Sat.Dec 19, 2020 - Fri.Dec 25, 2020

SUPERNOVA, a Backdoor Found While Investigating SolarWinds Hack

Security Affairs

While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds Orion supply-chain attack revealed the existence of another backdoor that was likely used by a separate threat actor.

Smart Doorbell Disaster: Many Brands Vulnerable to Attack

Threatpost

Investigation reveals device sector is problem plagued when it comes to security bugs. Hacks IoT Vulnerabilities 360 D819 Smart Video Doorbell Accfly digital doorbells Docooler Extaum hard coded credential HTTP Qihoo Smart WiFi Doorbell Tickas VD300 Victure XF-IP007H

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NSA Warns of Hacking Tactics That Target Cloud Resources

Data Breach Today

Alert Follows Week's Worth of Revelations About SolarWinds Breach The NSA has issued a warning about two hacking techniques that could allow threat actors to access cloud resources by bypassing authentication mechanisms.

Cloud 247

Russia's SolarWinds Hack Is a Historic Mess

WIRED Threat Level

All the most important stories about the biggest hack in years. Security Security / Security News

The Best Data Retention Policy & Template To Get You Started

In this whitepaper from Onna, we will walk you through data retention best practices and provide you with a downloadable template to help you get organized and gain better visibility into your data’s lifecycle.

We Have a National Cybersecurity Emergency -- Here's How We Can Respond

Dark Reading

Let's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that

More Trending

US Treasury Suffers 'Significant' SolarWinds Breach

Data Breach Today

Dozens of Email Accounts' Compromised by Attackers, Says Senior Democratic Senator An ongoing investigation at the U.S.

Access 251

A Massive Fraud Operation Stole Millions From Online Accounts

WIRED Threat Level

The crooks used emulators to mimic the phones of more than 16,000 customers whose mobile bank accounts had been compromised. Security Security / Cyberattacks and Hacks

Amazon Gift Card Scam Delivers Dridex This Holiday Season

Dark Reading

Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan

111
111

VMware and Cisco also impacted by the SolarWinds hack

Security Affairs

The IT giants VMware and Cisco revealed they were impacted by the recently disclosed SolarWinds supply chain attack. VMware and Cisco confirmed to have been both impacted by the recent SolarWinds hack.

Access 108

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. But how do you monitor your new program? Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

FireEye: SolarWinds Hack 'Genuinely Impacted' 50 Victims

Data Breach Today

How to Understand the Russia Hack Fallout

WIRED Threat Level

Not all SolarWinds victims are created equal. Security Security / Cyberattacks and Hacks

SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector

Dark Reading

Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say

Access 112

NSA warns of cloud attacks on authentication mechanisms

Security Affairs

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks to cloud infrastructure.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

NSA Warns Over Hacking Tactics That Target Cloud Resources

Data Breach Today

Alert Follows Week's Worth of Revelations Over SolarWinds Breach The NSA has issued a warning about two hacking techniques that could allow threat actors to access cloud resources by bypassing authentication mechanisms.

Cloud 238

How China Uses Stolen US Personnel Data

Schneier on Security

Interesting analysis of China’s efforts to identify US spies: By about 2010, two former CIA officials recalled, the Chinese security services had instituted a sophisticated travel intelligence program, developing databases that tracked flights and passenger lists for espionage purposes.

Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report

Dark Reading

The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code

110
110

NATO is checking its systems to determine the impact of SolarWinds hack

Security Affairs

NATO announced it is assessing its systems after the SolarWinds supply chain attack that impacted multiple US government agencies. NATO announced it is checking its systems after the SolarWinds supply chain attack to determine if they were infected with a backdoor.

IT 103

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

CISA Warns SolarWinds Incident Response May Be Substantial

Data Breach Today

All Network Assets' Monitored by Backdoored Orion Software May Need Rebuilding Federal, state and local governments are among the many victims of the supply chain attack that backdoored the SolarWinds' Orion network-monitoring software, and victims "may need to rebuild all network assets" being monitored by the software, the U.S.

Eavesdropping on Phone Taps from Voice Assistants

Schneier on Security

The microphones on voice assistants are very sensitive, and can snoop on all sorts of data : In Hey Alexa what did I just type? we show that when sitting up to half a meter away, a voice assistant can still hear the taps you make on your phone, even in presence of noise.

Paper 93

Prepare to Fight Upcoming Cyber-Threat Innovations

Dark Reading

Cybercriminals are preparing to use computing performance innovations to launch new types of attacks

109
109

The Russian cryptocurrency exchange Livecoin hacked on Christmas Eve

Security Affairs

Russian cryptocurrency exchange Livecoin was compromised on Christmas Eve, hackers breached its network and gained control of some of its servers. The Russian cryptocurrency exchange was hacked on Christmas Eve, it published a message on its website warning customers to stop using its services.

IT 100

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

EU Launches Decryption Tool for Law Enforcement

Data Breach Today

Move Seen as Alternative to Weakening Encryption Europol, the European Union's law enforcement agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.

Cellebrite Can Break Signal

Schneier on Security

Cellebrite announced that it can break Signal. Note that the company has heavily edited its blog post, but the original — with lots of technical details — was saved by the Wayback Machine.). News article. Slashdot post. The whole story is puzzling.

IT 91

Microsoft, McAfee, Rapid7, and Others Form New Ransomware Task Force

Dark Reading

Industry group wants to get a framework in the hands of the new administration's cybersecurity officials by early spring 2021

FBI and Interpol shut down some servers of Joker’s Stash carding marketplace

Security Affairs

Joker’s Stash, the largest carding marketplace online, was shut down by a coordinated operation conducted by the FBI and the Interpol. Joker’s Stash, the largest carding marketplace online, was shut down as a result of a coordinated operation conducted by the FBI and the Interpol.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Lazarus Group Targeted COVID-19 Research

Data Breach Today

Kaspersky: North Korean APT Group Used Malware in Attempt to Steal Information The Lazarus Group, a North Korean advanced persistent threat gang, apparently recently targeted a national ministry of health and a drug manufacturer involved in developing a COVID-19 vaccine in an attempt to steal information, according to the security firm Kaspersky.

Windows Zero-Day Still Circulating After Faulty Fix

Threatpost

The LPE bug could allow an attacker to install programs; view, change, or delete data; or create new accounts with full user rights. Vulnerabilities bad patch CVE-2020-0986 CVE-2020-17008 Google Project Zero Local Privilege Escalation Proof of Concept unpatched Windows zero day

113
113

5 Email Threat Predictions for 2021

Dark Reading

As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage

Cloud 108