Security daily (09-07-2020)

Updates to the security pillar of the AWS Well-Architected Framework

We have updated the security pillar of the AWS Well-Architected Framework, based on customer feedback and new best practices. In this post, I’ll take you through the highlights of the updates to the security information in the Security Pillar whitepaper and the AWS Well-Architected Tool, and explain the new best practices and guidance. AWS developed […] (AWS Security Blog)

Secret Service merging electronic and financial crime task forces to combat cybercrime

The Secret Service is combining its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into one unified network, the agency announced Thursday. The new merged network of task forces, to be known as Cyber Fraud Task Forces (CFTFs), will detect, prevent and root out cyber-enabled financial crimes, such as business email compromise and ransomware scams, “with the ultimate goal of arresting and convicting the most harmful perpetrators,” the Secret Service said in a press release. The agency hopes the reorganization integrates the resources and know-how in the previous task forces. “Through the creation of the CFTFs, the Secret Service aims to improve the coordination, sharing of expertise and resources, and dissemination of best practices for all its core investigations of financially-motivated cybercrime,” the Secret Service said. The decision to merge task forces comes months after the Secret Service launched an effort to modernize its investigations into financially […] The post Secret Service merging electronic and financial crime task forces to combat cybercrime appeared first on CyberScoop. (CyberScoop)

Zero-day flaw found in Zoom for Windows 7

A previously unknown flaw in the videoconferencing software Zoom could allow a hacker to remotely commandeer computers running old versions of the Microsoft Windows operating system, security researchers said Thursday. A hacker who successfully exploits the vulnerability could access files on the vulnerable computer, said Mitja Kolsek, chief executive of ACROS Security, the Slovenian cybersecurity firm that highlighted the issue. “If the user is a local administrator, the attacker could completely take over the computer,” Kolsek told CyberScoop. The “zero-day” vulnerability applies to Zoom software running on Windows 7, or even older operating systems. Microsoft has tried to phase technical support out for Windows 7 in an effort to encourage users to upgrade to more secure operating systems. But Windows 7 is still widely used, and some organizations have struggled to move their computers to the latest Windows software en masse. Kolsek said he was holding off on publishing a full exploit […] The post Zero-day flaw found in Zoom for Windows 7 appeared first on CyberScoop. (CyberScoop)

Cosmic Lynx: The highly-professional cybercrime gang scamming businesses out of millions of dollars

Things just got serious. Business Email Compromise is no longer solely the province of chancers. Organised criminal gangs with a high level of professionalism have seen the opportunity and seized it. Read more in my article on the Tripwire State of Security blog. (Graham Cluley)

Smashing Security podcast #186: This one’s for all the Karens!

A high-rolling Hushpuppi gets extradited to the United States, Carole details her problems with clipboards and Disposophobia, and our guest becomes the subject of fake news during the Senegalese election. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast with Graham Cluley and Carole Theriault, joined this week by investigative journalist Michelle Madsen. (Graham Cluley)

This Extensive IT Training Bundle Is on Sale for Just $40

The career prospects for talented and trained IT professionals are nearly endless. As the world becomes more interconnected by the day, companies of all sizes are looking for people who can install, maintain, and troubleshoot a wide variety of networking infrastructures and web-based platforms.

If you want to dip your toes into the world of IT and see if you have what it takes, The Complete IT for Beginners Bundle is a solid place to start. This comprehensive resource is ideal for anyone who wants to start on the right foot in this increasingly lucrative industry, and it's available today for... more (Null Byte « WonderHowTo)

Facebook Bans Roger Stone Disinformation Network

(News ≈ Packet Storm)

Microsoft Seizes Malicious Domains Used In Mass Office 365 Attacks

(News ≈ Packet Storm)

Smartwatch Hack Could Send Fake Pill Reminders To Patients

(News ≈ Packet Storm)

Verizon Adds Protection Against SIM Swapping Hacks In Mobile App

(News ≈ Packet Storm)

Evilnum Hacking Group Linked To Attacks Against Fintech Firms

(News ≈ Packet Storm)

Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store

Cybersecurity researchers took the wraps off yet another instance of Android malware hidden under the guise of legitimate applications to stealthily subscribe unsuspecting users for premium services without their knowledge.

In a report published by Check Point research today, the malware — infamously called Joker (or Bread) — has found another trick to bypass Google's Play Store protections: (The Hacker News)

Microsoft Warns on OAuth Attacks Against Cloud App Users

Application-based attacks that use the passwordless "log in with..." feature common to cloud services are on the rise. (Threatpost)

Zoom Zero-Day Allows RCE, Patch on the Way

Researchers said that the issue is only exploitable on Windows 7 and earlier. (Threatpost)

Joker Android Malware Dupes Its Way Back Onto Google Play

A new variant of the Joker malware has hoodwinked its way onto the Google Play marketplace yet again, in 11 Android apps that were recently removed. (Threatpost)

BlueLeaks Server Seized By German Police: Report

The server contained almost 270 gigabytes of data collected from 200 police departments, law enforcement training and support resources and fusion centers. (Threatpost)

‘Undeletable’ Malware Shows Up in Yet Another Android Device

Researchers have found trojans and adware in preinstalled apps on a low-cost device distributed by the government-funded Lifeline Assistance Program. (Threatpost)


/security-daily/ 10-07-2020 23:44:23