December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

December 2021: Cyber Deception Month Continues…Halting Holiday Hackers…

Authored by: Gary Miliefsky of Cyber Defense Magazine Deep fake, dropped USB sticks, free offers, vishing, smishing and deep phishing attacks, smart-everything (weak IoT devices), malicious apps, driveby malware, distributed denial of service attacks and so much more abound in our world – my team and yours is bombarded with this garbage, on a daily basis.  There is one purpose – steal data.  They want identities and they want money.  It’s that simple.  If we…

Read More

Concerned by the Security Risk Affecting Popular Services and Apps? Here’s What We Know.

Concerned by the Security Risk Affecting Popular Services and Apps? Here’s What We Know.

Several security researchers have recently reported a powerful software bug that could potentially affect thousands of popular websites, services, hosted apps, and even game servers—thanks to an apparent flaw that could allow hackers to compromise or take control of servers that run them.   Just as reported by the developers of the popular Minecraft game, this flaw potentially affects servers that run Twitter, Apple’s iCloud, the Steam gaming platform, and a growing number of others that may be vulnerable.  One research group has dubbed the vulnerability as “Log4Shell,” and the name appears to be sticking. It involves a widely used software used to log information on servers. This software is open…

Read More

Concerned by the Security Risk Affecting Popular Services and Apps? Here’s What We Know.

Concerned by the Security Risk Affecting Popular Services and Apps? Here’s What We Know.

Several security researchers have recently reported a powerful software bug that could potentially affect thousands of popular websites, services, hosted apps, and even game servers—thanks to an apparent flaw that could allow hackers to compromise or take control of servers that run them.   Just as reported by the developers of the popular Minecraft game, this flaw potentially affects servers that run Twitter, Apple’s iCloud, the Steam gaming platform, and a growing number of others that may be vulnerable.  One research group has dubbed the vulnerability as “Log4Shell,” and the name appears to be sticking. It involves a widely used software used to log information on servers. This software is open…

Read More

Log4Shell Vulnerability is the Coal in our Stocking for 2021

Log4Shell Vulnerability is the Coal in our Stocking for 2021

Overview: On December 9th, a vulnerability (CVE-2021-44228) was released on Twitter along with a POC on Github for the Apache Log4J logging library. The bug was originally disclosed to Apache on November 24th by Chen Zhaojun of Alibaba Cloud Security Team. The impact of this vulnerability has the potential to be massive due to its effect on any product which has integrated the log4j library into its applications. This includes products from internet giants such…

Read More

Log4j is so widely used that you may not even realize where in your systems it’s being used.

Log4j is so widely used that you may not even realize where in your systems it’s being used.

As developers, we are all waking up to find a newly discovered zero-day vulnerability (CVE-2021-44228) in the Apache Log4j library. If exploited, the vulnerability allows attackers to gain full control of affected servers and your application. Like many developers, you’re probably scrambling to figure out what systems are affected and how to fix or patch this vulnerability. And to make your job even more difficult, Log4j is so widely used that you may not even…

Read More

Cyber-attack on Hellmann Worldwide Logistics

Cyber-attack on Hellmann Worldwide Logistics

A cyber-attack has been carried out against major German logistics provider Hellmann Worldwide Logistics.  The security incident forced Hellmann to take its central data center offline yesterday. Today, operations at the Osnabrück-based company remain disrupted.  Hellmann said that since the attack was discovered, it has been under the constant observation of its Global Crisis Taskforce, which is analyzing the incident. The company has also hired “external renowned security specialists” to investigate the attack. “As a precautionary…

Read More

CVE-2021-44228: Proof-of-Concept for Critical Apache Log4j Remote Code Execution Vulnerability Available (Log4Shell)

CVE-2021-44228: Proof-of-Concept for Critical Apache Log4j Remote Code Execution Vulnerability Available (Log4Shell)

Critical vulnerability in the popular logging library, Log4j 2, impacts a number of services and applications, including Minecraft, Steam and Apple iCloud. Attackers have begun actively scanning for and attempting to exploit the flaw. Background On December 9, researchers published proof-of-concept (PoC) exploit code for a critical vulnerability in Apache Log4j 2, a Java logging library used by a number of applications and services including but not limited to: Dubbed Log4Shell by researchers, the origin…

Read More

Hackers reported 21% more vulnerabilities in 2021 than in 2020

Hackers reported 21% more vulnerabilities in 2021 than in 2020

HackerOne reports that hackers are reporting more bugs and earning bigger bounties, but is an increase in testing or an increase in software vulnerabilities the cause of the jump? He just wants to help you find your bugs. Image: Shutterstock/Krakenimages.com Bug bounty hub HackerOne has announced that its user base of freelance bounty-hunting hackers have reported a whopping 66,000+ verified vulnerabilities in 2021, a 20% increase over last year’s total. What, exactly, could be going…

Read More

Study: Most phishing pages are abandoned or disappear in a matter of days

Study: Most phishing pages are abandoned or disappear in a matter of days

Research from Kaspersky finds that a quarter of phishing sites are gone within 13 hours — how in the world can we catch and stop cyber criminals that move so quickly? Image: Vladimir Obradovic, Getty Images/iStockphoto Research from cybersecurity firm Kaspersky has found that most phishing websites vanish or go inactive within days, giving us yet another reason to fear phishing: It’s fly-by-night, hard to track and happens in a flash.  Kaspersky’s in-depth analysis of…

Read More

Cuba ransomware gang hacked 49 US critical infrastructure organizations

Cuba ransomware gang hacked 49 US critical infrastructure organizations

The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. A flash alert published by the FBI has reported that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. “The FBI has identified, as of early November 2021 that Cuba ransomware actors have compromised at least 49 entities in five critical infrastructure sectors, including but not limited to the…

Read More
1 3,286 3,287 3,288 3,289 3,290 3,968