News

Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.

0 Comments
Researchers have disclosed an out-of-bounds read vulnerability in the Squirrel programming language that can be abused by attackers to break out of the sandbox restrictions and execute arbitrary code within a SquirrelVM, thus giving a malicious actor complete access to the underlying machine. Tracked as CVE-2021-41556, the issue occurs when a game library referred to
0 Comments
As CIOs and their organizations deploy more connected devices and build out more extensive IoT environments, many struggle to secure those ecosystems and all the data generated. Cryptography is a useful counter to those challenges. Cryptography uses codes to protect information and communications, making it inaccessible to all but those authorized to decipher the codes.
0 Comments
The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS), highlighting five incidents that occurred between March 2019 and August 2021. “This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide clean, potable water
0 Comments
Mounting frustration with the Apple Security Bounty program could have tangible consequences for the tech giant, as some security researchers said they are considering selling their vulnerability discoveries to zero-day brokers and other third parties. Since Apple launched its bug bounty program to the public in 2019, several security researchers have criticized the program for
0 Comments
What is a Uniform Resource Identifier (URI)? A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource — usually, but not always, connected to the internet. A URI distinguishes one resource from another. URIs enable internet protocols to facilitate interactions between and among these resources. The strings of
0 Comments
Google’s Threat Analysis Group (TAG) on Thursday said it’s tracking more than 270 government-backed threat actors from more than 50 countries, adding it has approximately sent 50,000 alerts of state-sponsored phishing or malware attempts to customers since the start of 2021. The warnings mark a 33% increase from 2020, the internet giant said, with the
0 Comments
When it comes to security challenges, businesses of all sizes are alarmed by the abundance and gravity of ransomware attacks. Cybercriminals have targeted every industry with specialized malware, collecting untold amounts in ransom. This comprehensive guide on ransomware explains the types of attacks, common attack vectors, prevention methods and tools, and best practices for recovery.
0 Comments
A now-patched critical vulnerability in OpenSea, the world’s largest non-fungible token (NFT) marketplace, could’ve been abused by malicious actors to drain cryptocurrency funds from a victim by sending a specially-crafted token, opening a new attack vector for exploitation. The findings come from cybersecurity firm Check Point Research, which began an investigation into the platform following
0 Comments
As enterprises add more security layers to protect their environments, one underpinning technology helps IT to connect the dots if a security incident occurs. Administrators have experienced management growing pains when the organization enlists more cloud services, but the Microsoft Graph is the company’s recent initiative to provide a consistent way to gather information from
0 Comments
Although organizations commonly go to great lengths to address security vulnerabilities that may exist within their IT infrastructure, an organization’s helpdesk might pose a bigger threat due to social engineering attacks. Social engineering is “the art of manipulating people so they give up confidential information,” according to Webroot. There are many different types of social
0 Comments
The Apache Software Foundation on Thursday released additional security updates for its HTTP Server product to remediate what it says is an “incomplete fix” for an actively exploited path traversal and remote code execution flaw that it patched earlier this week. CVE-2021-42013, as the new vulnerability is identified as, builds upon CVE-2021-41773, a flaw that
0 Comments
Data centers must demonstrate compliance with industry-standard guidelines. This quick checklist can help data centers develop data compliance strategies to ensure the security of their customers’ data and maintain high operational standards. Data centers are responsible for ensuring secure data handling on behalf of an organization’s customers. A single data outage or breach can devastate
0 Comments
Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously unrecognized Linux malware that’s engineered to enable remote access to its operators, in addition to amassing credentials and function as a proxy server. The malware family, dubbed “FontOnLake” by Slovak cybersecurity firm ESET, is said to feature “well-designed
0 Comments
An “aggressive” financially motivated threat actor has been identified as linked to a string of RYUK ransomware attacks since October 2018, while maintaining close partnerships with TrickBot-affiliated threat actors and using a publicly available arsenal of tools such as Cobalt Strike Beacon payloads to interact with victim networks. Cybersecurity firm Mandiant attributed the intrusions to
0 Comments
A high-severity code injection vulnerability has been disclosed in 23andMe’s Yamale, a schema and validator for YAML, that could be trivially exploited by adversaries to execute arbitrary Python code. The flaw, tracked as CVE-2021-38305 (CVSS score: 7.8), involves manipulating the schema file provided as input to the tool to circumvent protections and achieve code execution.
0 Comments
Did you know, the timing of Hispanic Heritage Month coincides with the Independence Day celebrations of several Latin American nations? At McAfee Enterprise, we’re celebrating Hispanic Heritage Month by recognizing some of our amazing employees and asking them about their heritage and the impact it had on their career and journey to cybersecurity. Read my
0 Comments
Details have emerged about a new cyber espionage campaign directed against the aerospace and telecommunications industries, primarily in the Middle East, with the goal of stealing sensitive information about critical assets, organizations’ infrastructure, and technology while remaining in the dark and successfully evading security solutions. Boston-based cybersecurity company Cybereason dubbed the attacks “Operation Ghostshell,” pointing
0 Comments
Cybersecurity researchers on Tuesday revealed details of a previously undocumented UEFI (Unified Extensible Firmware Interface) bootkit that has been put to use by threat actors to backdoor Windows systems as early as 2012 by modifying a legitimate Windows Boot Manager binary to achieve persistence, once again demonstrating how technology meant to secure the environment prior
0 Comments
Two suspected members of an unnamed ransomware gang have been arrested in Ukraine. The coordinated operation involving the French National Gendarmerie, the Ukrainian National Police, the FBI, Europol and Interpol led to two arrests Tuesday, along with the seizure of $375,000 in cash. Additionally, the joint effort resulted in the takedown of luxury vehicles worth
0 Comments
A newly discovered data exfiltration mechanism employs Ethernet cables as a “transmitting antenna” to stealthily siphon highly-sensitive data from air-gapped systems, according to the latest research. “It’s interesting that the wires that came to protect the air-gap become the vulnerability of the air gap in this attack,” Dr. Mordechai Guri, the head of R&D in
0 Comments
Disaster recovery and IT security personnel must take ransomware and other cybersecurity attacks seriously. Even if there is a ransomware recovery plan in place, ransomware technology and methods are constantly evolving. Periodic exercises of cybersecurity response and recovery plans ensure that organizations can minimize the effects of cyber attacks and protect the business and its
0 Comments
In yet another indicator of how hacking groups are quick to capitalize on world events and improvise their attack campaigns for maximum impact, threat actors have been discovered impersonating Amnesty International to distribute malware that purports to be security software designed to safeguard against NSO Group’s Pegasus surveillanceware. “Adversaries have set up a phony website
0 Comments
A formerly unknown Chinese-speaking threat actor has been linked to a long-standing evasive operation aimed at South East Asian targets as far back as July 2020 to deploy a kernel-mode rootkit on compromised Windows systems. Attacks mounted by the hacking group, dubbed GhostEmperor by Kaspersky, are also said to have used a “sophisticated multi-stage malware
0 Comments
Risk assessments and business impact analyses are crucial resources in a disaster recovery plan. While the two processes may sound similar on the surface, they each serve a different critical function. While a BIA helps identify an organization’s most critical business processes and describes the potential impact of a disruption to those processes, a risk