β EU Offers Bug Bounties For 14 Open Source Projects β
π Read
via "Threatpost | The first stop for security news".
As the bug bounty programs begin to roll out in January, security experts worry that the programs miss the mark on truly securing open source projects.π Read
via "Threatpost | The first stop for security news".
Threat Post
EU Offers Bug Bounties For 14 Open Source Projects
Security experts worry that the bug bounty programs miss the mark on truly securing open source projects.
<b>⌨ Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack ⌨</b>
<code>Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.</code><code>San Juan Capistrano, Calif. based Data Resolution LLC serves some 30,000 businesses worldwide, offering software hosting, business continuity systems, cloud computing and data center services.</code><code>The company has not yet responded to requests for comment. But according to a status update shared by Data Resolution with affected customers on Dec. 29, 2018, the attackers broke in through a compromised login account on Christmas Eve and quickly began infecting servers with the Ryuk ransomware strain.</code><code>Media</code><code>Part of an update on the outage shared with Data Resolution customers via Dropbox on Dec. 29, 2018.</code><code>The intrusion gave the attackers control of Data Resolutionβs data center domain, briefly locking the company out of its own systems. The update sent to customers states that Data Resolution shut down its network to halt the spread of the infection and to work through the process of cleaning and restoring infected systems.</code><code>Data Resolution is assuring customers that there is no indication any data was stolen, and that the purpose of the attack was to extract payment from the company in exchange for a digital key that could be used to quickly unlock access to servers seized by the ransomware.</code><code>Media</code><code>A snippet of an update that Data Resolution shared with affected customers on Dec. 31, 2018.</code><code>The Ryuk ransomware strain was first detailed in an August 2018 report by security firm CheckPoint, which says the malware is tied to a sophisticated North Korean hacking team known as the Lazarus Group.</code><code>Ryuk reportedly was the same malware that infected the Los Angeles Timesβ Olympic printing plant over the weekend, an attack that led to the disruption of newspaper printing and delivery services for a number of publications that rely on the plant β including the Los Angeles Times and the San Diego Union Tribune.</code><code>A status update shared by Data Resolution with affected customers earlier today indicates the cloud hosting provider is still working to restore email access and multiple databases for clients. The update also said Data Resolution is in the process of restoring service for companies relying on it to host installations of Dynamics GP, a popular software package that many organizations use for accounting and payroll services. </code><code>Media</code><code>A status update shared by Data Resolution with affected customers on Jan. 2, 2018 shows the company is still struggling to restore services more than a week after the attack began.</code><code>Cloud hosting providers are often pitched as a way for companies to increase security and to better protect themselves from threats like ransomware, which scrambles data on infected systems and demands payment in exchange for a digital key needed to unlock affected systems.</code><code>At the same time, cloud providers represent an especially attractive target for ransomware attacks because they store vast amounts of data for other companies. In 2017, cloud hosting provider Cloudnine was hit by a ransomware attack, leading to an outage that lasted for several days.</code><code>Much depends on security practices maintained by each provider, according to an MIT Technology Review story last year that named cloud ransomware attacks as a top security concern for 2018</code><code>βThe biggest cloud operators, like Google, Amazon, and IBM, have hired some of the brightest minds in digital security, so they wonβt beβ¦
<code>Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.</code><code>San Juan Capistrano, Calif. based Data Resolution LLC serves some 30,000 businesses worldwide, offering software hosting, business continuity systems, cloud computing and data center services.</code><code>The company has not yet responded to requests for comment. But according to a status update shared by Data Resolution with affected customers on Dec. 29, 2018, the attackers broke in through a compromised login account on Christmas Eve and quickly began infecting servers with the Ryuk ransomware strain.</code><code>Media</code><code>Part of an update on the outage shared with Data Resolution customers via Dropbox on Dec. 29, 2018.</code><code>The intrusion gave the attackers control of Data Resolutionβs data center domain, briefly locking the company out of its own systems. The update sent to customers states that Data Resolution shut down its network to halt the spread of the infection and to work through the process of cleaning and restoring infected systems.</code><code>Data Resolution is assuring customers that there is no indication any data was stolen, and that the purpose of the attack was to extract payment from the company in exchange for a digital key that could be used to quickly unlock access to servers seized by the ransomware.</code><code>Media</code><code>A snippet of an update that Data Resolution shared with affected customers on Dec. 31, 2018.</code><code>The Ryuk ransomware strain was first detailed in an August 2018 report by security firm CheckPoint, which says the malware is tied to a sophisticated North Korean hacking team known as the Lazarus Group.</code><code>Ryuk reportedly was the same malware that infected the Los Angeles Timesβ Olympic printing plant over the weekend, an attack that led to the disruption of newspaper printing and delivery services for a number of publications that rely on the plant β including the Los Angeles Times and the San Diego Union Tribune.</code><code>A status update shared by Data Resolution with affected customers earlier today indicates the cloud hosting provider is still working to restore email access and multiple databases for clients. The update also said Data Resolution is in the process of restoring service for companies relying on it to host installations of Dynamics GP, a popular software package that many organizations use for accounting and payroll services. </code><code>Media</code><code>A status update shared by Data Resolution with affected customers on Jan. 2, 2018 shows the company is still struggling to restore services more than a week after the attack began.</code><code>Cloud hosting providers are often pitched as a way for companies to increase security and to better protect themselves from threats like ransomware, which scrambles data on infected systems and demands payment in exchange for a digital key needed to unlock affected systems.</code><code>At the same time, cloud providers represent an especially attractive target for ransomware attacks because they store vast amounts of data for other companies. In 2017, cloud hosting provider Cloudnine was hit by a ransomware attack, leading to an outage that lasted for several days.</code><code>Much depends on security practices maintained by each provider, according to an MIT Technology Review story last year that named cloud ransomware attacks as a top security concern for 2018</code><code>βThe biggest cloud operators, like Google, Amazon, and IBM, have hired some of the brightest minds in digital security, so they wonβt beβ¦
π The FTC's cyberinsurance tips: A must-read for small business owners π
π Read
via "Security on TechRepublic".
Cyberinsurance might be the only way to truly survive a full-blown cyberattack. Before small business owners shop for cyberinsurance, they should check out these guidelines from the FTC.π Read
via "Security on TechRepublic".
TechRepublic
The FTC's cyberinsurance tips: A must-read for small business owners
Cyberinsurance might be the only way to truly survive a full-blown cyberattack. Before small business owners shop for cyberinsurance, they should check out these guidelines from the FTC.
β Newsmaker Interview: Bruce Schneier on Physical Cyber Threats β
π Read
via "Threatpost | The first stop for security news".
Bruce Schneier discusses the clash between critical infrastructure and cyber threats.π Read
via "Threatpost | The first stop for security news".
Threat Post
Newsmaker Interview: Bruce Schneier on Physical Cyber Threats
Bruce Schneier discusses the clash between critical infrastructure and cyber threats.
π΄ US-CERT Offers Tips for Securing Internet-Connected Holiday Gifts π΄
π Read
via "Dark Reading: ".
Key steps to making those home Internet of Things devices just a bit safer.π Read
via "Dark Reading: ".
Dark Reading
US-CERT Offers Tips for Securing Internet-Connected Holiday Gifts
Key steps to making those home Internet of Things devices just a bit safer.
π΄ Data on 997 North Korean Defectors Targeted in Hack π΄
π Read
via "Dark Reading: ".
Nearly 1,000 North Koreans who defected to South Korea had personal data compromised by an unknown attacker.π Read
via "Dark Reading: ".
Dark Reading
Perimeter recent news | Dark Reading
Explore the latest news and expert commentary on Perimeter, brought to you by the editors of Dark Reading
π Website security paradox: What's a small business to do? π
π Read
via "Security on TechRepublic".
Small-business owners are considering whether to spend hard-earned money on historically less than effective cybersecurity and what it means if they don't. A security expert at GoDaddy weighs in.π Read
via "Security on TechRepublic".
TechRepublic
Website security paradox: What's a small business to do?
Small-business owners are considering whether to spend hard-earned money on historically less than effective cybersecurity and what it means if they don't. A security expert at GoDaddy weighs in.
π΄ Cyberattack Halts Publication for US Newspapers π΄
π Read
via "Dark Reading: ".
A virus disrupted print and delivery for the Chicago Tribune, Los Angeles Times, Baltimore Sun, and other US publications this weekend.π Read
via "Dark Reading: ".
Dark Reading
Perimeter recent news | Dark Reading
Explore the latest news and expert commentary on Perimeter, brought to you by the editors of Dark Reading
π΄ Ex-NSA Contractor Was a Suspect In Shadow Brokers Leak π΄
π Read
via "Dark Reading: ".
New court document shows law enforcement suspected possible involvement of Harold Martin in Shadow Brokers' release of classified NSA hacking tools.π Read
via "Dark Reading: ".
Darkreading
Ex-NSA Contractor Was a Suspect In Shadow Brokers Leak
New court document shows law enforcement suspected possible involvement of Harold Martin in Shadow Brokers' release of classified NSA hacking tools.
β Warn your friends they canβt bypass Facebook with this hoax β
π Read
via "Naked Security".
No, none of us can "bypass" Facebook's newsfeed algorithms by copy-pasting our way past them.π Read
via "Naked Security".
Naked Security
Warn your friends they canβt bypass Facebook with this hoax
No, none of us can βbypassβ Facebookβs newsfeed algorithms by copy-pasting our way past them.
β Dark Overlord hackers release alleged 9/11 lawsuit documents β
π Read
via "Naked Security".
The extortionists leaked a βsmall sampleβ of what they say are 18k classified legal documents containing 9/11 βtruthβ stolen from a law firm.π Read
via "Naked Security".
Naked Security
Dark Overlord hackers release alleged 9/11 lawsuit documents
The extortionists leaked a βsmall sampleβ of what they say are 18k classified legal documents containing 9/11 βtruthβ stolen from a law firm.
β US newspapers battle ransomware β
π Read
via "Naked Security".
On 29 December one of America's largest publishing groups, Tribune Media, found itself battling a major ransomware attack.π Read
via "Naked Security".
Naked Security
US newspapers battle ransomware
On 29 December one of Americaβs largest publishing groups, Tribune Media, found itself battling a major ransomware attack.
β Hackers Hijack Smart TVs to Promote PewDiePie β
π Read
via "Threatpost | The first stop for security news".
The same hacking duo behind the recent "PewDiePie" printer hacks are back - this time with publicly exposed Chromecast, Google Home and smart TV systems as their targets.π Read
via "Threatpost | The first stop for security news".
Threat Post
Hackers Hijack Smart TVs to Promote PewDiePie
The same hacking duo behind the recent "PewDiePie" printer hacks are back - this time with publicly exposed Chromecast, Google Home and smart TV systems as their targets.
π΄ Redefining Critical Infrastructure for the Age of Disinformation π΄
π Read
via "Dark Reading: ".
In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy.π Read
via "Dark Reading: ".
Darkreading
Redefining Critical Infrastructure for the Age of Disinformation
In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy.
β Snowdenβs Attorney Talks Govt Harrassment of Whistleblower Helpers (Part One) β
π Read
via "Threatpost | The first stop for security news".
Robert Tibbo discusses the challenges he and his clients face in Hong Kong as the government there targets both in a harassment campaign for aiding Edward Snowden.π Read
via "Threatpost | The first stop for security news".
Threat Post
Snowdenβs Attorney Talks Govt Harrassment of Whistleblower Helpers (Part One)
Robert Tibbo discusses the challenges he and his clients face in Hong Kong as the government there targets both in a harassment campaign for aiding Edward Snowden.
π΄ Town of Salem Game Breached, 7.6M Players Affected π΄
π Read
via "Dark Reading: ".
BlankMediaGames disclosed a data breach that affects millions using the browser-based role-playing game.π Read
via "Dark Reading: ".
Darkreading
Town of Salem Game Breached, 7.6M Players Affected
BlankMediaGames disclosed a data breach that affects millions using the browser-based role-playing game.
π Second-gen facial recognition tech aims to improve biometric security π
π Read
via "Security on TechRepublic".
Facial recognition technology is getting a second look from solutions vendors, though legal frameworks for how biometrics are used are out of date.π Read
via "Security on TechRepublic".
TechRepublic
Second-gen facial recognition tech aims to improve biometric security
Facial recognition technology is getting a second look from solutions vendors, though legal frameworks for how biometrics are used are out of date.
ATENTIONβΌ New - CVE-2017-18330
π Read
via "National Vulnerability Database".
Buffer overflow in AES-CCM and AES-GCM encryption via initialization vector in snapdragon automobile, snapdragon mobile and snapdragon wear in versions IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18329
π Read
via "National Vulnerability Database".
Possible Buffer overflow when transmitting an RTP packet in snapdragon automobile and snapdragon wear in versions MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 810, SD 820, SD 835, SD 845 / SD 850, SDA660, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18328
π Read
via "National Vulnerability Database".
Use after free in QSH client rule processing in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 820, SD 835, SDA660, SDM630, SDM660, Snapdragon_High_Med_2016.π Read
via "National Vulnerability Database".