Microsoft has released Sysmon 13 with a new security feature that detects if a process has been tampered using process hollowing or process herpaderping techniques. Microsoft Sysmon now detects malware process tampering attempts.
Microsoft has released fixes for 83 vulnerabilities last Patch Tuesday, among which 10 are classified as critical and 73 as Important. Along with these vulnerabilities, Microsoft has also released fixes for one zero-day, and one publicly disclosed vulnerability this month.
Bitdefender has announced the availability of a decryptor for Darkside. This family of ransomware has emerged in August 2020 and operates under a ransomware-as-a-service business model.
The world’s largest illegal marketplace on the dark web, Dark Market, has been taken offline, with German authorities arresting an Australian man over the alleged operation of the nefarious site. More than 2,400 sellers on the marketplace mainly traded drugs and sold counterfeit money, stolen or counterfeit credit card details, anonymous SIM cards, and malware.
The US-CERT Vulnerability Database has confirmed 17,447 vulnerabilities were recorded in 2020. This marks the fourth year in a row that a record number of vulnerabilities has been discovered, following 17,306 in 2019.
Palo Alto Networks specialists have detected PGMiner – a new cryptocurrency mining botnet delivered via PostgreSQL.
Facebook’s threat intelligence analysts and security experts has taken action against two separate groups of hackers — APT32 in Vietnam and a group based in Bangladesh — removing their ability to use their infrastructure to abuse Facebook platform, distribute malware and hack people’s accounts across the internet.
Sophos and ReversingLabs threat researchers have published a production-scale dataset of 20 million Windows Portable Executable (PE) files that will allow researchers to improve security detection and response industry-wide. SOREL-20M dataset further includes 10 million disarmed malware samples available for download and use in research and feature extraction.
The European Commission has set out a new EU Security Union Strategy to bolster Europe’s collective resilience against cyber threats and to ensure that all citizens and businesses can fully benefit from trustworthy and reliable services and digital tools.
At the end of November VMware announced about a 0-day vulnerability CVE-2020-4006 in its products, detected by NSA specialists. Firstly, the company’s specialists talked about temporary ways to secure from the bug, and at the end of last week they finally released fixes.
Former NSS Labs CEO launched CyberRatings.org, a member-based organization that will generate ratings, reports, and analysis on security products and services. He aims to provide a more open and inclusive source of security product assessments that also encompasses the consumer sector.
Google has released Chrome version 87.0.4280.88 for Windows, Mac, and Linux. This version addresses 8 vulnerabilities that an attacker could exploit to take control of an affected system.
Disputed bug in Microsoft Teams posed RCE risk. Microsoft declined to assign a CVE for the vulnerability because the issue was resolved without user interaction through an automated update.
Germany, France, Spain and ten other EU countries have joined forces to invest in processors and semiconductor technologies, key to internet-connected devices and data processing, in a push to catch up with the United States and Asia.
ENCS, the European Network for Cyber Security, and E.DSO, the European Distribution System Operators’ Association, announced the launch of security requirements for Distribution Automation (DA) of Remote Terminal Units (RTUs). The requirements provide European distribution system operators (DSOs) with a defined set of practical considerations for procuring secure RTUs and are a significant step forward to industry wide requirements.
The notorious TrickBot has released a new lightweight reconnaissance tool used to scope out an infected victim’s network for high-value targets. The new “LightBot” is a PowerShell reconnaissance script used by the same group linked to the high-level ransomware and breach incidents involving Universal Health Service (UHS).
ZDNet has announced that multiple threat actors have spent the past two-three years mass-scanning the internet for ENV files that have been accidentally uploaded and left exposed on web servers. They are looking for ENV files such as API tokens, passwords, and database logins.
VMware has released a workaround to address a critical zero-day in multiple VMware Workspace One components that allows attackers to execute commands on the host Linux and Windows operating systems using escalated privileges.
ENCS, the European Network for Cyber Security, and E.DSO, the European Distribution System Operators’ Association, announced the launch of security requirements for Distribution Automation (DA) of Remote Terminal Units (RTUs). The requirements provide European distribution system operators (DSOs) with a defined set of practical considerations for procuring secure RTUs and are a significant step forward to industry wide requirements.
A team of five security researchers found 55 vulnerabilities in Apple online services which they have analyzed for three months from July to September. The flaws — including 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity vulnerabilities — could have allowed an attacker to take over a victim’s iCloud account and the sessions of Apple employees with the capability of accessing management tools and sensitive resources.
Microsoft found a new ransomware MalLocker.B, targeting Android users and lock their screen as part of a ransomware attack. This new ransomware family is known for being hosted on arbitrary websites and distributed on online forums using various social engineering baits, including masquerading as popular apps, video players or cracked games.
MDSec researcher David Middlehurst discovered that The Windows Update client (wuauclt) can be used by attackers to execute malicious code on Windows 10 systems by loading it from an arbitrary specially crafted DLL with specific command-line options.