Posts

FEATURED

"Ukraine blocks VPNFilter attack against core country water system" via Charlie Osborne / ZDNet

"On Thursday, the SBU alleged in a statement that Russian intelligence services are behind an attempted cyberattack against the network equipment of Aul Chlorotransfer Station, an entity based in the Dnipropetrovsk province which provides chlorination and filtering of clean water supplies. "Intelligence services specialists in the field of cybersecurity established that, over the course of several minutes, the company's technological process control systems and the systems for detecting signs of emergencies were being attacked by the VPNFilter computer virus from Russia," the report states [translated]."

"According to the SBU, VPNFilter malware was deployed in an attempt to disrupt this critical element of Ukraine's infrastructure."

"VPNFilter was uncovered in May when Cisco Talos researchers discovered 500,000 networking devices -- mainly consumer-grade internet routers -- across 54 countries which had been infected with ...MORE

"Newly Found Spectre Variants Bring New Concerns" via Curtis Franklin Jr. / Dark Reading

"Newly Found Spectre Variants Bring New Concerns" via Curtis Franklin Jr. / Dark Reading "The plague that is Spectre continues to evolve and adapt, showing up in two new variants this week dubbed Spectre 1.1 and Spectre 1.2 that follow the original Spectre's playbook while expanding on the ways they can do damage. Researchers Vladimir Kiriansky of MIT and Carl Waldspurger of Carl Waldspurger Consulting discovered the new variants of the vulnerabilities in Intel microprocessors. The pair earned a $100,000 bug bounty from Intel for their responsible reporting of the new exploits, which was paid through ..." MORE

New exploit targeting the recently reported "Double Kill" Windows vulnerability.

⚠️Researchers found a new exploit targeting the recently reported "Double Kill" vulnerability in Windows (ALL VERSIONS) has been added to the notorious RIG Exploit Kit.
» Dark Reading - Kelly Sheridan https://www.darkreading.com/analytics/windows-double-kill-attack-code-found-in-rig-exploit-kit/d/d-id/1331925
#DoubleKill
#Exploit
#Vulnerability
#Phishing
#Tech

⚠️ "Nigelthorn malware steals Facebook credentials, mines for cryptocurrency" via Charlie Osborne / ZDNet

⚠️ "Nigelthorn malware steals Facebook credentials, mines for cryptocurrency" via Charlie Osborne / ZDNet » https://www.zdnet.com/google-amp/article/nigelthorn-malware-steals-facebook-credentials-mines-for-cryptocurrency/
#Malware #Nigelthorn
#Facebook #Instagram
#Google #Chrome
#Windows #Linux
#CryptoJacking #Cryptomining
#SocialEngineering #ClickBait

CyberSecurity News for Week Ending 2018:04:28

“5 signs you've been hit with an advanced persistent threat (APT)” via Roger A. Grimes / CSO Online » https://www.csoonline.com/article/2615666/security/security-5-signs-you-ve-been-hit-with-an-advanced-persistent-threat.html

“North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign” via Kelly Jackson Higgins / Dark Reading » https://www.darkreading.com/threat-intelligence/north-korea-ramps-up-operation-ghostsecret-cyber-espionage-campaign/d/d-id/1331667

“Keep Hackers Locked Out of Hotel Rooms” via
Kacy Zurkus / InfoSecurity » https://www.infosecurity-magazine.com/news/keep-hackers-locked-out-of-hotel/

“Apple’s latest updates are out – APFS password leakage bug squashed” via Paul Ducklin / Naked Security » https://nakedsecurity.sophos.com/2018/04/27/apples-latest-updates-are-out-apfs-password-leakage-bug-squashed/

“Is End-to-End IoT Security Financially Feasible — or Even Possible?” via Kacy Zurkus / Security Intelligence » https://securityintelligence.com/is-…

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat" - Michael Lines

Good Article 》
"Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat" - Michael Lines / Dark Reading 》  https://www.darkreading.com/vulnerabilities---threats/meltdown-spectre-the-first-large-scale-example-of-a-genetic-threat/a/d-id/1331071?#CyberSecurity #CyberThreat #Vulnerability #Malware #Tech