Security News
Russia's telecommunications and media regulator Roskomnadzor on Thursday introduced restrictions on the operation of VyprVPN and Opera VPN services in the country. "In accordance with the regulation on responding to threats to circumvent restrictions on access to child pornography, suicidal, pro-narcotic and other prohibited content, restrictions on the use of VPN services VyprVPN and Opera VPN will be introduced from June 17, 2021," the state agency said in a statement.
Roskomnadzor, Russia's telecommunications watchdog, has banned the use of Opera VPN and VyprVPN after classifying them as threats according to current Russian law. "In accordance with the regulation on responding to threats to circumvent restrictions on access to child pornography, suicidal, pro-narcotic and other prohibited content, restrictions on the use of VPN services VyprVPN and Opera VPN will be introduced from June 17, 2021," the Roskomnadzor said.
Threat actors with suspected ties to Iran have been found to leverage instant messaging and VPN apps like Telegram and Psiphon to install a Windows remote access trojan capable of stealing sensitive information from targets' devices since at least 2015. Russian cybersecurity firm Kaspersky, which pieced together the activity, attributed the campaign to an advanced persistent threat group it tracks as Ferocious Kitten, a group that has singled out Persian-speaking individuals allegedly based in the country while successfully operating under the radar.
Microsoft has released the June release preview cumulative updates for all editions of Windows 10 and Windows Server versions 1809 and 1909, with fixes for issues causing VPNs to fail and blurry text on the News and Interests taskbar button. After installing the KB5003698 non-security updates, you may encounter issues with system and user certificates lost when updating from Windows 10 1809 or later versions via outdated update media.
Microsoft has released the June release preview cumulative updates for all editions of Windows 10 and Windows Server versions 1809 and 1909, with fixes for issues causing VPNs to fail and blurry text on the News and Interests taskbar button. After installing the KB5003698 non-security updates, you may encounter issues with system and user certificates lost when updating from Windows 10 1809 or later versions via outdated update media.
TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in, and so on. Express VPN is incorporated in the British Virgin Islands.
Nuspire released a report which outlines new cybercriminal activity and tactics, techniques and procedures with additional insight from Recorded Future. "As companies return to a hybrid workplace, it's crucial that they are aware of the evolving threat landscape," said Craig Robinson, Program Director, Security Services at IDC. "The data highlighted in this threat report by Nuspire and Recorded Future shows that security leaders need to stay vigilant as threat actors see opportunity in the continued era of remote access."
Malicious hackers are exploiting an old VPN security flaw to compromise SonicWall SRC devices, according to a warning from security vendor CrowdStrike. The vulnerability in question, tracked as CVE-2019-7481, was originally patched by SonicWall back in 2019 but CrowdStrike is warning that the firmware updates did not properly mitigate the issue on legacy SRA devices.
It took only one dusty, no-longer-used password for the DarkSide cybercriminals to breach the network of Colonial Pipeline Co. last month, resulting in a ransomware attack that caused significant disruption and remains under investigation by the U.S. government and cybersecurity experts. Attackers used the password to a VPN account that was no longer in use but still allowed them to remotely access Colonial Pipeline's network, Charles Carmakal, senior vice president at FireEye's cybersecurity consulting firm Mandiant, told Bloomberg in an interview, according to a published report on the news outlet's website.
The ransomware cartel that masterminded the Colonial Pipeline attack early last month crippled the pipeline operator's network using a compromised virtual private network account password, the latest investigation into the incident has revealed. The VPN login was unused but active at the time of the attack, the report said, adding the password has since been discovered inside a batch of leaked passwords on the dark web, suggesting that an employee of the company may have reused the same password on another account that was previously breached.