Internet Security | SC Media

Internet Security

Apple adds security measures for app, website developers

Apple included a single sign on tool and a new email security feature in iOS 13 that software developers can implement in their apps and websites, the company announced this week at its Worldwide Developers Conference. To facilitate a customer’s ability to sign into an app or website Apple introduced Sign In with Apple. This…

Google adds to Baltimore’s ransomware woes

A recent attempt by Baltimore government officials to create a workaround that would allow them to email while the city recovers from a ransomware attack was temporarily stymied by Google. Baltimore staffers had started to create Google Gmail accounts as a temporary replacement communication system. However, Google’s automatic security apparatus shut down the accounts as…

Microsoft’s May Patch Tuesday covers ZombieLoad, WER vulnerabilities

Microsoft put forth a long list of security updates to cover 79 vulnerabilities, 19 listed as critical, which included four connected to a Microarchitectural Data Sampling (aka ZombieLoad) vulnerability in Intel processors in its May Patch Tuesday release. While CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 grabbed the headlines yesterday, Microsoft also patched CVE-2019-0863 which has been spotted…

ghostlyskullmobilemalware_826540

Retefe Revisited: Banking trojan reemerges, adopts new set of tools

Researchers have noticed a recent upswing in attacks against banks featuring the Retefe banking trojan, following what was apparently a fairly quiet 2018 for the malware. The trojan is historically known for targeting the banking industry in countries like Austria, Sweden, Switzerland and the UK. Rather than using malicious web injects to execute man-in-the-browser attacks…

VPN Endgame

Choosing a virtual private network (VPN) can be difficult. Besides selecting a VPN provider, users must also choose between a paid VPN or a free VPN, among other factors. Simply picking a seemingly “free” VPN can have consequences ranging from having information logged and sold to advertisers, which may defeat the purpose of using a…

DNSpionage actors adjust tactics, debut new remote administration tool

The actors responsible for the DNSpionage DNS hijacking campaign have altered some of their tactics, techniques and procedures (TTPs), introducing a new reconnaissance phase as well as a new malicious remote administration tool called Karkoff. Discovered last November, the operation primarily targets Lebanon- and United Arab Emirates-affiliated .gov domains, commandeering the websites’ DNS servers so…

Flashpoint: Our site was not dishing malware

Flashpoint came out swinging today against an independent researcher who reported that the security company’s public-facing website was serving malware. In what Flashpoint called an “after action report,” the company denied the website was itself infected with malware, but did admit that on April 12-13 the WordPress Yuzo Related Posts plugin used on the site…

Critical vulnerability in Apache HTTP Server patched

A critical vulnerability in Apache HTTP Server that if exploited could allow an attacker to gain full root control has been patched. The cause, dubbed Carpe Diem by the researcher who discovered it Ambionics engineer Charles Fol, affects Apache HTTP Server versions 2.4.17 to 2.4.38. The vulnerability, CVE-2019-0211, is a privilege escalation issue that happens…

South Korean websites hit with rare waterhole phishing scheme

Security researchers have come across a waterholing campaign that have compromised four South Korean websites by injecting fake login forms to steal user credentials. Trend Micro described the campaign, which it named Soula, as a significant threat to enterprises and users and possibly the first step being taken by a cybercriminal group to launch a…

github_1439470

Paper: Leaked authentication secrets rampant across GitHub

An academic study of GitHub found that more than 100,000 of the web service’s code repositories contain publicly accessible authentication secrets such as API and cryptographic keys, while thousands of new secrets are leaked each day. North Carolina State University researchers Michael Meli, Matthew McNiece (also from Cisco Systems) and Bradley Reaves detail their findings…

Next post in Security News