09-11-202011-11-2020

Security daily (10-11-2020)

How to secure your Amazon WorkSpaces for external users

In response to the current shift towards a remote workforce, companies are providing greater access to corporate applications from a range of different devices. Amazon WorkSpaces is a desktop-as-a-service solution that can be used to quickly deploy cloud-based desktops to your external users, including employees, third-party vendors, and consultants. Amazon WorkSpaces desktops are accessible from […] (AWS Security Blog)

Integrating CloudEndure Disaster Recovery into your security incident response plan

An incident response plan (also known as procedure) contains the detailed actions an organization takes to prepare for a security incident in its IT environment. It also includes the mechanisms to detect, analyze, contain, eradicate, and recover from a security incident. Every incident response plan should contain a section on recovery, which outlines scenarios ranging […] (AWS Security Blog)

Biden transition efforts on cybersecurity uncertain as Trump administration throws up obstacles

Former Department of Homeland Security chiefs cautioned Tuesday that President Donald Trump is endangering national security by blocking the transition to Joe Biden’s presidency, as the standoff stretched days after news organizations declared Biden the victor. “At this period of heightened risk for our nation, we do not have a single day to spare to begin the transition,” said the four former DHS secretaries Tom Ridge, Michael Chertoff, Janet Napolitano and Jeh Johnson. “For the good of the nation, we must start now.” Biden nonetheless plowed ahead with his plans to take over the executive branch, announcing agency review teams sprinkled with former U.S. government cybersecurity officials. But the Trump administration is so far making it difficult, and the dispute potentially stands to hamper cybersecurity on multiple fronts. One of those fronts: The Office of the Director of National Intelligence (ODNI) indicated that it would not work with the Biden transition until after […] The post Biden transition efforts on cybersecurity uncertain as Trump administration throws up obstacles appeared first on CyberScoop. (CyberScoop)

Former DOJ officials slam Barr’s new policy on election investigations

Former Justice Department officials on Tuesday sharply criticized Attorney General William Barr for reportedly reversing a longstanding department policy and clearing federal prosecutors to investigate alleged voting irregularities before election results have been certified. “The voters decide the winner in an election, not the president, and not the attorney general,” reads the statement from the Bipartisan Advisory Board of the Voter Protection Program, a nonpartisan election security initiative. The advisory board includes former Justice Department officials who served under Republican and Democratic administrations. “Thanks to a bipartisan group of experienced officials and poll workers across this country, the states, once again, ran fair and secure elections,” the statement continued. “We have seen absolutely no evidence of anything that should get in the way of certification of the results, which is something the states handle, not the federal government.” The criticism follows multiple media reports Monday that Barr gave Justice Department prosecutors the go-ahead to […] The post Former DOJ officials slam Barr’s new policy on election investigations appeared first on CyberScoop. (CyberScoop)

Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events

There’s a relatively small swath of cyberattacks mixed among the more common variety that are truly extreme, costing tens of million of dollars and beyond, or exposing millions of records. A report out Tuesday identified a little over 100 that fit that description over the past five years. The researchers learned that these massive events cost a median of $47 million and usually came via straightforward hacks or ransomware. They appear to be growing more frequent, and nation-state hackers are behind them to a surprising degree, the report says. But the report from the Cyentia Insitute, a data science firm, also found that these extreme attacks don’t affect all their targets in the same way. Some cost companies nearly 100 times their revenue, while others were still just a drop in the bucket, costing as little as 0.1 % of their revenue. And the financial, information and manufacturing sectors accounted for more than half of the 103 incidents. “What […] The post Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events appeared first on CyberScoop. (CyberScoop)

White House official, former Nunes aide Michael Ellis named NSA general counsel

The Pentagon’s general counsel has selected Michael Ellis, a White House official and former Republican aide on Capitol Hill who has faced accusations of politicizing intelligence, to be the National Security Agency’s next general counsel, according to a U.S. government official familiar with the matter. In recent months the White House has been repeatedly pressuring the Department of Defense’s general counsel to slate Ellis, who served as Intelligence Committee counsel to Rep. Devin Nunes, R-Calif., as the top attorney at the NSA, a person familiar with the matter told CyberScoop. The appointment of Ellis to a traditionally nonpartisan role could raise questions about whether President Donald Trump is seeking to plant political allies throughout the U.S. government before his final 70 days as a “lame duck” president come to a close. The news comes at a turbulent time for the Trump administration. Trump has refused to concede the election, and in recent hours announced he had […] The post White House official, former Nunes aide Michael Ellis named NSA general counsel appeared first on CyberScoop. (CyberScoop)

Smishing attack tells you “mobile payment problem” – don’t fall for it!

Don't be fooled by a website that looks OK - it's easy for crooks to make an exact copy. (This time, they got just one letter wrong.) (Naked Security)

FTC Orders Zoom To Implement Stricter Security Standards

(News ≈ Packet Storm)

Microsoft Teams Users Under Attack With FakeUpdates Malware

(News ≈ Packet Storm)

New Ghimob Malware Can Spy On 153 Android Mobile Applications

(News ≈ Packet Storm)

Trump Site Alleging AZ Election Fraud Exposes Voter Data

(News ≈ Packet Storm)

Code Comments Reveal SCP-173 Malware

We sometimes find malware code injections that contain strange code comments, which are normally used by programmers to annotate a section of code — for example, a short description of a feature or functionality for other developers to reference. Oftentimes, hackers aren’t interested in leaving comments describing how their injected malware works. Instead, they use code comments to add unique identifiers to reference  aliases, quotes, threat groups, or sometimes even memes. Unlike defacements, these code comments aren’t intended to be displayed on the infected website and can easily go unnoticed. Continue reading Code Comments Reveal SCP-173 Malware at Sucuri Blog. (Sucuri Blog)

Microsoft Patch Tuesday Update Fixes 17 Critical Bugs

Remote code execution vulnerabilities dominate this month’s security bulletin of warnings and patches. (Threatpost)

Colossal Intel Update Anchored by Critical Privilege-Escalation Bugs

Intel released 40 security advisories in total, addressing critical- and high-severity flaws across its Active Management Technology, Wireless Bluetooth and NUC products. (Threatpost)

Scalper-Bots Shake Down Desperate PS5, Xbox Series X Shoppers

Retail bots are helping scalpers scoop up PS5, Xbox Series X inventory and charge massive markups. (Threatpost)

Apple to Deliver ‘Privacy Labels’ for Apps, Revealing Data-Sharing Details

Developers will have to reveal how data is shared with any “third-party partners,” which include analytics tools, advertising networks, third-party SDKs or other external vendors. (Threatpost)

09-11-202011-11-2020

/security-daily/ 11-11-2020 23:44:23