Tuesday, March 19, 2019

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.

Researcher Says NSA’s Ghidra Tool Can Be Used for RCE

Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.

Norsk Hydro Calls Ransomware Attack ‘Severe’

When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.

ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown

The FBI's crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.

Fourth Major Credential Spill in a Month Hits DreamMarket

Gnosticplayers has released about 26 million records from what he said are breaches of six new companies.

Mirai Variant Goes After Enterprise Systems

The newest Mirai variant is targeting WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs used by enterprises.

Google Gives Users More Choice with Location-Tracking Apps

Developers will have a new option to for Android apps too track location only when in use.

Privacy Regulations Needed for Next-Gen Cars

With wide deployment expected in the next decade, the driverless automobile landscape looks fraught – from road safety to data protection.

Lenovo Patches High-Severity Arbitrary Code Execution Flaws

Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.

Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attackers are increasingly using insecure legacy protocols, like IMAP, to bypass multi-factor authentication in password spraying campaigns.

Zero-Days in Counter-Strike Client Used to Build Major Botnet

A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.

Cisco Patches Critical ‘Default Password’ Bug

Vulnerability allows adversaries to access monitoring system used for gathering info on operating systems and hardware.

GlitchPOS Malware Appears to Steal Credit-Card Numbers

A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.

Insider Threats Get Mean, Nasty and Very Personal

Increasingly, attackers are targeting the most vulnerable people inside companies and exploiting their weaknesses.

Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested

A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.

Intel Windows 10 Graphics Drivers Riddled With Flaws

Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code execution.

MAGA ‘Safe Space’ App Developer Threatens Security Researcher

The mobile app, dubbed a "Yelp for Conservatives," was found with an open API leaking reams of user data.

Three Ways DNS is Weaponized and How to Mitigate the Risk

Why are hackers using the DNS infrastructure against us? The answer is more complex than you might think.

Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw

Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat.
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.