Security News > 2021

Massive Supply-Chain Cyberattack Breaches Several Airlines
2021-03-05 19:52

Yahil declined to say how many users have been affected for confidentiality reasons, but Singapore Airlines reported more than 580,000 impacted customers alone, meaning the compromise could ultimately impact millions of users. "Many airlines have issued public statements confirming what types of data have been affected in relation to their passengers."

SITA data breach affects millions of travelers from major airlines
2021-03-05 19:13

Passenger data from multiple airlines around the world has been compromised after hackers breached servers belonging to SITA, a global information technology company. A SITA representative told BleepingComputer that the intrusion impacts data of passengers from the airlines listed below.

80% of senior IT leaders see cybersecurity protection deficits
2021-03-05 18:27

Nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges, according to a new IDG survey commissioned by Insight Enterprises. The survey examined the impact of the distributed IT landscape and pandemic-related transition to a remote workforce on IT security, including shifts in modernization priorities, projects undertaken in 2020 and major obstacles faced in strengthening cybersecurity defenses.

Chrome extension turns on YouTube captions when eating noisy chips
2021-03-05 17:38

A new AI-powered Google Chrome extension will automatically turn on YouTube extensions if it detects you are eating noisy chips. I doubt few people have not experienced hearing a movie, TV show, or video while someone next to you is loudly eating chips.

Critics Blast Google’s Aim to Replace Browser Cookie with ‘FLoC’
2021-03-05 17:24

This month Google begins a public test of a technology it says will eventually replace browser cookies in an effort to boost Chrome browser user privacy. The as-yet unproven technology allows browsers to group people together by their interests and give them more anonymity yet still allow for appropriate targeted advertising, which remains at the core of the company's interest in outfitting their Chrome browser with FLoC. Google's stance is that it will balance the need to preserve people's privacy by preventing individual tracking with giving advertisers and publishers the relevant info they need to recognize their target audience.

Thousands of Mobile Apps Expose Data via Misconfigured Cloud Containers
2021-03-05 17:01

Thousands of mobile applications expose user data through insecurely implemented cloud containers, according to a new report from security vendor Zimperium. Some of the analyzed apps would leak their entire cloud infrastructure scripts, SSH keys, web server config files, installation files, or passwords.

No, RSA Is Not Broken
2021-03-05 16:48

My understanding is that prior to the publication of "Primes is in P," many workers in the specialized field of complexity theory had formed the opinion that no deterministic polynomial-time algorithm could be found for primality testing. Colleagues might have looked skeptically at Agrawal for working on the problem of finding such an algorithm.

Oh SITA: Airline IT provider confirms passenger data leaked after major 'cyber-attack'
2021-03-05 16:01

SITA didn't elaborate on the nature or extent of the attack, other than to describe it as "Highly sophisticated but limited." According to its own disclosure, the attackers obtained passenger records from servers hosted in an Atlanta, Georgia data centre operated by an American subsidiary. "The data in question relates exclusively to service card numbers, status level and in some cases names. Unfortunately, your customer data is also affected. You can rest assured that no passwords, email addresses or other personal customer data were stolen in the incident."

D-Link, IoT Devices Under Attack By Tor-Based Gafgyt Variant
2021-03-05 15:55

Researchers have discovered what they say is the first variant of the Gafgyt botnet family to cloak its activity using the Tor network. In order to evade detection, Gafgyt tor uses Tor to hide its command-and-control communications, and encrypts sensitive strings in the samples.

NIST Cybersecurity Framework: A cheat sheet for professionals
2021-03-05 15:30

TechRepublic's cheat sheet about the National Institute of Standards and Technology's Cybersecurity Framework is a quick introduction to this new government recommended best practice, as well as a "Living" guide that will be updated periodically to reflect changes to the NIST's documentation. Executive summaryWhat is the NIST Cybersecurity Framework? The NIST CSF is a set of optional standards, best practices, and recommendations for improving cybersecurity and risk management at the organizational level.