05-08-202107-08-2021

Security daily (06-08-2021)

Apple's new solution to combat child abuse imagery could radically shift encryption debate

Apple disputed that the new system will be seen by authoritarian regimes as a potential new form of surveillance. Apple announced Thursday it will introduce a feature to detect child sexual abuse images being uploaded to iCloud Photos from iPhone devices in the United States. The company has framed the feature as a privacy-preserving way to combat the scourge of images of sexually explicit content involving children shared online. It’s a radical shift in approach to device privacy by Apple, which has often found itself at the forefront of the clash between tech companies and law enforcement over encrypted technologies. Security researchers and privacy experts say that the company’s decision could lead to a slippery slope of government abuse and has radically shifted the debate over encrypted technologies. “They’ve really changed the rules around what the debate around encryption is,” said Christopher Parsons, a senior research associate for Citizen Lab at […] The post Apple's new solution to combat child abuse imagery could radically shift encryption debate appeared first on CyberScoop. (CyberScoop)

Conti ransomware affiliate goes rogue, leaks “gang data”

Once more unto the breach, dear friends, once more... (Naked Security)

StarHub Suffers Data Breach, But Says No System Was Compromised

(News ≈ Packet Storm)

Apple Plans To Scan US iPhones For Child Sexual Abuse Images

(News ≈ Packet Storm)

South Korea To Test Grenade Launching Drones

(News ≈ Packet Storm)

MacOS Flaw In Telegram Retrieves Deleted Messages

(News ≈ Packet Storm)

Black Hat: BadAlloc Bugs Expose Millions Of IoT Devices To Hijack

(News ≈ Packet Storm)

New Amazon Kindle Bug Could've Let Attackers Hijack Your eBook Reader

Amazon earlier this April addressed a critical vulnerability in its Kindle e-book reader platform that could have been potentially exploited to take full control over a user's device, resulting in the theft of sensitive information by just deploying a malicious e-book. "By sending Kindle users a single malicious e-book, a threat actor could have stolen any information stored on the device, from (The Hacker News)

India's Koo, a Twitter-like Service, Found Vulnerable to Critical Worm Attacks

Koo, India's homegrown Twitter clone, recently patched a serious security vulnerability that could have been exploited to execute arbitrary JavaScript code against hundreds of thousands of its users, spreading the attack across the platform. The vulnerability involves a stored cross-site scripting flaw (also known as persistent XSS) in Koo's web application that allows malicious scripts to be (The Hacker News)

VMware Issues Patches to Fix Critical Bugs Affecting Multiple Products

VMware has released security updates for multiple products to address a critical vulnerability that could be exploited to gain access to confidential information. Tracked as CVE-2021-22002 (CVSS score: 8.6) and CVE-2021-22003 (CVSS score: 3.7), the flaws affect VMware Workspace One Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and (The Hacker News)

Unpatched Security Flaws Expose Mitsubishi Safety PLCs to Remote Attacks

Multiple unpatched security vulnerabilities have been disclosed in Mitsubishi safety programmable logic controllers (PLCs) that could be exploited by an adversary to acquire legitimate user names registered in the module via a brute-force attack, unauthorizedly login to the CPU module, and even cause a denial-of-service (DoS) condition. The security weaknesses, disclosed by Nozomi Networks, (The Hacker News)

New Chinese Spyware Being Used in Widespread Cyber Espionage Attacks

A threat actor presumed to be of Chinese origin has been linked to a series of 10 attacks targeting Mongolia, Russia, Belarus, Canada, and the U.S. from January to July 2021 that involve the deployment of a remote access trojan (RAT) on infected systems, according to new research. The intrusions have been attributed to an advanced persistent threat named APT31 (FireEye), which is tracked by the (The Hacker News)

Golang Cryptomining Worm Offers 15% Speed Boost

The latest variants of the Monero-mining malware exploit known web server bugs and add efficiency to the mining process. (Threatpost)

Amazon Kindle Vulnerable to Malicious EBooks

Prior to a patch, a serious bug could have allowed attackers to take over Kindles and steal personal data. (Threatpost)

Critical Cisco Bug in VPN Routers Allows Remote Takeover

Security researchers warned that at least 8,800 vulnerable systems are open to compromise. (Threatpost)

Zoom Settlement: An $85M Business Case for Security Investment  

Zoom’s security lesson over end-to-end encryption shows the costs of playing cybersecurity catchup. (Threatpost)

Angry Affiliate Leaks Conti Ransomware Gang Playbook

The data includes IP addresses for Cobalt Strike C2 servers as well as an archive including numerous tools and training materials for the group, revealing how it performs attacks. (Threatpost)

05-08-202107-08-2021

/security-daily/ 07-08-2021 23:44:22