New Trick Could Let Malware Fake iPhone Shutdown to Spy on Users Secretly
Security

New Trick Could Let Malware Fake iPhone Shutdown to Spy on Users Secretly

Researchers have disclosed a novel technique by which malware on iOS can achieve persistence on an infected device by faking its shutdown process, making it impossible to physically determine if an iPhone is off or otherwise. The discovery — dubbed "NoReboot" — comes courtesy of mobile security firm ZecOps, which found that it's possible to block and then simulate an iOS rebooting operation, deceiving the user into believing that the phone has been powered off when, in reality, it's still running. The San Francisco-headquartered company called it the "ultimate persistence bug […] that cannot be patched because it's not exploiting any persistence bugs at all — only playing tricks with the human mind." Read more: https://bit.ly/3n4zPtq
VMware Patches Important Bug Affecting ESXi, Workstation and Fusion Products
Security

VMware Patches Important Bug Affecting ESXi, Workstation and Fusion Products

VMWare has shipped updates to Workstation, Fusion, and ESXi products to address an "important" security vulnerability that could be weaponized by a threat actor to take control of affected systems. The issue relates to a heap-overflow vulnerability — tracked as CVE-2021-22045 (CVSS score: 7.7) — that, if successfully exploited, results in the execution of arbitrary code. The company credited Jaanus Kääp, a security researcher with Clarified Security, for reporting the flaw. "A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine," VMware said in an advisory published on January 4. "Successful exploitation requires [a] CD ima...
Microsoft Warns of Continued Attacks Exploiting Apache Log4j Vulnerabilities
Security

Microsoft Warns of Continued Attacks Exploiting Apache Log4j Vulnerabilities

Microsoft is warning of continuing attempts by nation-state adversaries and commodity attackers to take advantage of security vulnerabilities uncovered in the Log4j open-source logging framework to deploy malware on vulnerable systems. "Exploitation attempts and testing have remained high during the last weeks of December," Microsoft Threat Intelligence Center (MSTIC) said in revised guidance published earlier this week. "We have observed many existing attackers adding exploits of these vulnerabilities in their existing malware kits and tactics, from coin miners to hands-on-keyboard attacks." Publicly disclosed by the Apache Software Foundation on December 10, 2021, the remote code execution (RCE) vulnerability in Apache Log4j 2, aka Log4Shell, has emerged as a new attack vector...
General Data Protection Regulation (GDPR)
Compliance

General Data Protection Regulation (GDPR)

What Is the General Data Protection Regulation (GDP)? The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU). In the European Union (EU), privacy and data protection are fundamental human rights enforced through law. The GDPR supersedes existing national data protection laws across the EU, bringing uniformity by introducing just one main data protection law for organizations to comply with. Significant and wide-reaching in scope, the Regulation brings a 21st-century approach to data protection. It expands the rights of EU residents to have more control over how their personal data is collected and processed and places a range of new obl...
Google Buys Siemplify to Get Ahead in Cloud Security
Security

Google Buys Siemplify to Get Ahead in Cloud Security

Google has acquired security services provider Siemplify in an effort to add security orchestration, automation, and response (SOAR) capabilities to its Google Cloud security portfolio, augment its Chronicle security analytics platform, and further its efforts to make security "invisible," the two companies announced today. While neither company officially disclosed the value of the transaction, sources including Reuters report Google paid $500 million for Siemplify, a cloud-based provider of tools for integrating and automating security operations. Its tech allows companies to present a single platform for security analysis and response, bringing together existing tools and allowing for security playbooks to be automated. SOAR services allow analysts to more quic...
What Is Brand Reputation Management in 2022?
Reputation

What Is Brand Reputation Management in 2022?

Many might wonder what brand reputation management is. Others may wonder why it’s so important. Well, it is quite simple. In today’s tech-driven society, consumers turn to the internet for answers more than ever. And for your brand, this could spell disaster, particularly when reviews on Yelp, TripAdvisor, Groupon and others pop up during searches of your name. That is why managing a positive brand image online is crucial. With a strong brand reputation strategy, you can take the reins and build the positive first impressions you need to thrive online. Have you ever scrolled through Facebook or Instagram only to find a great piece of shareable content? Read More: https://bit.ly/3t0oVJ1
Reputation

Wikipedia editors, propaganda, and whitewashing

WhiteWash Is Wikipedia even reliable? Although the website dominates search results and offers a quick reference point for a wide variety of information, its user-generated editing model is often cause for concern.  Since anybody can create a Wikipedia account and start editing articles, there is plenty of room for foul play on the platform.  Do governments use Wikipedia for propaganda purposes? Do PR firms whitewash articles for clients? Do activist editors police pages as they see fit? Do competitors vandalize pages? This environment creates an opportunity to spread propaganda, destroy reputations, thwart elections, and more. This article will talk about how Wikipedia is being abused behind the scenes. Read more: https://bit.ly/3G0y3kh
Risk

Are Medical Devices at Risk of Ransomware Attacks?

In May 2017, the first documented ransomware assault on networked medical equipment happened. The worldwide ransomware assault WannaCry compromised radiological and other instruments in several hospitals during its height, after a software failure caused by a cyberattack on its third-party vendor's oncology cloud service, cancer patients having radiation therapy at four healthcare institutions had to reschedule appointments. These examples show how cyberattacks and data breaches may have a significant impact on the healthcare industry, heavily reliant on connected medical equipment. PHI (patient health information) captured and stored in these connected medical devices must be secured. Because PHI is transferred over the cloud via server-based systems, making it very susceptible to...
CISOs Plan What to Buy With Funds From the Infrastructure Bill
Security

CISOs Plan What to Buy With Funds From the Infrastructure Bill

Shopping Last fall, President Joe Biden signed into law one of the largest infrastructure packages in history, allocating more than $1 trillion to improve the nation's bridges, help climate resilience, bring broadband Internet to rural areas, and upgrade the water and energy systems. The Infrastructure Investment and Jobs Act also includes almost $2 billion for cybersecurity, half of which goes to a grant program for state, local, and tribal governments. The cybersecurity funding comes at a time when pipelines, power grids, water systems, and local governments have various adversaries, ranging from ransomware gangs to sophisticated state actors. The money is meant to help them transition from weak security practices and implement advanced security models, such as zero trust. In p...
Creating the Next Generation of Secure Developers
Security

Creating the Next Generation of Secure Developers

As companies migrate to more resilient cloud infrastructures, threat actors continue to turn their attention to the application landscape as an entry point for compromising systems. With no less than 76% of applications plagued by at least one security flaw, securing software must be a priority. Unfortunately, a startling lack of training and education opportunities has left many developers ill-prepared to write secure code and build systems that are secure by design — right at the time when we need them most. Despite finding ourselves at this crunch point, the cybersecurity skills gap remains huge. This is compounded by a consistent lack of workplace training to teach employees secure coding principles and how they affect the software development life cycle. Meanwhile, threat a...