DecryptedTech

Friday07 October 2022

Security Talk (124)

News, and Disucssions centered on Security

Rate this item
(0 votes)
The Lapsus$ group, the same ones that broke into NVIDIA and Stole corporate data and had their attack VM encrypted, appear to have also broken into Samsung. Lapsus$ has leaked what they claim to be source code for several sensitive…
Rate this item
(0 votes)
As mobile devices continue to be a focus for attackers, we are hearing that there is new banking malware in the Google Play Store. The new malware belongs to a the SharkBot family and, according to researchers, is also a…
Rate this item
(0 votes)
IoT devices in general are the bane of most security teams. Typically, they lack basic security features and are complicated at best to keep patched. Much of this is due to the process needed to patch them and the rest…
Rate this item
(0 votes)
In one of the “odder” breaches that we have covered, NVIDIA has confirmed it was the victim of a breach that resulted in the loss of data. Information about the breach first crossed our paths about a week ago, but…
Rate this item
(0 votes)
The Russian invasion of Ukraine has given an insight into how modern warfare is carried out on a strategic level. We have seen how Russia used malware and specific cyber attacks to interrupt communications and to potentially wipe critical data.…
Rate this item
(0 votes)
Banking malware for mobile devices is on the rise thanks to the ubiquitous use of mobile apps for personal financial tracking and transactions. This move was almost certain to attract threat actors like a moth to a porchlight. When given…
Rate this item
(0 votes)
It seems that Microsoft shares an issue that is a bit like one that can happen in mobile devices. When you reset your device on an Android Device and you have accounts that sync data with their own internal folders,…
Rate this item
(0 votes)
US and other Western Organizations are preparing for potential cyber attacks from Russia, especially banks after a new wave of sanctions went into effect that included blocking the banks from the SWIFT system and freezing Russian assets. The goal of…
Rate this item
(0 votes)
App Stores have been around for a while and pretty much everyone has one. Although they started off in the mobile device world, they quickly were bolted on to the other areas. As their usage has grown attackers have found…
Rate this item
(0 votes)
WMIC or the Windows Management Instrumentation Command line is a very powerful tool. It can allow an administrator or an attacker a lot of control over a system. Because of the number of times that WMIC has been abused to…
Rate this item
(0 votes)
Cisco has announced that a series of vulnerabilities along with the associated patches that go with them for some of the Nexus Series Switches based on NX-OS. Cisco’s NX-OS is the heart of their data center line of switches like…
Rate this item
(0 votes)
It looks like the group behind Trickbot, the Swiss Army Knife of Malware as service for Windows is shutting down the framework and infrastructure behind the “solution”. According to research groups that have been tracking the campaign the disappearance there…
Rate this item
(0 votes)
ID.me, the private identification verification company, has become a popular go-to when it comes to governmental services. We have seen it put in play at the local, state, and federal level. The idea is to have a source of truth…
Rate this item
(0 votes)
We have another Web3 article today. This one covers a new NFT marketplace compromise though the use of phishing emails that tricked users into singing over their digital assets to an, as of yet, unknown attacker.
Rate this item
(0 votes)
It seems that there are still some MS SQL servers that are not only exposed to the open internet but are also still using weak passwords. When this is combined with vulnerabilities and the lack of other security controls and…
Rate this item
(0 votes)
Most attacks, be they real or from a penetration test, begin with an attempt to compromise a single system, or user. The compromise of a device or user account gives the attacker a small foothold in an environment that they…

Page 4 of 8