12-07-202014-07-2020

Security daily (13-07-2020)

How to retroactively encrypt existing objects in Amazon S3 using S3 Inventory, Amazon Athena, and S3 Batch Operations

Amazon Simple Storage Service (S3) is an object storage service that offers industry-leading scalability, performance, security, and data availability. With Amazon S3, you can choose from three different server-side encryption configurations when uploading objects: SSE-S3 – uses Amazon S3-managed encryption keys SSE-KMS – uses customer master keys (CMKs) stored in AWS Key Management Service (KMS) […] (AWS Security Blog)

Energy Department watchdog finds research labs fail to secure 'peripheral' devices like USBs

Multiple Department of Energy research labs lack adequate security controls to safeguard devices like printers and USB drives, leaving the facilities susceptible to data theft, according to an inspector general investigation. “[T]he confidentiality, integrity and availability of systems and data could be directly impacted by the vulnerabilities discovered by our test work,” the DOE inspector general said in a memo released last week. The watchdog did not name the four DOE field sites it reviewed, but said they were part of DOE’s Office of Science. That office spans at least 10 research labs that are doing sensitive research on everything from supercomputing to the supply chain of health equipment to combat the coronavirus. An official at one DOE site complained that the department’s security standards were “technically not feasible or extremely difficult to implement,” according to the inspector general. In another case, site officials said that following the standards would cost too much, […] The post Energy Department watchdog finds research labs fail to secure 'peripheral' devices like USBs appeared first on CyberScoop. (CyberScoop)

Israeli court rejects request to revoke NSO Group's export license

An Israeli judge has ruled against revoking the export license of Israeli software surveillance firm NSO Group, despite allegations its software has been used to target human rights activists and political dissidents around the globe. Amnesty International filed the lawsuit in Israel last year alleging one of its employees had been targeted by Pegasus, NSO Group’s signature software. But the judge overseeing the case said that Amnesty had not provided sufficient evidence to show that Pegasus was used against the alleged targets, according to Haaretz, which first reported the decision. Security researchers and human rights groups have claimed that Pegasus has been used to target political dissidents, journalists, and human rights activists, including an Amnesty employee, in several countries. Most notably, Pegasus is alleged to have been used to target associates of American journalist Jamal Khashoggi before he was murdered. Amnesty alleged in June that the technology was also being […] The post Israeli court rejects request to revoke NSO Group's export license appeared first on CyberScoop. (CyberScoop)

Man who lived luxury lifestyle after hacking LinkedIn and Dropbox is found guilty

Yevgeniy Nikulin lived the high life, funded by a life of cybercrime. Now he faces a significant prison sentence after stealing millions of user records from the likes of LinkedIn and Dropbox. Read more in my article on the Hot for Security blog. (Graham Cluley)

Millions of LiveAuctioneers passwords offered for sale following data breach

Researchers claim to have found evidence that cybercriminals are offering for sale a database containing the personal details of 3.4 million users of an online art and antiques auction website, as well as three million cracked passwords. (Graham Cluley)

Prioritize alerts and jump-start your investigations with Recorded Future’s free browser extension. Sign up now.

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Drowning in alerts from many different sources and systems? Spending too much valuable time researching potential threats and vulnerabilities? You need Recorded Future Express, a new browser extension from the experts at […] (Graham Cluley)

Digicert revokes a raft of web security certificates

The good news is that this was a bureaucratic necessity rather than an actual cybersecurity attack. (Naked Security)

Monday review – the hot stories of the week

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time. (Naked Security)

How to Use GoScan to Quickly Enumerate Networks & Services

Network enumeration is one of the essential phases of an attack, but it can take a lot of time and effort depending on the size. We've all been spoiled by Nmap and similar tools, and while there is a learning curve involved, they are extremely useful. But there's also GoScan, a tool that builds upon Nmap, offering an automated way to enumerate networks and services quickly.

GoScan vs. Other Network Scanners

GoScan is an interactive network scanner written in Go that automates certain aspects of Nmap and service enumeration. It features intelligent tab auto-completion and an SQLite database... more (Null Byte « WonderHowTo)

Become a Six Sigma Black Belt with This $30 Training

Wherever life takes you, knowing how to successfully manage both large-scale projects and teams will undoubtedly serve you well. Whether you're eyeing a promotion at work or looking to switch to an entirely different field, having the skills to innovate products, inspire people, and solve problems will make you stand out to your current and future employers.

The Ultimate Six Sigma Black Belt Certification Bundle will help you earn one of the most respected and valuable management certifications in the world, and it's available for over 95% off at $29.99 today.

Whether you're an active... more (Null Byte « WonderHowTo)

Secret Service Creates Cyber Fraud Task Forces

(News ≈ Packet Storm)

How To Protect Yourself From Identity Theft During COVID-19

(News ≈ Packet Storm)

LinkedIn Sued For Snooping On iOS

(News ≈ Packet Storm)

Israeli Court Dismisses Amnesty Bid To Block Spyware Firm NSO

(News ≈ Packet Storm)

Spox Phishing Kit Harvests Chase Bank Credentials

Phishing kits are the back end components to a phishing attack and are often designed to make it easier to deploy a phishing page. These kits are typically bundled in compressed files, such as .zip archives, and contain the entire file infrastructure needed to operate a phishing page. Once a kit is uploaded to a compromised website or hosting environment,  the attacker can simply unzip it and launch operational phishing pages within a short period of time. Continue reading Spox Phishing Kit Harvests Chase Bank Credentials at Sucuri Blog. (Sucuri Blog)

TrickBot Sample Accidentally Warns Victims They’re Infected

A data-stealing module in a recent sandboxed sample triggers browser-based fraud alerts for Trickbot victims -- and shows something of the inner working of the malware's operators. (Threatpost)

Secret Service Creates Cyber Fraud Task Forces

Traditional financial crime and cyberattacks are converging, requiring new skills and approaches to the problem, officials said. (Threatpost)

A ‘New Age’ of Sophisticated Business Email Compromise is Coming

A new BEC threat group is heralding more sophisticated email scams that target organizations without DMARC and squeeze as much money out of victims as possible. (Threatpost)

12-07-202014-07-2020

/security-daily/ 14-07-2020 23:44:24