Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 11592
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2023-09-05 15:35:25 | bleepingcomputer | MISCELLANEOUS | Continuous Security: PTaaS Bridges the Gap within Application Security | Penetration Testing as a Service (PTaaS) offers a comprehensive solution for continuous security monitoring in web applications
Traditional pen testing is labor-intensive, time-consuming, and does not offer continuous monitoring
PTaaS provides comprehensive coverage, frequent testing, automated processes, and integration with development processes
Benefits of PTaaS include continuous security, holistic view of AppSec, and effective protection against cyber-attacks
PTaaS is more scalable and effective compared to traditional pen testing
PTaaS is suitable for organizations with a large number of applications and frequent release updates. | Details |
| 2023-09-05 14:41:21 | theregister | DDOS | Tsunami watch. Mitigating the threat of bot-driven DDoS attacks. | DDoS attacks are on the rise, with the volume growing by up to 300 percent in 2023.
These attacks use compromised computer systems to generate attack traffic, resulting in loss of service, revenue, reputation, and control of network defenses.
Being able to detect and mitigate DDoS attacks is crucial in preventing damage.
A webinar hosted by The Register and Cloudflare will discuss the scale of DDoS attacks in 2023 and identify the perpetrators.
The webinar will provide guidance on how to defend against DDoS attacks and offer best practices for mitigation.
Participants will learn how to effectively protect their businesses and build strong defenses against DDoS attacks.
The webinar is scheduled for 6th September and registration is available. | Details |
| 2023-09-05 14:41:21 | theregister | DATA BREACH | Northern Irish Cops Release Two Men After Terrorism Act Arrests Linked to Data Breach | The Police Service of Northern Ireland (PSNI) mistakenly published data on 10,000 employees on their website
Two men have been released on bail after being arrested under the Terrorism Act in relation to the data breach
The breach included details of every serving Northern Ireland police officer, potentially endangering their safety
Recent poster attempts to intimidate police officers, but the information contained was incorrect
The PSNI has made four arrests in relation to the data breach so far
Other police forces in the UK have also experienced data breaches recently, including Cumbria Police and the Metropolitan Police in London | Details |
| 2023-09-05 14:41:21 | theregister | DATA BREACH | Attackers Access UK Military Data Through High-Security Fencing Firm's Windows 7 Rig | Attackers gained access to data from a UK supplier of high-security fencing for military bases
The initial entry point was a Windows 7 PC, highlighting the risks of running obsolete code and hardware
The LockBit Ransom group conducted the attack and may have exfiltrated 10GB of data
The breach could potentially provide access to sensitive military and research sites in the UK
The company stated that no classified information was stored on the compromised system
Zaun has notified the National Cyber Security Centre and the UK's Information Commissioner's Office regarding the breach
The attack serves as a reminder for enterprises and organizations to be vigilant about security in their supply chains
The targeted nature of the attack on a third-party supplier raises concerns about national security and critical infrastructure | Details |
| 2023-09-05 14:41:21 | theregister | MISCELLANEOUS | Microsoft calls time on ancient TLS in Windows, breaking own stuff in the process | Microsoft is disabling TLS 1.0 and 1.1 by default in Windows, potentially causing issues for enterprise administrators.
SQL Server 2012, 2014, and 2016 editions may require updates to be compatible.
Other applications expected to be broken include Apple's Safari browser for Windows and several security applications.
Microsoft has been tracking TLS protocol usage and believes usage of TLS 1.0 and 1.1 is low enough to act.
Windows Insiders will be the first to have TLS 1.0 and 1.1 disabled by default from September, followed by future Windows releases.
The option to re-enable the protocols will still be available but should only be done as a temporary solution.
Microsoft's goal aligns with industry efforts to eliminate deprecated versions of TLS, with the US National Security Agency (NSA) and major tech companies advocating for the move.
Microsoft's progress in disabling TLS 1.0 and 1.1 has been delayed but is now planned to be implemented in its flagship operating system. | Details |
| 2023-09-05 14:41:21 | theregister | DATA BREACH | Northern Ireland Top Cop Resigns Following Data Breach and Controversy | Simon Byrne, Chief Constable of the Police Service Northern Ireland (PSNI), has resigned amid a data breach and disciplinary controversy
The PSNI mistakenly published spreadsheet data containing details of every single serving Northern Ireland police officer following a Freedom of Information request
The sensitive information included personal details of officers and staff, making them vulnerable to potential targeting by dissident republican groups
An independent review is currently underway to investigate the data breach
In addition to the data breach, Byrne was facing backlash over a court ruling related to disciplinary actions taken against two junior officers
The court ruled that the officers had been unlawfully disciplined to appease Sinn Féin's support for policing in Northern Ireland
The ruling undermined Byrne's credibility and authority, contributing to his decision to resign
Deputy Chief Constable Mark Hamilton is expected to temporarily lead the PSNI while a new leader is sought. | Details |
| 2023-09-05 14:41:21 | thehackernews | CYBERCRIME | Way Too Vulnerable: Uncovering the State of the Identity Attack Surface | Organizations heavily depend on digital assets in today's digital age
The real battleground in cybersecurity has shifted to user identities
Many organizations are unaware of security gaps and vulnerabilities
Silverfort commissioned a comprehensive study on the Identity Attack Surface
The webinar aims to provide insights and actionable steps to improve cybersecurity
The digital landscape is evolving with new threats, and organizations need to stay ahead
Attendees will discover ways to transform their perception of cybersecurity
Registration is open for the webinar to fortify organizations' cybersecurity. | Details |
| 2023-09-05 14:41:21 | thehackernews | DATA BREACH | Key Cybersecurity Tools That Can Mitigate the Cost of a Breach | The average cost of a data breach rose to $4.45 million, a 15% increase over the last three years.
Healthcare organizations suffered the highest average loss of $10.93 million, followed by the finance industry at $5.9 million.
Organizations with fewer than 500 employees experienced higher average data breach costs in 2023 ($3.31 million) compared to previous years.
Phishing and stolen credentials are still the most common initial attack vectors, with phishing costing an average of $4.76 million and stolen credentials costing an average of $4.62 million.
Integrating a third-party tool into the Active Directory can provide added control and visibility over compromised passwords.
Rapid incident response is crucial to mitigating the financial impact of a data breach, as companies that detected compromises within 200 days lost $3.93 million compared to those that identified the issue later.
Understanding and securing the cloud is essential, as 82% of breached data was stored in the cloud. Misconfigured cloud configurations and supply chain attacks were prevalent in the surveyed organizations.
External Attack Surface Management (EASM) and risk-based vulnerability management can significantly reduce the time to identify and contain a data breach and lower breach costs. | Details |
| 2023-09-05 14:41:21 | thehackernews | CYBERCRIME | Lazarus Group's Andariel Cluster Uses Cyber Weapons in Attacks | Andariel, a North Korean threat actor, has been using various malicious tools in cyber assaults against corporations and organizations in South Korea
The attacks involve malware strains developed in the Go language
Andariel is a sub-cluster of the Lazarus Group, active since 2008
Financial institutions, defense contractors, government agencies, universities, cybersecurity vendors, and energy companies are targeted
Initial infection vectors include spear-phishing, watering holes, and supply chain attacks
Malware families employed by Andariel include Gh0st RAT, DTrack, YamaBot, NukeSped, and more
Andariel recently exploited security flaws in Zoho ManageEngine ServiceDesk Plus using QuiteRAT
The group has been carrying out attacks for financial gains and national security-related information | Details |
| 2023-09-05 14:41:21 | thehackernews | MALWARE | New Python Variant of Chaes Malware Targets Banking and Logistics Industries | A reworked variant of the Chaes malware is targeting the banking and logistics industries
The malware has been rewritten in Python, making it harder to detect by traditional defense systems
Chaes primarily targets e-commerce customers in Latin America, particularly Brazil, to steal sensitive financial information
The threat actors behind the malware, known as Lucifer, have breached over 800 WordPress websites to deliver Chaes to users
The latest version, called Chae$ 4, includes significant transformations and enhancements, such as expanded credential theft capabilities and clipper functionalities
The malware is delivered through compromised websites, with the victims being prompted to download an installer for Java Runtime or an antivirus solution
ChaesCore, the primary orchestrator module, establishes a communication channel with the command-and-control server to fetch additional modules
The malware now targets cryptocurrency transfers and instant payments via Brazil's PIX platform, highlighting the threat actors' financial motivations. | Details |
| 2023-09-05 14:41:21 | bleepingcomputer | CYBERCRIME | Hackers Target IT Help Desks to Disable MFA and Gain Super Admin Access | Hackers are targeting IT service desk agents in social engineering attacks
Their goal is to trick agents into resetting multi-factor authentication (MFA) for high-privileged users
The attackers aim to hijack Okta Super Administrator accounts to abuse identity federation features for impersonation
They were able to compromise Super Admin accounts through authentication flow tampering or having passwords for privileged accounts
Once they gain admin access, they elevate privileges for other accounts, reset enrolled authenticators, and remove 2FA protection
Hackers use a second Identity Provider to impersonate users and access applications through Single-Sign-On authentication
Okta recommends security measures to protect admin accounts from external actors
Indicators of compromise and IP addresses associated with the attacks have been provided by Okta for additional protection measures. | Details |
| 2023-09-05 14:41:21 | bleepingcomputer | DATA BREACH | Hackers Exploit MinIO Storage System to Breach Corporate Networks | Hackers are exploiting vulnerabilities in the MinIO storage system to breach object storage systems and access private information
Two vulnerabilities, CVE-2023-28432 and CVE-2023-28434, are being used by attackers to execute arbitrary code and potentially take over servers
Attackers are using a modified version of MinIO called Evil MinIO, which replaces the legitimate software with modified code that adds a backdoor
The attack begins with social engineering to convince a DevOps engineer to downgrade to a vulnerable version of MinIO
Hackers exploit one vulnerability to remotely access server environment variables and administrative credentials
The malicious update replaces legitimate code with a tampered version that allows for remote command execution
The backdoor in Evil MinIO is not detected by antivirus engines on Virus Total
After breaching the storage system, attackers establish a communication channel with a command and control server and download additional payloads for post-compromise activity
38% of MinIO instances exposed on the public internet are confirmed to run a non-vulnerable version, but administrators should still apply the security update to protect against attacks. | Details |
| 2023-09-05 14:41:21 | bleepingcomputer | DDOS | German Financial Agency Website Targeted by Ongoing DDoS Attack | The German Federal Financial Supervisory Authority (BaFin) has been experiencing an ongoing distributed denial-of-service (DDoS) attack on its website since Friday
BaFin is responsible for regulating banks, financial, and insurance service providers in Germany
The agency has taken necessary security precautions and defensive measures, including taking its public website offline, but assures that its crucial systems are unaffected
The website hosts consumer and regulation information, important documents, a database of registered companies, job vacancies, and a platform for whistleblowers
BaFin's IT team is working to restore public access to the website, but it is unclear when this will be accomplished | Details |
| 2023-09-05 14:41:21 | bleepingcomputer | DATA BREACH | Insurer Fined $3M for Exposing Data of 650k Clients for Two Years | Swedish insurer Trygg-Hansa fined $3 million for exposing sensitive data of hundreds of thousands of customers
Investigation initiated after a customer alerted authorities about the accessibility of backend database
Backend database could be accessed without authentication, allowing browsing of private documents of other individuals
Approximately 650,000 customers affected by the data exposure
Data was exposed for more than two years, increasing the risk of exploitation by cybercriminals
At least 202 cases of personal information exposure confirmed, but more cases may exist
Insurer's failure to address the issue despite receiving reports indicates a severe shortfall in data security and risk mitigation measures
Swedish Authority for Privacy Protection imposed an administrative penalty of $3 million on the insurer. | Details |
| 2023-09-05 14:41:21 | bleepingcomputer | DATA BREACH | Freecycle Confirms Massive Data Breach Impacting 7 Million Users | Nonprofit organization Freecycle confirms a massive data breach affecting over 7 million users.
Stolen data, including usernames, User IDs, email addresses, and hashed passwords, was put up for sale on a hacking forum.
Threat actor claims to have full access to member information and forum posts, including the credentials of Freecycle's founder and executive director.
Users are advised to change their passwords and be aware of potential delays in the password reset process.
Freecycle has reported the breach to the appropriate authorities.
Users are cautioned to remain vigilant of phishing emails and be cautious of spam. | Details |