Security News > 2022 > July

Time from vulnerability disclosures to exploits is shrinking
2022-07-27 15:00

Palo Alto Networks' annual Unit 42 incident response report is out, warning of an ever-decreasing gap between vulnerability disclosures and an increase in cybercrime. "The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced," the vendor says.

GitHub introduces 2FA and quality of life improvements for npm
2022-07-27 14:29

GitHub has announced the general availability of three significant improvements to npm, aiming to make using the software more secure and manageable. In summary, the new features include a more streamlined login and publishing experience, the ability to link Twitter and GitHub accounts to npm, and a new package signature verification system.

DDoS Attack Trends in 2022: Ultrashort, Powerful, Multivector Attacks
2022-07-27 14:08

Ransom DDoS attacks are carried out for extortion - the attackers promise to cease their attack upon receiving the ransom. According to Gcore, the number of such complex multivector attacks tripled in 2022 compared to the previous year.

Infostealer malware targets Facebook business accounts to capture sensitive data
2022-07-27 14:05

Infostealer malware targets Facebook business accounts to capture sensitive data. A new attack analyzed by cybersecurity provider WithSecure Intelligence targets Facebook business users with the intent of stealing their sensitive data and taking over their accounts.

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware
2022-07-27 13:37

As many as 30 malicious Android apps with cumulative downloads of nearly 10 million have been found on the Google Play Store distributing adware. While masquerading as innocuous apps, their primary goal is to request permissions to show windows over other apps and run in the background in order to serve intrusive ads.

4 Steps the Financial Industry Can Take to Cope With Their Growing Attack Surface
2022-07-27 12:16

The key takeaway is that digital growth in the financial industry is not stopping; therefore, cybersecurity teams will need ways to gain accurate, real-time visibility into their attack surface. Breach and attack simulation, or BAS, helps identify vulnerabilities by simulating the potential attack paths that a malicious actor might use.

Securing Open-Source Software
2022-07-27 12:03

Open source is at least as important to the economy, public services, and national security as proprietary code, but it lacks the same standards and safeguards. Given open source's value as a public asset, an institutional structure must be built that sustains and secures it.

Fedora ditches 'No Rights Reserved' software over patent concerns
2022-07-27 11:23

The Fedora Project has announced that it will no longer permit Creative Commons 'No Rights Reserved' aka CC0-licensed code in its Linux distro or the Fedora Registry. The Fedora Project will no longer allow CC0-licensed software aka code with 'No Rights Reserved' to be distributed on the Fedora Registry, or as part of the Fedora Linux distribution.

Fedora ditches CC0 'No Rights Reserved' software over patent concerns
2022-07-27 11:23

The Fedora Project will no longer allow CC0-licensed software aka code with 'No Rights Reserved' to be distributed on the Fedora Registry, or as part of the Fedora Linux distribution. The reason for the policy change is simply this-while Creative Commons' CC0 license allows content creators including software developers to waive copyright to their work, it has no bearing on the patent or trademark rights that the creators continue to retain.

Taking the Risk-Based Approach to Vulnerability Patching
2022-07-27 11:00

Vulnerability management and patching can easily get out of hand when the number of vulnerabilities in your organization is in the hundreds of thousands of vulnerabilities and tracked in inefficient ways, such as using Excel spreadsheets or multiple reports, especially when many teams are involved in the organization. While it is well known that vulnerability patching is extremely important, it is also challenging to patch vulnerabilities effectively.