Lukewarm Security Info

  • Home
  • Posts
  • Resources

Bleeping Computer

  • Fake password manager coding test used to hack Python developers

  • Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware. [...]
  • Adobe fixes Acrobat Reader zero-day with public PoC exploit

  • A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit. [...]
  • WordPress.org to require 2FA for plugin developers by October

  • Starting October 1st, WordPress.org accounts that can push updates and changes to plugins and themes will be required to activate two-factor authentication (2FA) on their accounts. [...]
  • Criminal IP and IPLocation.io Join Forces for Enhanced IP Analysis

  • AI SPERA announced today that its IP address intelligence engine, Criminal IP, has integrated with IPLocation.io. Learn more from Criminal IP about how this brings additional insights to Criminal IP's threat intelligence database. [...]
  • Chinese hackers linked to cybercrime syndicate arrested in Singapore

  • Six Chinese nationals and a Singaporean have been arrested on Monday in Singapore for their alleged role in malicious cyber activities committed in connection with a "global syndicate." [...]
  • Microsoft fixes Windows Server performance issues from August updates

  • ​Microsoft says this month's Patch Tuesday cumulative updates also fix a known issue causing Windows Server 2019 boot problems, freezes, and performance issues after installing the August 2024 security updates. [...]
  • Ivanti fixes maximum severity RCE bug in Endpoint Management software

  • Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote code execution on the core server. [...]
  • New PIXHELL acoustic attack leaks secrets from LCD screen noise

  • A novel acoustic attack named 'PIXHELL' can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to. [...]
  • RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software

  • The RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to disable endpoint detection and response (EDR) services on target systems. [...]
  • Windows 10 KB5043064 update released with 6 fixes, security updates

  • Microsoft has released the KB5043064 cumulative update for Windows 10 22H2 and Windows 10 21H2, which includes 6 changes and fixes, including a fix for Bluetooth devices that stop working due to a memory leak. [...]
  • Microsoft fixes Windows Smart App Control zero-day exploited since 2018

  • ​Microsoft has fixed a Windows Smart App Control and SmartScreen flaw that has been exploited in attacks as a zero-day since at least 2018. [...]
  • Windows 11 KB5043076 cumulative update released with 19 changes

  • Microsoft has released the mandatory Windows 11 23H2 KB5043076 cumulative update to fix security vulnerabilities and make 19 improvements. [...]
  • Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flaws

  • Today is Microsoft's September 2024 Patch Tuesday, which includes security updates for 79 flaws, including three actively exploited and one publicly disclosed zero-days. [...]

Dark Reading

  • Dark Reading Expands Its Coverage to the Asia-Pacific Region

  • The latest step in a journey to serve cybersecurity professionals in other regions of the world.
  • SOAR Is Dead, Long Live SOAR

  • Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security operations is here to stay.
  • AppCD Closes $12.3M Seed Round and Rebrands to StackGen

  • Xiphera Develops Quantum-Resilient Hardware Security Solutions for Space

  • Poppy Gustafsson to Step Down As CEO of Darktrace; Jill Popelka Appointed Successor

  • Remote Access Sprawl Strains Industrial OT Network Security

  • A veritable grab bag of tools used to access critical infrastructure networks are wildly insecure, and they're blobbing together to create a widening attack surface.
  • How Law Enforcement's Ransomware Strategies Are Evolving

  • The threat of ransomware hasn't gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversaries in the ransomware scene.
  • Air-Gapped Networks Vulnerable to Acoustic Attack via LCD Screens

  • In the "PixHell" attack, sound waves generated by pixels on a screen can transmit information across seemingly impenetrable air gaps.
  • 'Ancient' MSFT Word Bug Anchors Taiwanese Drone-Maker Attacks

  • An attack dubbed "WordDrone" that uses an old flaw to install a backdoor could be related to previously reported cyber incidents against Taiwan's military and satellite industrial supply chain.
  • India Needs Better Cybersecurity for Space, Critical Infrastructure

  • As attacks on satellites rise with nation-state conflicts, the South Asian nation joins other space-capable countries in doubling down on cybersecurity.
  • Google Updates Cloud Backup, Disaster Recovery Service

  • The combination of immutability, indelibility, centralized governance, and user empowerment provides a comprehensive backup strategy, Google said.
  • Wiz Launches Wiz Code Application Security Tool

  • Wiz Code identifies and flags cloud risks in code to help improve collaboration between security and development teams.
  • Microsoft Discloses 4 Zero-Days in September Update

  • This month's Patch Tuesday contains a total of 79 vulnerabilities — the fourth largest of the year.
  • How a Centuries-Old Company Reached Security Maturity

  • In this case study, a 180-year-old life and pension insurer brought its security infrastructure into the modern age.
  • Cyber Staffing Shortages Remain CISOs' Biggest Challenge

  • Besides operational issues connected to a talent shortage, the cost of running security platforms — and their training costs — also keeps CISOs up at night.
  • Mustang Panda Feeds Worm-Driven USB Attack Strategy

  • A fresh wave of attacks on APAC government entities involves both self-propagating malware spreading via removable drives and a spear-phishing campaign.
  • Platform Engineering Is Security Engineering

  • For modern applications built on Kubernetes and microservices, platform engineering is not just about building functional systems but also about embedding security into the fabric of those systems.
  • Dark Reading Confidential: Pen Test Arrests, Five Years Later

  • Episode 3: On September 11, 2019, two cybersecurity professionals were arrested in Dallas County, Iowa and forced to spend the night in jail -- just for doing their jobs. Gary De Mercurio and Justin Wynn. Despite the criminal charges against them eventually being dropped, the saga that night five years ago continues to haunt De Mercurio and Wynn personally and professionally. In this episode, the pair and Coalfire's CEO Tom McAndrew share how the arrest and fallout has shaped their lives and careers as well as how it has transformed physical penetration tests for the cybersecurity industry as a whole.
  • Gallup.com Bugs Open Door to Election Misinformation

  • Researchers flagged a pair of Gallup polling site XSS vulnerabilities that could have allowed malicious actors to execute arbitrary code, access sensitive data, or take over a victim account.
  • Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets

  • A PRC threat cluster known as "Crimson Palace" is demonstrating the benefits of having specialized units carry out distinct stages of a wider attack chain.
  • 10 Writing Tips for Cybersecurity Professionals

  • It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.
  • Akira Ransomware Actors Exploit SonicWall Bug for RCE

  • CISA has added CVE-2024-40766 to its Known Exploited Vulnerabilities catalog.
  • 300K Victims' Data Compromised in Avis Car Rental Breach

  • Though the company reports that data was exfiltrated in the breach, it has been remained tightlipped regarding the kind of data that was exposed.
  • How to Establish & Enhance Endpoint Security

  • Endpoint security has been around for decades, but changes in device use and the quick evolution of new attacks have triggered the development of new security techniques.
  • 'TIDrone' Cyberattackers Target Taiwan's Drone Manufacturers

  • The Chinese-speaking group is launching sophisticated malware towards military and satellite targets globally.
  • Feds Warn on Russian Actors Targeting Critical Infrastructure

  • In the past, Putin's Unit 29155 has utilized malware like WhisperGate to target organizations, particularly those in Ukraine.
  • CISA Flags ICS Bugs in Baxter, Mitsubishi Products

  • The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.
  • Commercial Spyware Use Roars Back Despite Sanctions

  • Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to limit their use.
  • Cybersecurity Talent Shortage Prompts White House Action

  • The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles staffed.
  • FreeBSD Gets €686,400 to Boost Security Features

  • The funds from Germany's Sovereign Tech Fund will be used to integrate zero-trust capabilities, tools for software bill of materials, and other security features.
  • Using Transparency & Sharing to Defend Critical Infrastructure

  • No organization can single-handedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats
  • What Is the Shared Fate Model?

  • New threats, an overburdened workforce, and regulatory pressures mean cloud service providers need a more resilient model than the shared responsibility framework. That's where "shared fate" comes in.
  • HackerOne Appoints Kara Sprague As CEO

  • Kiteworks Bolsters Its Secure Data Collection Capabilities With 123FormBuilder Acquisition

  • Palo Alto Networks® Closes Acquisition of IBM's QRadar SaaS Assets

  • Malvertising Campaign Builds a Phish for Lowe's Employees

  • Retail employees are being duped into divulging their credentials by typosquatting malvertisements.
  • Chinese 'Tropic Trooper' APT Targets Mideast Governments

  • In the past, the group has targeted different sectors in East and Southeast Asia, but recently has pivoted its focus to the Middle East, specifically to entities that publish human rights studies.
  • China's 'Earth Lusca' Propagates Multiplatform Backdoor

  • The malware, KTLVdoor, has already been found on more than 50 command-and-control servers and enables full control of any environment it compromises.
  • Biden Admin Files Charges Against Election Meddlers From Russia

  • Working with the Treasury and Justice departments, the president has sanctioned anti-democratic Russian adversaries.
  • The Role of Trust Anchors in Modern IT Security

  • To fully realize the benefits trust anchors provide, organizations need to implement processes and technologies that maintain the privacy and security of trust anchors and the personal data they contain.
  • Indian Army Propaganda Spread by 1.4K AI-Powered Social Media Accounts

  • For three years now, more than a thousand social media accounts have been reposting the same pro-India, anti-Pakistan content on Facebook and X.
  • White House Unveils Road Map to Fix BGP

  • The White House Office of the National Cyber Director released a plan outlining steps network operators and service providers need to take to secure BGP from abuse and configuration errors.
  • 'Revival Hijack' on PyPI Disguises Malware With Legitimate File Names

  • Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
  • Open Source Tool Allows Voters to Verify Election Results

  • The ElectionGuard project allows anyone — voters, campaign staffers, and election officials — to cryptographically verify ballots, a promise that may bolster faith in election integrity.
  • FBI: North Korean Actors Readying Aggressive Cyberattack Wave

  • Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.
  • How CISOs Can Effectively Communicate Cyber-Risk

  • A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.
  • CEO's Arrest Will Likely Not Dampen Cybercriminal Interest in Telegram

  • In recent years, the platform has become a go-to tool for executing almost all conceivable cybercriminal activity.
  • California Approves Privacy Bill Requiring Opt-Out Tools

  • This bill requires Web browsers to have an easy-to-find (and use) setting for consumers to send an opt-out preference signal by default to every site and app they interact with.
  • North Korea's 'Citrine Sleet' APT Exploits Zero-Day Chromium Bug

  • Microsoft warned that the DPRK's latest innovative tack chains together previously unknown browser issues, then adds a rootkit to the mix to gain deep system access and steal crypto.
  • City of Columbus Sues Researcher After Ransomware Attack

  • The Ohio city filed for a restraining order, claiming the researcher was working in tandem with the ransomware attackers.

IT News

  • Meet the finalists of the inaugural iTnews Benchmark Awards: Security

  • Winners to be announced October 16 in Sydney.
  • Transurban using AI to aid toll collection

  • Results in 40 percent fewer license plate images being sent for human review.
  • FCC chair wants more competition to Starlink

  • Works with new entrants to space-based internet.
  • Ex-Google exec said goal was to 'crush' competition

  • In then-nascent online advertising business.
  • Whitehaven Coal set new IT foundations for two mines in six months

  • After buying the metallurgical coal mines from BMA.
  • Whitehaven Coal set new IT foundations for two mines in six months

  • After buying the metallurgical coal mines from BMA.
  • Why maintaining your hardware can improve your cloud journey

  • Modern IT environments can be incredibly complicated with organisations today operating a mix that includes public and private clouds, as well as on premises and hosted solutions.
  • NAB retires its Tableau environment

  • As part of continuing Ada migration.
  • NAB retires its Tableau environment

  • As part of continuing Ada migration.
  • Nine's web app protection blocked 96m bad requests in 2024 Olympics

  • Traffic increased "four-fold" during Paris games.
  • Oracle shares jump as AI push perks up cloud demand

  • Coincides with partnerships with other cloud services providers.
  • News Corp would lose US$9 million by ditching Google ads

  • Former executive testifies.
  • James Cook University accelerates digital roadmap and cyber uplift

  • New CDO charged with delivering “refreshed five-year digital strategy”.
  • James Cook University accelerates digital roadmap and cyber uplift

  • New CDO charged with delivering “refreshed five-year digital strategy”.
  • Coles Group calculates a TCO for its enterprise applications

  • Helps understand what is driving tech spend.
  • Coles Group calculates a TCO for its enterprise applications

  • Helps understand what is driving tech spend.
  • South Korea summit to target 'blueprint' for using AI in the military

  • Agreement is not expected to be binding.
  • US proposes requiring reporting for advanced AI, cloud providers

  • To ensure the technologies are safe and can withstand attacks.
  • US proposes requiring reporting for advanced AI, cloud providers

  • To ensure the technologies are safe and can withstand attacks.
  • US proposes requiring reporting for advanced AI, cloud providers

  • To ensure the technologies are safe and can withstand attacks.

Lukewarm Security Info
  • RSS
  • GitHub
Created by Kludron