Cyber Security News


  • Cloudflare launches a paid public bug bounty program

    February 1, 2022

    Cloudflare, an American company focused on web infrastructure and website security, has announced the launch of a new public bug bounty program. “Today we are launching Cloudflare’s paid public bug bounty program,” said Rushil Shah, a Product Security Engineer at Cloudflare. Read more… Source: Bleeping Computer  

  • Update now: Samba prior to 4.13.17 hit with remote root code execution bug

    February 1, 2022

    Samba has fixed a vulnerability in all versions of its software prior to version 4.13.17 that allowed for a remote actor to execute code as root, thanks to an out-of-bounds heap read write vulnerability. “The specific flaw exists within the parsing of EA metadata when opening files in smbd. Access as a user that has write ...

  • Powerful new Oski variant ‘Mars Stealer’ grabbing 2FAs and crypto

    February 1, 2022

    A new and powerful malware named ‘Mars Stealer’ has appeared in the wild, and appears to be a redesign of the Oski malware that shut down development abruptly in the summer of 2020. Mars Stealer is an information-stealing malware that steals data from all popular web browsers, two-factor authentication plugins, and multiple cryptocurrency extensions and wallets. Additionally, ...

  • Shell forced to reroute supplies after cyberattack on two German oil companies

    February 1, 2022

    A cyberattack on two German oil suppliers has forced energy giant Shell to reroute oil supplies to other depots, according to Reuters and the Handelsblatt newspaper. Handelsblatt was the first to report on Monday that oil companies Oiltanking and Mabanaft, both owned by German logistics conglomerate Marquard & Bahls Group, had suffered a cyberattack that crippled ...

  • Telehealth: A New Frontier in Medicine and Security

    February 1, 2022

    Telehealth today doesn’t just involve chatting with a doctor via a video-conferencing application. It’s become an entire collection of rapidly developing technologies and products that includes specialized applications, wearable devices, implantable sensors, and cloud databases, many of which have only appeared in the past couple of years. However, telehealth in its current form began to take ...

  • Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables

    January 31, 2022

    MuddyWater has conducted various campaigns against entities spread throughout the U.S.A, Europe, Middle East and South Asia. A typical TTP employed by the group is the heavy use of scripting in their infection chains using languages like PowerShell and Visual Basic coupled with the frequent use of living-off-the-land binaries (LoLBins). Cisco Talos recently observed a campaign operated ...

  • Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics

    January 31, 2022

    The FBI is warning entities associated with the February 2022 Beijing Winter Olympics and March 2022 Paralympics that cyber actors could use a broad range of cyber activities to disrupt these events. These activities include distributed denial of service (DDoS) attacks, ransomware, malware, social engineering, data theft or leaks, phishing campaigns, disinformation campaigns, or insider ...

  • NSO Group Pegasus Spyware Aims at Finnish Diplomats

    January 31, 2022

    The controversial Pegasus spyware, developed by NSO Group, has been found on the devices of Finland’s diplomatic corps serving outside the country as part of a wide-ranging espionage campaign, according to Finnish officials. They also said the infections were of the zero-click variety. “The highly sophisticated malware has infected users’ Apple or Android telephones without their noticing ...

  • Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

    January 31, 2022

    he Russia-linked Shuckworm group (aka Gamaredon, Armageddon) is continuing to conduct cyber-espionage attacks against targets in Ukraine. Over the course of recent months, Symantec’s Threat Hunter Team, a part of Broadcom Software, has found evidence of attempted attacks against a number of organizations in the country. Active since at least 2013, Shuckworm specializes in cyber-espionage campaigns ...

  • CISA adds 8 vulnerabilities to list of actively exploited bugs

    January 31, 2022

    The US Cybersecurity & Infrastructure Security Agency (CISA) has added eight more flaws to its catalog of exploited vulnerabilities that are known to be used in attacks, and they’re a mix of old and new. The goal of publishing these vulnerabilities is to raise awareness and remind federal organizations of their obligation to apply security updates ...