17. July 2021

Threat Actors are Working Together. Defenders Should Collaborate Too!

XKCD ‘Board Game Argument: Legacy’

BSides Vancouver 2021 – Eric Payne’s ‘Take Down Cyberthreat Dwell Time With Kaspersky Optimum Security’

It’s Time to Issue Company Passwords Again

The Importance Of Protecting Your App’s Source Code

The Internet of Things Ongoing Directions

Google issues patches for Chrome flaw for Windows, Mac and Linux

Critical Chrome 0-Day Vulnerability Exploited in Wide – Update Your Chrome Now!!

How Can CCSP Certification Help Your Organization?

BSidesNoVA 2021 – Rich Wickersham’s, David Martin’s, Dan Higham’s And Robert Lowe’s ‘Panel: Cyber Engineering & Architecture’

Russia Based Company, DDoS – Guard gets Targeted by Cybercriminals

Toddler Android Banking Malware Spreads Across Europe

SpearTip: New Diavol Ransomware Does Steal Data

US govt offers $10 million reward for info on nation-state cyber operations

Biden Puts a $10M Bounty on Foreign Hackers

$10 Million US Dollars, Missing Ransomware Gangs, and so much more!

China’s New Law Requires Researchers to Report All Zero-Day Bugs to Government

Private Internet Access deal: Get two years on up to 10 devices for just $70

Top Stories: Apple Debuts MagSafe Battery Pack, iOS 15 Beta 3, and More

How the U.S. became the world’s new bitcoin mining hub

Meet WiFiDemon – iOS WiFi RCE 0-Day Vulnerability, and a Zero-Click Vulnerability That Was Silently Patched

Instagram Launches ‘Security Checkup’ to Help Users Recover Hacked Accounts

CloudFlare CDNJS Bug Could Have Led to Widespread Supply-Chain Attacks

Cisco fixes high-risk DoS flaw in ASA, FTD Software

One Year After Europe’s Schrems II Decision, Privacy Activist Bemoans Lack of Progress

The Notorious REvil Ransomware Gang Go Offline

Biden’s Cybersecurity Team Gets Crowded at the Top

Stop Google tracking your location

D-Link issues beta hotfix for multiple flaws in DIR-3040 routers

BASE85 Decoding With base64dump.py, (Sat, Jul 17th)

WooCommerce Patched a Bug that Threatened Databases of Prominent Sites

‘Build’ or ‘Buy’ your own antivirus product

To My Fellow CEOs: Cyber Security is your Business Too!

Essential Features of Advanced Endpoint Security for Businesses

Igniting Passion for Diversity, Equity and Inclusion (DEI): Cybersecurity Professionals Address Challenges and Offer Tangible Advice for Weaving Inclusion into Our Industry

Six Steps to Protect Your Organization from Ransomware | #RansomwareWeek

The eSIM technology stimulates the growth of the IoT market in Russia

NS1 Traffic Analysis Dashboards provide visibility into application delivery at the edge

NewgenONE: A digital transformation platform that simplifies complex business processes

Amazon HealthLake enables healthcare organizations to store, transform, and query health data in the cloud

Vacationing? How to avoid the cybersecurity blues

Google patches Chrome zero‑day vulnerability exploited in the wild

Week in security with Tony Anscombe

Haystack Solutions CATA identifies cognitive abilities of individuals entering or upskilling in cybersecurity

Kaseya attack: How ransomeware attacks are like startups and what we need to do about that

What is a PCI Audit? And How to Get Your Business Ready

SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab

Amazon asked Apple to remove an app that spots fake reviews, and Apple agreed

AI and financial processes: Balancing risk and reward

Aerospike expands Accelerate Partner Program to speed up partner ramp to revenue

Red Hat renews FIPS 140-2 security validation for Red Hat Enterprise Linux 8.2

SecurEnds raises $21M to scale operations and product development

OmniSci promotes Pey Silvester to VP of Engineering

Apple Donating to Flood Relief Efforts Across Germany, Belgium and The Netherlands

John Zissimos joins Okta as Chief Digital Officer

Kaseya ransomware attack should be a wake-up call to all of us, expert says

Kaseya attack: “Yes, we can do something about this, and we should do something about this”

Hackers Got Past Windows Hello by Tricking a Webcam

‘Fakespot’ Removed From Apple’s App Store After Complaint From Amazon

IT Security News Daily Summary 2021-07-16

SolarWinds hackers exploited iOS 0-day to compromise iPhones

How disinformation monitoring helps agencies break down attacks

Fixing ‘concept drift’: Retraining AI systems to deliver accurate insights at the edge

Top CVEs Trending with Cybercriminals

Linux Variant of HelloKitty Ransomware Targets VMware ESXi Servers

iOS 15’s Focus Mode Helps You Stay on Task

Right or Left, You Should Be Worried About Big Tech Censorship

Common Security Lapses That Empower Cybercriminals

Researchers Create New Approach to Detect Brand Impersonation

Bad bot activity on sports betting websites rises during Euro 2020

How to leverage accountability to ensure sustainable enterprise data security

An Overall Philosophy on the Use of Critical Threat Intelligence

How to install SELinux on Ubuntu Server 20.04

REvil is Off-Line

New LinkedIn phishing campaign found using Google Forms

3 Myths About Threat Actors and Password Safety

FAA seeks best practices for drone-based infrastructure inspections

NSF seeks partners for blockchain business programs

The number of false positive security alerts is staggering. Here’s what you can do to reduce yours

Cybersecurity News Round-Up: Week of July 16, 2021

With 5G coming, it’s time to plug security gaps

Tesla “Recalls” Vehicles in China due to Safety Glitch

5 #TrendTips for Open Source Security

Main Considerations for Securing Enterprise 5G Networks

This Week in Security News – July 16, 2021

How To Manage a Remote Workforce So as To Protect Them From Cyber Threats

Kaseya victim struggling with decryption after REvil goes dark

This npm Package Could Have Brought Down Cloudflare’s Entire CDN and Millions of Websites

What’s at Stake When the Transportation Sector Lags Behind in Cybersecurity

Some Apple Stores Decorated in Flag Colors to Celebrate New International Apple Watch Bands

What Cops Understand About Copyright Filters: They Prevent Legal Speech

How to configure SSL/TLS for a Http Client or a Server

Deals: AirPods Max Hit $100 Off for the First Time, Get All Colors at $449

Recent Attacks Lead to Renewed Calls for Banning Ransom Payments

MacRumors Giveaway: Win a Luna Display Adapter to Turn an iPad or Mac Into a Second Screen

Targeted Phishing Attack against Ukrainian Government Expands to Georgia

Congress might not clear defense spending, policy bills until December

IoT Attacks Increased 700% in just over Two Years

Australian Organizations Spent $55 Million in Ransom Payments

Defcon Talk Prompts New Windows Print Spooler Flaw Warning

Apple Seeds Second Public Betas of iOS 15, iPadOS 15, tvOS 15, and watchOS 8

Apple Releases Second Public Beta of macOS 12 Monterey

Don’t Let Police Arm Autonomous or Remote-Controlled Robots and Drones

Critical Juniper Bug Allows DoS, RCE Against Carrier Networks

The Evolving Role of the CISO

Israel Launches Anti-Ransomware Campaign to Prevent Cyberattacks

State Department Pays up to $10M for Information on Foreign Cyberattacks

Apple Seeds Second Public Betas of iOS 15 and iPadOS 15

Will China Retaliate Against U.S. Chip Sanctions?

You’ll want to shut down the Windows Print Spooler service (yes, again): Another privilege escalation bug found

REvil Ransomware Uses DLL Sideloading

Cisco Patches High-Risk Flaw in ASA, FTD Software

Kremlin Does Not Know Why All Websites Linked to Hacker Group REvil Are Down

ClearDATA Announces Support for AWS for Health Initiative

Are you READY for (ISC)² Security Congress?

DoD Adds Two More (ISC)² Certifications to Requirements for Cybersecurity Staff

Six existential threats posed by the future of 5G (Part Two)

Cyber Insurers Might Be Making the Ransomware Problem Worse

Banks now rely on a few cloud computing giants. That’s creating some unexpected new risks

Wanted: State-backed bandits planning cyberattacks on US infrastructure. Reward: $10m

Apple Watch Chief Kevin Lynch to Work on Apple Car Development

Ransomware threat to SonicWall Customers

BrandPost: Achieving Zero Trust with Network Data

BrandPost: How a Higher-Ed Institution Validates Security Incidents in Minutes with ExtraHop

BrandPost: ExtraHop Contributes Network Security Expertise to MITRE ATT&CK Framework

US offers huge reward in fight against state-sponsored cybercriminals

Windows 0-Days Used Against Dissidents in Israeli Broker’s Spyware

Critical WooCommerce Vulnerability Targeted Hours After Patch

Google: New Chrome Zero-Day Being Exploited

More PrintNightmare: “We TOLD you not to turn the Print Spooler back on!”

LogRhythm is a Nine-Time Gartner SIEM Magic Quadrant Leader

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

How can we get rid of them and why law enforcement is not really the answer

Here are the Top Online Scams You Need to Avoid Today

A procurement paradigm for digital government

Biden’s executive order on federal workforce equity: What happens next

4 healthcare risk management tips for secure cloud migration

Want to earn $10 million? Snitch on a cybercrook!

Fashion Retailer Guess Confirms Data Breach

Google Releases Security Updates for Chrome

Cisco Releases Security Updates

Deals: Get the HomePod Mini for $89.99 at B&H Photo ($9 Off)

iPhone 12 Depreciates Less Than iPhone 11, Study Finds

Iranian APT Charming Kitten Attempts to Steal Private Data from Specialists Who Study the Middle East

Forefront Dermatology Data Breach Affects 2.4 Million Patients

Fraudsters siphoned off unemployment benefits from recipients in the throes of the pandemic

Why the Fed hates cryptocurrencies and especially stablecoins

Critical Vulnerabilities Spotted In WordPress Plugin Frontend File Manager

FCW Insider: July 16, 2021

Artwork Archive cloud storage misconfiguration exposed user data

Fastest VPN 2021: Top services tested and compared

Palo Alto Networks’ Unit 42 Publishes Report on Mespinoza Group

4 Future Integrated Circuit Threats to Watch

Microsoft alerts about a new Windows Print Spooler vulnerability

Microsoft: New Unpatched Bug In Windows Print Spooler

Hooking Candiru: Another Mercenary Spyware Comes Into Focus

Chinese APT LuminousMoth Abuses Zoom Brand For Gov’t Attacks

U.S. Gov’t Offers $10 Million For Info On Hackers Targeting Infrastructure

U.S. Customs Seizing Record Numbers of Counterfeit Wireless Headphones Since AirPods Pro Launched

COVID-19 Vaccine Passports: 5 Security Tips for You and Your Family

The Security Threat of Voice Cloning | Avast

When ‘Later’ Never Comes: Putting Small Business Cybersecurity First

Vulnerabilities in Etherpad Collaboration Tool Allow Data Theft

Google Adds HTTPS-First Mode to Chrome

How to Attract More Computer Science Grads to the Cybersecurity Field

3 reasons to use network diagram software

Hackers Could Locally Exploit a New Windows Spooler Vulnerability

A Cryptomining Farm Was Discovered in Ukraine

Popular Fashion Seller Guess Alerts Its Clients Over Possible Data Breach

Artwork Archive cloud storage misconfiguration exposed user data, revenue records

Apple Arcade Gets Three New Classics, Including Angry Birds Reloaded

IoT Malware Infections Increased by 700% Amid COVID-19 Pandemic

Hackers Can Locally Exploit a New Windows Spooler Vulnerability and Gain System Privileges

Google Parts Ways With Cloudera Cofounder – Report

Securiti allies with Snowflake to manage and secure data

Leveraging API Hooking for code deobfuscation with Frida

Toddler mobile banking malware surges across Europe

Microsoft: New Unpatched Bug in Windows Print Spooler

Jihadist content targeted on Internet Archive platform

Google Chrome 91.0.4472.164 fixes a new zero-day exploited in the wild

The HelloKitty Ransomware Linux Version Targets VMware ESXi Servers

Biden Administration announces flurry of new anti-ransomware efforts

WhatsApp Tests Message Sending Without Smartphone

UK Spy Agency Releases Annual Threat Report

Israeli Firm Helped Governments Target Journalists, Activists with 0-Days and Spyware

Social Security Numbers Exposed Following Tulsa Ransomware Attack

WooCommerce Fixes Bug Affecting Millions of WordPress Websites

DevilsTongue Spyware Targets Windows Zero-Day Vulnerabilities

Does using a VPN slow down your Internet?

Battery Gigafactory Planned For Coventry

Check Point Software named a “Champion” in Global Security Leadership Matrix 2021

Chinese APT LuminousMoth abuses Zoom brand to target gov’t agencies

Several Vulnerabilities Patched in ‘MDT AutoSave’ Industrial Automation Product

Trump Hacker and Friends on a Mission to Fix the Internet

Threat Actors Use Marvel’s Black Widow Movie To Spread Malware

25 Free & Open Source Cybersecurity Tools for Businesses

Addressing User Access in IT Security Compliance

OneLogin Eases Adoption of Zero Trust Framework with Delegated Administration

Asian Government Entities Targeted by Chinese Cyberspies in APT Campaign

What is scareware?

The 15 biggest data breaches of the 21st century

Move over XDR, it’s time for security observability, prioritization, and validation (SOPV)

Child trafficking: 92 minor victims identified across Europe

Facebook Suspends Accounts Used by Iranian Hackers to Target US Military Personnel

New enhanced Joker Malware samples appear in the threat landscape

Twitter Testing New Edge-to-Edge Timeline Layout for Photos, Surveys Users on Ability to Edit Tweets

U.S. Government sets up ransomware task force, offers $10 million reward for info

Microsoft points the finger at Israeli spyware seller for DevilsTongue attacks

1.2 Million People Affected by Practicefirst’s Supply Chain Ransomware Breach

Multiple BaseXX Obfuscations, (Fri, Jul 16th)

Didi shares tank 7% after Chinese regulators visit the ride-hailing giant for cybersecurity review

Apple Holds Screening Event of ‘Ted Lasso’ Season Two Ahead of Global Premiere Next Week

Want your endpoint security product in the ‘Microsoft Consumer Antivirus Providers for Windows’ ?

May ransomware blight all the cyber stragglers and let God sort them out

Ask Chloé: Returning to the Office

Weekly Update 252

Source Defense is One of the First to Offer Critical Security Technology in the SecurityScorecard Integrate360° Marketplace

Threat Modeling in the Age of Automation

New infosec products of the week: July 16, 2021

Chinese regulators from 7 departments visit Didi for cybersecurity review

15-Year-Old Linux Netfilter Vulnerability Let Hackers Bypass All Modern Security Mitigations

How to strike the balance between privacy and personalization in healthcare and beyond

A Tsunami of Cyber Crimes ejected by Australian Ransomware Payments

Morgan Stanley Customer Data accessed by hackers

Windows Print Spooler hit with local privilege escalation vulnerability

Update Your Chrome Browser to Patch New Zero‑Day Bug Exploited in the Wild

The rise of the Developer Experience Engineer, and why it matters

ESET: new generation viruses will be able to imitate human behavior

Microsoft Warns of New Unpatched Windows Print Spooler Vulnerability

Physical threats increase as employees return to the office

Security Evangelist or Zealot – Where to Draw the Line

(ISC)² Offers Free Access to Ransomware Education | #RANSOMWAREWEEK

How a man used a fake finger to trick his smartphone biometrics

57% of reported incidents are caused by insiders

Governance metrics lagging in ESG reporting across major organizations

Small Businesses Save Up to 60% in McAfee and Visa Partnership

Move to all-flash object storage to occur within five years

A brief guide on building audio and video live streaming platform

Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

Bug bounty platform urges need for firms to have vulnerability disclosure policy

ISC Stormcast For Friday, July 16th, 2021 https://isc.sans.edu/podcastdetail.html?id=7588, (Fri, Jul 16th)

Platform9 Managed KubeVirt unifies virtual machines and Kubernetes stacks

Strata Maverics Identity Discovery reduces cloud migration project times from months to hours

Sunlight Infrastructure Manager and Marketplace simplifies deployment of apps in edge environments

Spectral Logs enables additional layer to existing protection of code and data

Qrypt Quantum Data at Rest app offers secure data storage with one-time pad encryption

The Tower of Babel: How Public Interest Internet is Trying to Save Messaging and Banish Big Social Media

Sports events and online streaming: prepare your cybersecurity

GuidePoint Security expands its IAM consulting practice to reduce cyber risk

1Password Events API delivers real-time insight on password activity

Tech & Terrorism: Facebook Puts Onus On Users to Identify Extremism

Microsoft, Google, Citizen Lab blow lid off zero-day bug-exploiting spyware sold to governments

Securiti partners with Snowflake to enable protection of sensitive data in the Data Cloud

Kloudspot and Cisco Meraki help organizations offer safer and smarter workspace experiences

Build a data lakehouse to avoid a data swamp

Today’s Headlines and Commentary

Verge.io partners with CloudFabrix to provide data center transformation for organizations

Gas station owners sue Colonial Pipeline after ransomware attack

Generated on 2021-07-17 23:55:30.761624