Security News > 2022 > August

Protect your data and work from anywhere with this docking station
2022-08-04 19:30

Protect your data and work from anywhere with this docking station We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. You can invest in anti-malware, VPNs and other digital solutions to protect your data, but the best solution to protect your most important data is to keep it on a private drive.

Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service
2022-08-04 19:00

Security researchers found a new service called Dark Utilities that provides an easy and inexpensive way for cybercriminals to set up a command and control center for their malicious operations. The Dark Utilities service provides threat actors a platform that supports Windows, Linux, and Python-based payloads, and eliminates the effort associated with implementing a C2 communication channel.

GitHub blighted by “researcher” who created thousands of malicious projects
2022-08-04 18:06

Just over a year ago, we wrote about a "Cybersecurity researcher" who posted almost 4000 pointlessly poisoned Python packages to the popular repository PyPI. This person went by the curious nickname of Remind Supply Chain Risks, and the packages had project names that were generally similar to well-known projects, presumably in the hope that some of them would get installed by mistake, thanks to users using slightly incorrect search terms or making minor typing mistakes when typing in PyPI URLs. A GitHub source code search that Lacy carried out in good faith led him to a legitimate-looking project.

S3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!) [Audio + Text]
2022-08-04 17:52

DOUG. A critical Samba bug, yet another crypto theft, and Happy SysAdmin Day. Moving on to something not so great: a memory mismanagement bug in GnuTLS. DUCK. Yes, I thought this was worth writing up on Naked Security, because when people think of open-source cryptography, they tend to think of OpenSSL. Because that's the one that everybody's heard of, and it's the one that's probably had the most publicity in recent years over bugs, because of Heartbleed.

Verizon: Mobile attacks up double digits from 2021
2022-08-04 17:25

With the proliferation of mobile devices and hybrid work environments where employees often use their personal devices for work-related activities almost half of respondents of the Verizon Mobile Security Index 2022 said their organizations were subject to a security incident involving a mobile device that led to data loss, downtime or other negative outcome-a 22% increase over 2021's numbers. Despite these results, 36% of respondents said that mobile devices are of less interest to cybercriminals than other IT assets-an increase of six percentage points from the 2021 MSI report.

One in three organizations now hit by weekly ransomware attacks
2022-08-04 16:37

Ransomware has become more pervasive and more sophisticated, challenging organizations to combat attacks that occur at greater frequency and greater complexity. Among the respondents to the report,"2022 Impacts: Ransomware attacks and preparedness," one-third said that their organization is hit by a ransomware attempt at least weekly, with 9% reporting attacks more than once each day.

New Linux malware brute-forces SSH servers to breach networks
2022-08-04 16:22

A new botnet called 'RapperBot' is being used in attacks since mid-June 2022, focusing on brute-forcing its way into Linux SSH servers to establish a foothold on the device. Over the past 1.5 months since its discovery, the new botnet used over 3,500 unique IPs worldwide to scan and attempt brute-forcing Linux SSH servers.

Cybersecurity agencies reveal last year’s top malware strains
2022-08-04 15:55

The U.S. Cybersecurity and Infrastructure Security Agency released a list of the topmost detected malware strains last year in a joint advisory with the Australian Cyber Security Centre. "Most of the top malware strains have been in use for more than five years with their respective code bases evolving into multiple variations," the cybersecurity agencies said.

Who Has Control: The SaaS App Admin Paradox
2022-08-04 15:50

The paradox lies in the fact that it's the security team's responsibility to secure the organization's SaaS app stack and they cannot effectively execute this task without full control of the SaaS app. While the security and IT teams are reported to be the main destination for SaaS app management, it's the 40% of business departments also taking part and having full access that complicates the threat landscape.

How to change Touch ID settings on a MacBook Pro
2022-08-04 15:15

Programming the Mac to remember my fingerprint and substitute my touch for entering usernames and passwords sounded nifty, but just how much time would it really save? Occasionally it's necessary to add a fingerprint or adjust Touch ID settings.