cybersecurity

10 readers
1 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 1 year ago
MODERATORS
476
 
 
The original post: /r/cybersecurity by /u/infosec_syn on 2024-10-11 18:26:41.

Hello Everyone,

My company's is mainly a Windows shop but recently we've had the need to support 5-6 MacOS users for business reasons. Our current security tools don't support MacOS. What are some of the popular security tools that you guys leverage? I am looking for anti-virus, patching, and monitoring tools. Something that can feed back to a SIEM so my team and I can be alerted in the case of a cyber event.

Thank you!

477
 
 
The original post: /r/cybersecurity by /u/JCTopping on 2024-10-11 17:55:01.
478
 
 
The original post: /r/cybersecurity by /u/blackpoint_APG on 2024-10-11 17:30:25.

Veeam released a security bulletin on September 4, 2024 for several Critical- and High-rated CVEs for Veeam Backup & Replication (VBR), including:

  • CVE-2024-40711, a remote code execution vulnerability without needing authentication - affecting versions 12.1.2.172 and earlier.

Active exploitation has been observed in the wild by ransomware groups like Akira and Fog. Immediate action is recommended: Update VBR to the latest version to patch the vulnerability.

Relevant links:

479
 
 
The original post: /r/cybersecurity by /u/maki23 on 2024-10-11 17:23:40.
480
 
 
481
 
 
The original post: /r/cybersecurity by /u/themainheadcase on 2024-10-11 12:24:15.

If you're not familiar with Christ Titus, he is a big Youtuber in the tech space and he developed a tool called Windows Utility for debloating Windows. One of its features is called Microwin and what it does is it takes a Windows ISO and strips it of bloat, telemetry and things of this nature.

I tried Microwin to create such a debloated ISO of Win10 and it tirggered Avast, which said it detected a trojan. Here's what Powershell said:

https://imgur.com/a/AAJkknm

Here is what Avast recorded:

https://imgur.com/a/NKO2VnM

Do you think this is a genuine detection or a false positive? I'm not a programmer so maybe someone can interpret this better than I. Have there been suspicions or concerns about Windows Utility in the past?

EDIT:

Some more details. In this Windows Utility, you select the ISO you want to debloat and then after I select it I click "start the process" and the moment I click it, Avast sounds off. I just repeated the process exactly as previously and got the same two detections.

Here's more info from Avast: https://imgur.com/a/lLAR49s

482
 
 
The original post: /r/cybersecurity by /u/sammitrovic on 2024-10-11 10:26:19.
483
 
 
The original post: /r/cybersecurity by /u/Puzzlehead155 on 2024-10-11 15:10:13.

Hello All,

Recently I was planing to dip my toe into the GRC field ( no experience yet) .. I wasn't sure if I should go for CRISC or CGRC or go for a ISO27001 LI course+cert.

Now I found out about this New ISC2 Risk Management Certificates, I'd like to know what do you think about it and if it's worth it or not

Thank you,

484
 
 
The original post: /r/cybersecurity by /u/CISO_Series_Producer on 2024-10-11 14:28:06.

Below are some of the stories we’ve been reporting this week on Cyber Security Headlines.

If you’d like to watch and participate in a discussion about them, the CISO Series does a live 20-minute show every Friday at 12:30pm PT/3:30pm ET. Each week we welcome a different cyber practitioner to offer some color to the week's stories. Our guest this week is Jason Shockey, CISO, Cenlar FSB.

To get involved you can watch live and participate in the discussion on YouTube Live https://youtube.com/live/--QBs5C8qIs?feature=share or you can subscribe to the Cyber Security Headlines podcast and get it into your feed.

Here are the stories we plan to cover:

Insurers should stop funding ransomware payments, says Neuberger

An opinion piece written by U.S. deputy national security adviser for cyber and emerging technologies, Anne Neuberger and published in the Financial Times called for the practice to end, stating that “some insurance company policies, for example covering reimbursement of ransomware payments, incentivize payment of ransoms that fuel cybercrime ecosystems.” She added that the insurance industry “could play a constructive role by “requiring and verifying implementation of effective cyber security measures as a condition of underwriting its policies, akin to the way fire alarm systems are required for home insurance.” Her message followed the fourth annual International Counter Ransomware Initiative (CRI) summit that was held in in Washington D.C. this past week.

(The Record)

Harvard students create Meta Ray-Ban mod that IDs people in seconds

The creation, built by two students at the school, AnhPhu Nguyen and Caine Ardayfio, potentially allows a wearer of Meta’s new smart glasses to identify anyone they see. Their tool, which they have named I-Xray, uses the glasses to stream video images to Instagram. Faces captured in the images are then sent to a facial recognition app such as PimEyes, which matches images to its publicly available database of faces, names and PII. This provides enough information to cross-reference the data using people-search sites to find addresses and more details – potentially even partial Social Security numbers. All in about a minute. To make this even more intriguing, all the data that I-XRAY pulls itself becomes publicly available, thus creating a potential privacy nightmare for pretty much everyone.

(The Register)

Salt Typhoon attack potentially exposes wiretap data

The Chinese state-sponsored hacking group known as Salt Typhoon has reportedly compromised U.S. broadband providers, including AT&T, Verizon, and Lumen Technologies, through systems used for court-authorized wiretapping. According to sources, the hackers gained access not only to these wiretapping systems but also to general internet traffic flowing through the networks, raising significant national security concerns. The breach is believed to be part of a larger intelligence-gathering campaign by China, potentially compromising sensitive data. The FBI, along with private security analysts are currently investigating the extent of the intrusion and data theft.

(The Wall Street Journal),(Security Week),(The Register),(Dark Reading)

Salt Typhoon and the dangers of backdoors

Yesterday, we covered the compromise of wiretap systems across several US telcos by the China-linked threat actors Salt Typhoon. TechCrunch’s Zack Whittaker published a piece illustrating this as the consequence of including legally required backdoors in communication channels. The 1994 Communications Assistance for Law Enforcement Act, or CALEA requires “communications providers” to provide all necessary assistance to lawful government requests for customer information. In the piece, Georgetown Law professor Matt Blaze described this kind of attack as “inevitable” and said “CALEA should be regarded as a cautionary tale, not a success story, for backdoors.”

(TechCrunch)

White House prioritizes secure internet routing, using memory safe languages

Speaking at a Recorded Future event Wednesday in Washington, D.C., National Cyber Director Harry Coker said that “the White House is focused on securing two foundational aspects of the tech landscape: how information packets are routed across the internet and computer programming languages that can be susceptible to memory-related errors. Specifically he pointed out how the White House is looking at “next steps to secure Border Gateway Protocol, including the adoption of security mechanisms known as Resource Public Key Infrastructure (RPKI), which it plans to have in place in more than 60% of the federal government’s advertised IP space by the end of the year. Coker also spoke of “shifting from languages, like C or C++ to memory-safe ones like Go or Rust.” He identified this as a key priority of the Biden administration and a way to avoid known bugs. This correlates to a Microsoft report from July 2019 that found that more than 70% of the vulnerabilities that are assigned a CVE in any given year are related to memory safety.

(Cyberscoop andMicrosoft)

Cyberattack hits major U.S. water utility

American Water Works, which serves over 14 million people, disclosed a cyberattack that impacted its billing systems, though the company says water and wastewater services remain unaffected. The attack was first detected on October 3, and the company    has assured customers that there will be no late fees or service interruptions as they work to restore normal operations. In response to the growing number of threats aimed at the water sector, the EPA announced plans to ramp up security inspections and require the government to provide yearly risk mitigation updates.

(Cyber Scoop),(Bleeping Computer),(American Water Statement)

A look at consumer security behaviors

Consumer Reports published its "Consumer Cyber Readiness Report.” It found that 46% of respondents had personally experienced a cyberattack or digital scam, with 19% losing money. 75% of these scams and attacks came over email, social media, or messaging apps, with phishing being the most common method. On the plus side, 80% of respondents said they use some form of MFA on online accounts. 53% of respondents were confident that their data would not be distributed without their knowledge.

(Dark ReadingCR )

485
 
 
The original post: /r/cybersecurity by /u/Innvolve on 2024-10-11 14:15:01.

So, have you heard about the delay in the NIS2 directive implementation in the Netherlands? It was supposed to be rolled out by the end of this year, but the Dutch government has decided to push it back. The reason? Well, it’s a mix of logistical and legislative hurdles that they need to sort out first.

For many businesses, this delay is a bit of a relief because it gives them more time to get everything in order. On the flip side, it also means more uncertainty and the need to keep adapting to new cybersecurity threats. The government is working on providing more detailed guidelines and support to help businesses transition smoothly. They’re also focusing on strengthening public-private partnerships to improve our national cybersecurity.

I’m really curious about how you’re handling these changes. Have you started preparing for NIS2 compliance yet? What kind of challenges have you faced so far?

Are you or your organization ready for NIS2 compliance?

View Poll

486
 
 
The original post: /r/cybersecurity by /u/konkhra on 2024-10-11 09:31:21.
487
 
 
The original post: /r/cybersecurity by /u/ZealousidealBat9474 on 2024-10-11 08:43:27.

🔹 Dark Mode added

🔹 Dynamically resizable tables and widgets

🔹 API keys can now be added directly through the GUI

💡 Would love to get your thoughts and feedback! 💡

🔗 Check it out:https://github.com/Gadzhovski/TRACE-Forensic-Toolkit

488
 
 
The original post: /r/cybersecurity by /u/yong0114 on 2024-10-11 07:43:41.

"What are the most effective cybersecurity practices UK businesses should adopt to protect against emerging threats?

489
 
 
The original post: /r/cybersecurity by /u/Indexdsd on 2024-10-10 22:00:30.

Hi, I am looking for new job opportunities, as in my current role as a mid/senior analyst, we are being asked to return to the office. This is so frustrating, especially since most jobs these days are hybrid. From my perspective, working in the office and commuting is just a waste of time,let me know your thoughts..

Anyways... If your company is remote-friendly, please let me know! I have strong experience with KQL, PowerShell, Defender, Sentinel, Splunk, creating rules, playbooks/ Logic Apps, and more.

Thanks

490
 
 
The original post: /r/cybersecurity by /u/alt69785 on 2024-10-10 21:16:55.
491
 
 
The original post: /r/cybersecurity by /u/_STY on 2024-10-10 17:23:15.

I have a Bitwarden pro subscription and moved a few of my accounts TOTP 2FA credentials into Bitwarden.

While very convenient, is it really a good idea to store 2FA codes in the same system that stores passwords? Doesn't violate the premise of 2FA?

This obvious concern is that compromise of the password manager gives full credentials to anything with both factors saved. For any identity we store with both password and TOTP we in effect went from a thing we have [TOTP token/authentication device] and thing we know [password] to essentially just thing we authenticated to prior [Bitwarden].

I understand that the Bitwarden authentication itself should be secured with it's own MFA and by extension anything else stored there is as well, but is putting the ability to completely authenticate to anything inherently riskier than say storing only passwords in Bitwarden and all TOTP on a secondary dedicated app or device?

EDIT: I appreciate the advice on what password managers/TOTP apps people use but that wasn't really the question. The answer seems pretty clear though; storing two factors for the same identity in the same way is less secure.

492
 
 
The original post: /r/cybersecurity by /u/Scwidiloo10 on 2024-10-11 03:44:26.
493
 
 
The original post: /r/cybersecurity by /u/Rude-Ad9224 on 2024-10-11 02:10:19.

What are some ways to allow third party apps accessing the application? One of the possible solutions we are exploring is to share OAuth tokens through mTLS. Would love to hear some ideas here.

494
 
 
The original post: /r/cybersecurity by /u/ThrillSurgeon on 2024-10-11 02:09:33.
495
 
 
The original post: /r/cybersecurity by /u/ThrillSurgeon on 2024-10-11 02:08:46.
496
 
 
The original post: /r/cybersecurity by /u/goki7 on 2024-10-10 23:02:24.
497
 
 
The original post: /r/cybersecurity by /u/Orangensaft91 on 2024-10-10 22:53:16.

We just had a small ddos attack from approx. 40 servers that where bruteforcing our login page. After blocking all of them I checked shodan for some of the ips. Nearly all of them had tcp 5201 open, identifying as „JD-GUI Jaca decompiler“. Anyone has seen something like that before?

498
 
 
The original post: /r/cybersecurity by /u/anynamewillbegood on 2024-10-10 21:35:19.
499
1
CVE-2024-43047 (zerobytes.monster)
submitted 1 month ago by [email protected] to c/[email protected]
 
 
The original post: /r/cybersecurity by /u/cyberkite1 on 2024-10-10 21:17:05.

📲 CYBERSECURITY ALERT❗Qualcomm has confirmed a significant security vulnerability affecting millions of Android devices!

Affected devices are: flagship Snapdragon 8 (Gen 1) mobile platform, used is many Android phones, including some made by Motorola, Samsung, OnePlus, Oppo, Xiaomi, and ZTE - this potentially means millions of devices. Any others?

Qualcomm has released patches for a critical zero-day vulnerability (CVE-2024-43047) in its Digital Signal Processor (DSP) service, impacting several of its chipsets.

This flaw, identified by Google Project Zero, Amnesty International, and other researchers, could lead to memory corruption and was actively exploited by attackers. Qualcomm has urged OEMs to roll out these patches swiftly to affected devices.

The vulnerability was caused by a use-after-free weakness in the DSP kernel, which could be exploited by local attackers with low privileges. It was labeled as "limited and targeted" by security researchers, suggesting it may have been used in attacks against high-risk individuals, including journalists and dissidents.

In addition to CVE-2024-43047, Qualcomm also addressed another severe flaw (CVE-2024-33066) related to improper input validation in the WLAN Resource Manager. Both patches are now available to OEMs, with Qualcomm strongly recommending their immediate deployment.

Recommended remedies:

  1. Qualcomm's continued work in addressing critical vulnerabilities highlights the importance of regular security updates to protect devices from potential exploitation.
  2. Users should reach out to their device manufacturers to ensure their devices are fully patched.
  3. Anything else?

Read more on this: https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/

500
 
 
The original post: /r/cybersecurity by /u/laughlander on 2024-10-10 19:45:37.
view more: ‹ prev next ›