Skip to main content

Security

How Apple, Google, and Microsoft will kill passwords and phishing in one stroke

posted onMay 8, 2022
by l33tdawg
Credit: Arstechnica

For more than a decade, we’ve been promised that a world without passwords is just around the corner, and yet year after year, this security nirvana proves out of reach. Now, for the first time, a workable form of passwordless authentication is about to become available to the masses in the form of a standard adopted by Apple, Google, and Microsoft that allows for cross-platform and cross-service passkeys.

GitHub to Developers: Turn on 2FA, or Lose Access

posted onMay 4, 2022
by l33tdawg
Credit: Dark Reading

Security experts have been banging the multifactor authentication drum for years, encouraging users to move away from just relying on the username/password combination to secure their most sensitive accounts. Now GitHub is done with encouraging: By the end of 2023, all users who contribute code to GitHub-hosted repositories must have one or more forms of two-factor authentication enabled, the company says.

Critical bugs found in Cisco Enterprise NFV software

posted onMay 4, 2022
by l33tdawg
Credit: Reuters

Administrators need to patch their Cisco Enterprise Network Function Virtualisation Infrastructure Software (NFVIS) to address several critical flaws, rated as 9.9 out of 10 on the Common Vulnerabilities Scoring System (CVSS).

In its advisory, Cisco said the vulnerabilities could allow an attacker to escape from guest virtual machines to the host server. Attackers could also inject commands as the root superuser, and leak system data from the host server to the virtual machine.

Mandiant: Attackers' Median Dwell Time Drops to 3 Weeks

posted onApril 28, 2022
by l33tdawg
Credit: Gov Infosecurity

The median number of days an attacker dwells in a system before detection fell from 24 days in 2020 to 21 days in 2021, according to the M-Trends 2022 report by cybersecurity company Mandiant. The biggest year-on-year decline in median dwell time occurred in the APAC region, where it dropped from 76 days in 2020 to 21 days in 2021.

Researchers Report Critical RCE Vulnerability in Google's VirusTotal Platform

posted onApril 25, 2022
by l33tdawg
Credit: THN

Security researchers have disclosed a security vulnerability in the VirusTotal platform that could have been potentially weaponized to achieve remote code execution (RCE).

The flaw, now patched, made it possible to "execute commands remotely within VirusTotal platform and gain access to its various scans capabilities," Cysource researchers Shai Alfasi and Marlon Fabiano da Silva said in a report exclusively shared with The Hacker News.

Hackers are exploiting 0-days more than ever

posted onApril 25, 2022
by l33tdawg
Credit: Arstechnica

Previously unknown “zero-day” software vulnerabilities are mysterious and intriguing as a concept. But they're even more noteworthy when hackers are spotted actively exploiting the novel software flaws in the wild before anyone else knows about them. As researchers have expanded their focus to detect and study more of this exploitation, they're seeing it more often. Two reports this week from the threat intelligence firm Mandiant and Google's bug hunting team, Project Zero, aim to give insight into the question of exactly how much zero-day exploitation has grown in recent years.