertising their own ability to run text messaging for other businesses.

REvil ransomware has a new ‘Windows Safe Mode’ encryption mode
2021-03-19 11:15

The REvil ransomware operation has added a new ability to encrypt files in Windows Safe Mode, likely to evade detection by security software and for greater success when encrypting files. Windows Safe Mode is a special startup mode that allows users to run administrative and diagnostic tasks on the operating system.

Want to be an ethical hacker? Take these cybersecurity courses
2021-03-19 10:00

In these 18 online training courses on ethical hacking, cybersecurity pros will teach you about creating projects with Python, bug bounty hunting, Kali Linux hacker tools and much more. The main job of ethical or white hat hackers is to study the ins and outs of networks and systems, identify potential security gaps and fix those issues.

New infosec products of the week: March 19, 2021
2021-03-19 09:44

Akamai MFA provides FIDO2 multi-factor authentication without hardware security keys. Akamai Technologies announced the launch of Akamai MFA, a phish-proof solution designed to enable enterprises to quickly deploy FIDO2 multi-factor authentication without the need to deploy and manage hardware security keys.