Review of the week: Uber hacked, QNAP NAS attacked, 5 Kali Linux books to read this year

Here’s a look at some of the most interesting news, articles, interviews and videos from the past week:

Thousands of QNAP NAS Devices Affected by DeadBolt Ransomware (CVE-2022-27593)
QNAP Systems has provided more information about the latest DeadBolt ransomware campaign targeting users of its network-attached storage (NAS) devices and the vulnerability that attackers are exploiting (CVE-2022-27593).

5 Kali Linux books you should read this year
Kali Linux is a Linux distribution designed for digital forensics, penetration testing, security research, and reverse engineering. Here’s a selection of books for different levels of experience, you can either start from scratch or get advanced advice – there’s something for everyone.

Apple patches actively exploited zero-day in macOS, iOS (CVE-2022-32917)
Apple has patched a host of vulnerabilities in macOS, iOS, and iPadOS, including a zero-day kernel vulnerability (CVE-2022-32917) exploited by attackers in the wild.

U-Haul Reports Data Breach, Customer Information Exposed
U.S. moving and storage rental company U-Haul suffered a data breach due to an unauthorized person accessing an undetermined number of rental contracts, U-Haul parent company Amerco has revealed. , last week.

Microsoft fixes exploited zero-day in Windows CLFS driver (CVE-2022-37969)
The September 2022 Patch Tuesday has arrived, with fixes for 64 CVE-numbered vulnerabilities in various Microsoft products, including a zero-day vulnerability (CVE-2022-37969) exploited by attackers.

Phishers Target Facebook Page Owners
Phishers seek to trick Facebook page owners with fake notifications from the social network (i.e. Meta, the company behind Facebook, Instagram and WhatsApp), in an attempt to trick them into parting with sensitive information .

U.S. government software vendors must certify that their solutions are secure
The Office of Management and Budget (OMB) has issued a memo requiring US federal government agencies to use software that has been built under secure software development practices and whose developers follow the security practices of the software supply chain, as specified by the National Institute of Standards. and technology (NIST). hacked, attacker tears through company systems
Uber has been hacked again – this time by an (allegedly) 18-year-old who claims to have social-engineered his way in from an Uber employee.

Attackers Mount Magento Supply Chain Attack By Compromising FishPig Extensions
FishPig, a UK-based company that develops extensions for the popular open-source e-commerce platform Magento, has announced that its paid software offerings were injected with malware after its distribution server was compromised.

Building a Successful Cybersecurity Business, One Client at a Time
In this Help Net Security interview, Rahul Sasi, Founder and CEO of CloudSEK, talks about the challenges of building CloudSEK, his journey in the cybersecurity industry, and lessons learned along the way.

Home-based workers put the cybersecurity of their homes and businesses at risk
BlackBerry has released a European study exposing the cybersecurity risk created by cost-conscious homeworkers who prioritize security over price, usability and ease of setup when buying home smart devices.

Bad bots are coming to APIs! How to beat API bot attacks?
API or Application Programming Interface is a de facto building block for modern applications, necessary for both building and connecting apps and websites. But APIs are poorly protected and have become one of the main targets of attacks, especially bot attacks.

MSP and cybersecurity: the time to close our eyes is over
Findings from a Vade report highlight the prevalence of managed service providers (MSPs), with 96% of organizations currently outsourcing at least some of their needs to MSPs or planning to do so in the future. The report also analyzes the successes and pitfalls of email security solutions and where MSPs may have an opportunity to enter the market.

Modernizing data security with a zero-trust approach to data access
In a world where we can no longer trust anyone, Zero Trust security has gained momentum, especially since 2018 when NIST published Implementing a Zero Trust Architecture. With unprecedented vulnerabilities and ever-increasing sophistication of cyberattacks, it’s no wonder Gartner estimates that by the end of 2022, zero trust spending will reach $891.9 million and projects that by 2026 , they will reach 2 billion dollars.

How prepared are organizations to fight ransomware attacks?
HYCU has announced its State of Ransomware Preparedness report in partnership with ActualTech Media, which reveals that ransomware is an unavoidable risk for businesses, which is why ransomware preparedness is a top priority.

Outwit attackers in their new favorite playground: social media
For years, LinkedIn has been used by threat actors looking to fine-tune their attacks. From simple spear-phishing attacks to reconnaissance, the business networking site has provided fertile ground for harvesting data and improving criminal tactics, even as a jumping-off point to other platforms like Facebook Business.

Organizations should fear misconfigurations more than vulnerabilities
Censys has launched its State of the Internet report, a holistic view of Internet risks and organizations’ exposure to them. Through careful examination of the most popular ports, services and software on the Internet, as well as the systems and regions where they run, the research team discovered that misconfigurations and exposures account for 88% of risk. and vulnerabilities on the Internet.

Q-Day Doesn’t Mean the End of the World: Adopting an Enterprise Quantum Security Strategy
Although Quantum Day, or “Q-Day,” is five to ten years away, it is coming sooner than we would like. Q-Day represents the day when quantum computers will reliably use the superposition power of multi-state qubits to crack encryption algorithms widely used around the world to enable e-commerce, data security and secure communications. Adversaries are already preparing for Q-Day by employing “collect now, decipher later” strategies.

CFOs’ overconfidence in cybersecurity can cost millions
Kroll announced its Cyber ​​Risk and CFOs: Over-Confidence is Costly report which found that chief financial officers (CFOs) are woefully in the dark when it comes to cybersecurity, despite confidence in their company’s ability to respond to an incident.

How to improve public sector security strategy?
As international tensions escalate as we enter the eighth month of the Russia-Ukraine war, it is clear that a new era of escalating state-sponsored attacks is upon us, particularly those aimed at public sector agencies and services.

SMBs are hardest hit by ransomware
Coalition announced the mid-year update to its 2022 Cyber ​​Claims Report detailing evolving cyber trends, revealing that small businesses have become bigger targets, overall incidents are down and that ransomware attacks decrease as claims go unpaid.

Linux variant of SideWalk backdoor discovered
ESET researchers discovered a Linux variant of the SideWalk backdoor, one of several custom implants used by the SparklingGoblin APT group.

Why the left shift weighs on your development teams
According to CloudBees, security and compliance challenges are a significant impediment to most organizations’ innovation strategies. The survey also reveals agreement among C-suite executives that a left-shift security policy is a burden on development teams.

Report: Comparative analysis of security vulnerabilities and privileged access
Get the full copy of Global Survey of Cybersecurity Leaders: Benchmarking Security Gaps & Privileged Access to assess your own security journey. You will also find information to put the research into context. Expert recommendations shed light on where you should be spending your time and give you a head start on planning your next move.

New infosec products of the week: September 16, 2022
Here’s a look at some of the hottest products from the past week, with releases from Kingston Digital, Avetta, D3 Security, novoShield and Socure.

Source link