"Ransomware Gang Leaks Data Allegedly Stolen From Canadian Hospitals"

"Ransomware Gang Leaks Data Allegedly Stolen From Canadian Hospitals"

Five Canadian hospitals have recently confirmed that patient and employee data that was stolen in a ransomware attack has been leaked online.  The data breach impacts Bluewater Health, Chatham-Kent Health Alliance, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare, and Windsor Regional Hospital, along with service provider TransForm Shared Service Organization.  A shared drive was compromised as part of the incident.

Submitted by Adam Ekwall on

"37 Vulnerabilities Patched in Android With November 2023 Security Updates"

"37 Vulnerabilities Patched in Android With November 2023 Security Updates"

Google recently announced patches for 37 vulnerabilities as part of the November 2023 Android security updates, with additional fixes released for Pixel devices.  The first part of the security update addresses 15 vulnerabilities in Android's Framework and System components.  Google noted that the most severe of these issues is a critical security vulnerability in the System component that could lead to local information disclosure with no additional execution privileges needed.

Submitted by Adam Ekwall on

"Cryptographers Solve Decades-Old Privacy Problem"

"Cryptographers Solve Decades-Old Privacy Problem"

Three researchers have discovered a long-sought way for secretly retrieving information from large databases, bringing us closer to fully private Internet searches. How to retrieve information from a public database without revealing anything about what was accessed is a critical question in cryptography. Developing a strategy to solve this problem, known as private information retrieval, is a valuable building block in many privacy-preserving applications, according to David Wu, a cryptographer at the University of Texas, Austin.

Submitted by Gregory Rigby on

"The Smart Home Tech Inside Your Home Is Less Secure Than You Think, New Northeastern Research Finds"

"The Smart Home Tech Inside Your Home Is Less Secure Than You Think, New Northeastern Research Finds"

New research by David Choffnes, an associate professor of computer science at Northeastern University, and a team of others explores the privacy and security flaws of smart home devices, also known as the Internet of Things (IoT). The team tested 93 IoT devices to see how they interacted within a local network for the study. They discovered security flaws in the way these devices' mobile apps work.

Submitted by Gregory Rigby on

"Attackers Use Google Calendar RAT to Abuse Calendar Service as C2 Infrastructure"

"Attackers Use Google Calendar RAT to Abuse Calendar Service as C2 Infrastructure"

Google warns of a public Proof-of-Concept (PoC) exploit called Google Calendar RAT (GCR) that uses the Calendar service to host Command-and-Control (C2) infrastructure. Google has yet to observe the use of GCR in the wild, but Mandiant has observed that multiple actors have shared the public PoC on underground forums. The misuse of the Google service makes it difficult for defenders to detect malicious activity. This article continues to discuss threat actors using GCR to abuse Google's Calendar service as C2 infrastructure.

Submitted by Gregory Rigby on

"EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation"

"EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation"

Palo Alto Networks' Unit 42 has revealed an active attack campaign in which a threat actor searches GitHub repositories in real-time for Amazon Identity and Access Management (IAM) credentials and begins using them less than five minutes later. On virtual machines deployed on Amazon instances, the final payload runs customized Monero cryptocurrency mining software. GitHub provides many features for managing code on the platform.

Submitted by Gregory Rigby on

"New Survey From Akamai Shows Increasing Benefits of Network Segmentation"

"New Survey From Akamai Shows Increasing Benefits of Network Segmentation"

A new Akamai Technologies report titled "The State of Segmentation 2023" highlights the growing number of ransomware attacks and the need for microsegmentation to recover from them. The report is based on a survey of 1,200 computer professionals working for large companies. Although microsegmentation is one of the best ways to protect their digital assets, less than a third of respondents used more than two network segments.

Submitted by Gregory Rigby on

"Most Cloud Moves Found Rushed as Adopters Underrate Associated Risks"

"Most Cloud Moves Found Rushed as Adopters Underrate Associated Risks"

According to a new study on cloud-native security, many cloud adopters do not understand the security risks of moving legacy applications to the cloud, leaving them vulnerable to various cloud-based attacks. Venafi surveyed 800 security and Information Technology (IT) leaders from organizations in the US, UK, Germany, and France. The study explored the top threats and challenges facing cloud-native security.

Submitted by Gregory Rigby on

"US Sanctions Russian Accused of Laundering Ryuk Ransomware Funds"

"US Sanctions Russian Accused of Laundering Ryuk Ransomware Funds"

The US government has sanctioned a Russian national for allegedly laundering millions of dollars in victim ransom payments on behalf of people associated with the Ryuk ransomware group. According to the US Treasury's Office of Foreign Assets Control (OFAC), Ekaterina Zhdanova is accused of using virtual currency exchange transfers and fraudulent accounts to launder money for Russian ransomware gangs and others to help them avoid economic sanctions imposed on Russia's financial system following the February 2022 Ukraine invasion.

Submitted by Gregory Rigby on

"Exploited 'Looney Tunables' Linux Privileged Escalation Bug Linked To Kinsing Threat Actor"

"Exploited 'Looney Tunables' Linux Privileged Escalation Bug Linked To Kinsing Threat Actor"

Aqua Nautilus researchers reported the first instance of an exploit attack on the "Looney Tunables" Linux privileged escalation vulnerability. They say they are "100% certain" that the threat actor Kinsing was behind the attack, but they are not ready to reveal how. Kinsing poses a significant threat to cloud environments, specifically Kubernetes clusters, Docker Application Programming Interfaces (APIs), Redis servers, and Jenkins servers.

Submitted by Gregory Rigby on
Subscribe to