Sat.May 28, 2022

article thumbnail

New Windows Subsystem for Linux malware steals browser auth cookies

Bleeping Computer

Hackers are showing an increased interest in the Windows Subsystem for Linux (WSL) as an attack surface as they build new malware, the more advanced samples being suitable for espionage and downloading additional malicious modules. [.].

Malware 145
article thumbnail

GitHub: Nearly 100,000 NPM Users’ credentials stolen in the April OAuth token attack

Security Affairs

GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users’ credentials. GitHub provided additional details about the incident that suffered in April, the attackers were able to steal nearly 100K NPM users’ credentials. In April, GitHub uncovered threat actors using stolen OAuth user tokens to gain access to their repositories and download private data from several organizations.

Backups 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical OAS Bugs Open Industrial Systems to Takeover

Dark Reading

The most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says.

131
131
article thumbnail

Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks

Security Affairs

360 Qihoo reported DDoS attacks launched by APT-C-53 (aka Gamaredon) conducted through the open-source DDoS Trojan program LOIC. Researchers at 360 Qihoo observed a wave of DDoS attacks launched by Russia-linked APT-C-53 (aka Gamaredon) and reported that the threat actors also released as open-source the code of a DDoS Trojan called LOIC. The instances of the malware spotted by the experts were compiled in early March, a few days after the Russian invasion of Ukraine began. “We found that

DDOS 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft: The new Windows 11 features from Build 2022

Bleeping Computer

During the Build 2022 developer conference, Microsoft announced a number of new features for Windows 11, including an improved Windows Subsystem for Android (WSA) and more. [.].

Software 127
article thumbnail

The strange link between Industrial Spy and the Cuba ransomware operation

Security Affairs

The recently launched Industrial Spy data extortion marketplace has now started its ransomware operation. In April, Malware HunterTeam and Bleeping Computer reported the launch of a new dark web marketplace called Industrial Spy that sells stolen data and offers free stolen data to its members. MalwareHunterTeam researchers spotted malware samples [ 1 , 2 ] that drop the following wallpaper that promotes the site.

More Trending

article thumbnail

Reuters: Russia-linked APT behind Brexit leak website

Security Affairs

Russia-linked threat actors are behind a new website that published leaked emails from leading proponents of Britain’s exit from the EU, the Reuters reported. According to a Google cybersecurity official and the former head of UK foreign intelligence, the “Very English Coop d’Etat” website was set up to publish private emails from Brexit supporters, including former British MI6 chief Richard Dearlove, leading Brexit campaigner Gisela Stuart, and historian Robert Tombs.

article thumbnail

Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices

The Hacker News

Four high severity vulnerabilities have been disclosed in a framework used by pre-installed Android System apps with millions of downloads. The issues, now fixed by its Israeli developer MCE Systems, could have potentially allowed threat actors to stage remote and local attacks or be abused as vectors to obtain sensitive information by taking advantage of their extensive system privileges.

111
111
article thumbnail

DuckDuckGo Isn’t as Private as You Think

WIRED Threat Level

Plus: A $150 million Twitter fine, a massive leak from a Chinese prison in Xinjiang, and an ISIS plot to assassinate George W. Bush.

Hacking 95
article thumbnail

Zero Day Initiative’s Pwn2Own Vancouver 2022 – ‘Drawing for Order’

Security Boulevard

Our thanks to Zero Day Initiative for publishing their outstanding Pwn2Own Vancouver 2022 videos on the organization’s’ YouTube channel. Permalink. The post Zero Day Initiative’s Pwn2Own Vancouver 2022 – ‘Drawing for Order’ appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

DuckDuckGo Isn’t as Private as You Think

WIRED Threat Level

Plus: A $150 million Twitter fine, a massive leak from a Chinese prison in Xinjiang, and an ISIS plot to assassinate George W. Bush.

Hacking 95
article thumbnail

Zero Day Initiative’s Pwn2Own Miami 2022 – Steven Seeley’s And Chris Anastasio’s ‘Team Incite Vs. Iconics Genesis64’

Security Boulevard

Our thanks to Zero Day Initiative for publishing their Pwn2Own Miami 2022 videos on the organization’s’ YouTube channel. Permalink. The post Zero Day Initiative’s Pwn2Own Miami 2022 – Steven Seeley’s And Chris Anastasio’s ‘Team Incite Vs. Iconics Genesis64’ appeared first on Security Boulevard.

article thumbnail

Weekly Update 297

Troy Hunt

So I basically spent my whole day yesterday playing with Ubiquiti gear and live-tweeting the experience 😊 This was an unapologetically geeky pleasure and it pretty much dominates this week's video but hey, it's a fun topic. Still, there's a bunch of data breach stuff up front and as I write this, 25M more records courtesy of the MGM breach are making their way up into HIBP.

article thumbnail

Joy Of Tech® ‘Duck Duck Ducked’

Security Boulevard

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® ! Permalink. The post Joy Of Tech® ‘Duck Duck Ducked’ appeared first on Security Boulevard.

71
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Algo-rhythmic infosec

Notice Bored

An article by the 50-year-old University of York Department of Computer Science outlines algorithmic approaches in A rtificial I ntelligence. Here are the highlights: Linear sequence : progresses directly through a series of tasks/statements, one after the other. Conditional: decides between courses of action according to the conditions set (e.g. if X is 10 then do Y, otherwise do Z).

InfoSec 107
article thumbnail

Beautiful Basics: Lesson 3

Security Boulevard

Lessons Learned. Slides. Lesson 1. Lesson 2. Lesson 3. Lesson 4. Lesson 5. Lesson 6. Lesson 7. Lesson 8. Lesson 9. Lesson 10. Lesson 11. Lesson 3 - Detection Reality. People and Honey tokens are THE BEST detective tool you have. Go buy a Thinkst Canary , they detect me more than any multi-million dollar EDR. Period. Let me clarify something quickly before I get roasted.

article thumbnail

Clop ransomware gang is back, hits 21 victims in a single month

Bleeping Computer

After effectively shutting down their entire operation for several months, between November and February, the Clop ransomware is now back according to NCC Group researchers. [.].