Skip to main content

Security

Singapore spotlights OT security, unveils security roadmap focusing on infrastructure

posted onOctober 7, 2020
by l33tdawg
Credit: Wikipedia

Singapore is setting up a panel comprising global experts to offer advice on safeguarding its operational technology (OT) systems and has unveiled the country's latest cybersecurity blueprint, focusing on digital infrastructures and cyber activities. It also is hoping to rope in other Asean nations to recognise a Cybersecurity Labelling Scheme (CLS) that rates the level of security for smart devices, such as home routers and smart home hubs.

Microsoft removed 18 Azure AD apps used by Chinese state-sponsored hacker group

posted onSeptember 24, 2020
by l33tdawg
Credit: ZDNet

Microsoft said today that it removed 18 Azure Active Directory applications from its Azure portal that were created and abused by a Chinese state-sponsored hacker group.

The 18 Azure AD apps were taken down from the Azure portal earlier this year in April, the Microsoft threat intelligence team said in a report published today.

How Twitter Survived Its Biggest Hack—and Plans to Stop the Next One

posted onSeptember 24, 2020
by l33tdawg
Credit: Wired

July 15 was, at first, just another day for Parag Agrawal, the chief technology officer of Twitter. Everything seemed normal on the service: T-Pain’s fans were defending him in a spat with Travis Scott; people were upset that the London Underground had removed artwork by Banksy. Agrawal set up in his home office in the Bay Area, in a room that he shares with his young son.

Firefox bug lets you hijack nearby mobile browsers via WiFi

posted onSeptember 20, 2020
by l33tdawg
Credit: ZDNet

Mozilla has fixed a bug that can be abused to hijack all the Firefox for Android browsers on the same WiFi network and force users to access malicious sites, such as phishing pages.

The bug was discovered by Chris Moberly, an Australian security researcher working for GitLab.

Iranian hackers' Android malware spies on dissidents by stealing 2FA codes

posted onSeptember 20, 2020
by l33tdawg
Credit: Wikipedia

Security firm Check Point said it uncovered an Iranian hacking group that has developed special Android malware capable of intercepting and stealing two-factor authentication (2FA) codes sent via SMS.

The malware was part of an arsenal of hacking tools developed by a hacker group the company has nicknamed Rampant Kitten. Check Point says the group has been active for at least six years and has been engaged in an ongoing surveillance operation against Iranian minorities, anti-regime organizations, and resistance movements such as:

Homeland Security warns of a 'critical' security flaw in Windows servers

posted onSeptember 20, 2020
by l33tdawg
Credit: Engadget

The US government has a major server security headache on its hands. Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has delivered a rare emergency directive (via TechCrunch) urging government agencies to install a patch for a “critical” Windows Server vulnerability known by Secura as Zerologon.

The flaw in the Netlogon Remote Protocol lets attackers with network access “completely compromise” Active Directory services on a network without using a sign-in —a hacker could run amok if they get through.

Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw

posted onSeptember 20, 2020
by l33tdawg
Credit: ZDNet

Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer.

Named BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.