CVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild

CVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild

Threat actors are leveraging a zero-day vulnerability in Pulse Connect Secure, for which there is no immediate patch scheduled for release. Background On April 20, Pulse Secure, which was acquired by Ivanti last year, published an out-of-cycle security advisory (SA44784) regarding a zero-day vulnerability in the Pulse Connect Secure SSL VPN appliance. In addition to the advisory, Pulse Secure also published a blog post detailing observed exploit behavior related to the zero-day as well others linked…

Read More

Linux commands for testing connectivity and transfer rates

Linux commands for testing connectivity and transfer rates

There are quite a few tools that can help test your connectivity on the Linux command line. In this post, we’ll look at a series of commands that can help estimate your connection speed, test whether you can reach other systems, analyze connection delays, and determine whether particular services are available. ping The ping command is the simplest and most often used command for doing basic connectivity testing. It sends out packets called echo requests…

Read More

Humans at the heart: the promise (and perils) of digital collaboration

Humans at the heart: the promise (and perils) of digital collaboration

COVID-19 has changed the way we collaborate and communicate. It has also revealed the limitations of some of the digital collaboration tools people have had to use, including in sectors like education and healthcare. COVID-19 created a `rush’ to simply get functions online (classes, health consultations, staff meetings). But people in these sectors are now asking the question – how do we use these digital tools to make these interactions more immersive and engaging, and…

Read More

Building Trust in Your Access Network – Cisco Blogs

Building Trust in Your Access Network – Cisco Blogs

How do you know for sure that a router in your network has not been altered since you deployed it? Wouldn’t it be great if you could cryptographically challenge your router to provide its unique identity? In addition, what if the underlying OS could provide a secure mechanism to detect if the software had been tampered with during boot time and runtime? Networking equipment manufacturers are seeing an increase in supply chain attacks, which means…

Read More

Dating Service Suffers Data Breach

Dating Service Suffers Data Breach

Men’s social networking website and online dating application Manhunt has suffered a data breach.  According to a security notice filed with the office of the Washington attorney general on April 1, the 20-year-old site was compromised in a cyber-attack that took place in February 2021. An unauthorized third party downloaded personal information belonging to some Manhunt users after gaining access to the company’s account credential database. The compromised database contained customers’ usernames, email addresses, and passwords. After discovering that…

Read More

IT Security in Organizations After the Pandemic: What’s Next?

IT Security in Organizations After the Pandemic: What’s Next?

By Alan Kakareka, InfoSec consultant to businesses, Demyo inc. The year 2020 has so far represented, the biggest change in the way we live and interact with our environment. After OSM declared a global pandemic state because of the emergence of covid-19, it is accurate to say that within all the chaos, we had to adapt ourselves to a series of changes, not only to survive the virus but to cope with those in our…

Read More

Baseball and cybersecurity have more in common than you think

Baseball and cybersecurity have more in common than you think

A former pro baseball player and coach turned sports psychologist believes there is much cybersecurity pros can learn from sports mental conditioning. He wants to help them hit more home runs. Illustration: Getty Images/Lisa Hornung One of the hardest things to accomplish in sports is to hit a baseball. If a professional baseball player gets a hit 30% of the times they step up to the plate, they’re likely headed for the Baseball Hall of…

Read More

XCSSET malware now targets macOS 11 and M1-based Macs

XCSSET malware now targets macOS 11 and M1-based Macs

XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips. Experts from Trend Micro have uncovered a Mac malware campaign targeting Xcode developers that employed a re-engineered version of the XCSSET malware to support Apple’s new M1 chips. The new variant also implements new features for data-stealing focused on cryptocurrency apps. XCSSET is a Mac malware that was discovered by Trend Micro in August 2020,…

Read More

How to Become Unattractive for Cybercriminals

How to Become Unattractive for Cybercriminals

Map, monitor and manage your attack surface to stay a step ahead By Stijn Vande Casteele, Founder and CEO, Sweepatic All organizations rely heavily on web presence to display their brand and/or products, reach their audience and streamline their processes. They deploy assets connected to the internet to achieve these goals. The benefits of the cloud, marketing websites and online services are obvious, but there are risks associated with any online presence. So, it becomes…

Read More

Anomali Cyber Watch: Criminals Target Would Be Hackers for Cryptocurrency Theft, A Zero Day Vulnerability in Windows Desktop Manager is in the Wild, US Blames Russia for SolarWinds, and More

Anomali Cyber Watch: Criminals Target Would Be Hackers for Cryptocurrency Theft, A Zero Day Vulnerability in Windows Desktop Manager is in the Wild, US Blames Russia for SolarWinds, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Android Malware, Dependency Confusion, Ransomware, Russia, SaintBot and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber…

Read More
1 3,421 3,422 3,423 3,424 3,425 3,553