Aggregator
CVE-2003-0624 | BEA WebLogic Server up to 8.1 InteractiveQuery.jsp person cross site scripting (EDB-23315 / ID 11462)
Inside SnipBot: The Latest RomCom Malware Variant
JVN: e-Taxソフト(共通プログラム)のインストーラにおける権限昇格の脆弱性
Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent need to upskill current employees and adopt inclusive hiring practices to tackle the growing skills gap in the industry. The ISC2 report indicates that the growth of the cybersecurity workforce could be more stable. What are the main reasons behind this slowdown, … More →
The post Future-proofing cybersecurity: Why talent development is key appeared first on Help Net Security.
部分美国卡巴斯基用户被自动更新到 UltraAV
Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report
CVE-2017-6339 | Trend Micro InterScan Web Security Virtual Appliance 6.5 HTTPS Traffic key management (CP 1746 / EDB-42013)
Telegram 以版权侵犯为由删除 Z-Library 帖子
Discover how online fraud can impact your business
Recent reports underscore increased fraud losses driven by both old methods and new technologies. As fraudsters exploit advancements in AI and other sophisticated tools, their methods have become more difficult to combat. From AI-driven scams and sophisticated phishing attacks to advanced identity document fraud, the scope and impact of online fraud are more severe than ever before. Old methods, new technologies drive fraud losses Experian | 2024 US Identity and Fraud Report | August 2024 … More →
The post Discover how online fraud can impact your business appeared first on Help Net Security.
FOR585: Smartphone Forensic Analysis In-Depth course overview
CVE-2002-0209 | Nortel Alteon ACEdirector 9.0 Load Balancer IP Address information disclosure (EDB-21243 / XFDB-8010)
美国网军司令部举办了首次进攻性Cyber Flag演习
CVE-2023-0915 | SourceCodester Auto Dealer Management System 1.0 id sql injection (EDB-51284)
这个「微博」,几万个 AI 和你互动,成就你的「大 V 梦」
CVE-2016-6629 | phpMyAdmin up to 4.6.3/4.4.15.7/4.0.10.16 ArbitraryServerRegexp Reuse 7pk security (Nessus ID 93212 / ID 169131)
勒索软件团伙滥用 Microsoft Azure 工具窃取数据
BianLian 和 Rhysida 等勒索软件团伙越来越多地使用 Microsoft 的 Azure 存储资源管理器和 AzCopy 从受感染的网络窃取数据并将其存储在 Azure Blob 存储中。
Storage Explorer 是 Microsoft Azure 的 GUI 管理工具,而 AzCopy 是一个命令行工具,可以促进与 Azure 存储之间的大规模数据传输。在网络安全公司 modePUSH 观察到的攻击中,被盗数据随后被存储在云中的 Azure Blob 容器中,威胁分子随后可以将其传输到他们自己的存储中。
Azure 存储资源管理器界面
然而,研究人员指出,攻击者必须进行额外操作才能使 Azure 存储资源管理器正常工作,包括安装依赖项和将 .NET 升级到版本 8。此举也表明勒索软件操作越来越关注数据盗窃,这是威胁分子在随后的勒索阶段的主要手段。
为什么选择 Azure
虽然每个勒索软件团伙都有自己的一套泄露工具,但勒索软件团伙通常使用 Rclone 与各种云提供商同步文件,并使用 MEGAsync 与 MEGA 云同步。
Azure 是企业经常使用的受信任的企业级服务,不太可能被企业防火墙和安全工具阻止。因此,通过它进行的数据传输尝试更有可能顺利通过且不被发现。
此外,Azure 的可扩展性和性能使其能够处理大量非结构化数据,当攻击者试图在最短的时间内窃取大量文件时,这一点非常有益。
modePUSH 表示,它观察到勒索软件参与者使用多个 Azure 存储资源管理器实例将文件上传到 blob 容器,从而尽可能加快这一过程。
检测勒索软件泄露
研究人员发现,威胁分子在使用存储资源管理器和 AzCopy 时启用了默认的“信息”级别日志记录,这会在 %USERPROFILE%\.azcopy 处创建一个日志文件。
该日志文件对于事件响应人员特别有价值,因为它包含有关文件操作的信息,使调查人员能够快速确定哪些数据被盗(UPLOADSUCCESSFUL)以及可能引入了哪些其他有效载荷(DOWNLOADSUCCESSFUL)。
数据传输成功日志
防御措施包括监控 AzCopy 执行情况、到“.blob.core.windows.net”或 Azure IP 范围的 Azure Blob 存储端点的出站网络流量,以及对关键服务器上的文件复制或访问中的异常模式设置警报。
如果企业已经使用 Azure,建议选中“退出时注销”选项以在退出应用程序时自动注销,防止攻击者使用活动会话进行文件窃取。
2024 US Election: Top Cyber Threats & Organizational Impacts
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats, various regulatory bodies have developed cyber compliance frameworks to standardize best security practices across industries. While following governmental and industry-focused guidelines doesn’t necessarily ensure a stronger cyber posture, these frameworks do provide useful starting points as … More →
The post How cyber compliance helps minimize the risk of ransomware infections appeared first on Help Net Security.