Expired certificates likely contributed to one of two data glitches that had California undercounting new COVID-19 cases for more than a week – leading, some believe, to the resignation of the state’s public health director. “Certificates act as identities for all kinds of machines; they control the flow of sensitive data. When certificates expire applications,…
The U.S. National Security Agency on Thursday issued an advisory alleging that hackers from Russia’s Main Intelligence Directorate (GRU) have been actively exploiting a remote code execution vulnerability in Exim Mail Transfer Agent (MTA) software, found in Unix-based systems. Researchers and analysts reacting to the agency’s warning say the announcement is an important reminder that…
March 16 , 2020(ISC)² has initiated a search to replace the organization’s current CEO David Shearer who will be stepping down from his role at the end of 2020. Shearer led (ISC)² since 2015 and under his leadeship, the association grew to 153,000 certified members and associates in 175 countries. The search for a replacement…
Malware, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security
Cybercriminals have been compromising websites to display a fake security certificate error message in hopes of tricking visitors into downloading the Mokes backdoor or the Buerak downloader. Researchers from Kaspersky who discovered the scam said in a blog post that the ruse is a new twist on the old technique of hacking a website so…
Facebook’s Tor gateway will be out of commission for a week or two after a TLS certificate expired. “Our onion service, facebookcorewwwi.onion, is temporarily unavailable while we await renewal of our TLS certificate. In the meantime, Facebook is still accessible via facebook.com using Tor Browser,” the company posted on the Facebook Over Tor page. The social media…
The United Nations and other non-government organizations have been undergoing spear phishing attacks since at least March of this year with the goal of obtaining staffers’ login credentials. The attackers are using compromised Office 365 credentials garnered through phishing attacks to enter the NGOs’ systems, enabling them to install phishing websites that mimic each organization’s…
Are you familiar with code signing? If not, in this full video interview Venafi's Senior Threat Intelligence Researcher Jing Xie provides us with a breakdown.