Please find comment by security experts on the H2 database console security flaw that mirrors the Log4Shell vulnerability found in December.
Author: ISBuzz Team
As reported by FinExtra, the UK’s parliament has launched a cross-party group of MPs and Lords to cover the crypto and digital assets sector. The group will act as a forum for parliamentarians, policymakers and the UK crypto sector to discuss policy and regulation of the industry. It will also look to address challenges for the sector including creating a regulatory framework that supports innovation and growth while addressing issues such as consumer protection and economic crime.
Researchers at Sygnia have disclosed a financially-motivated threat actor dubbed ‘Elephant Beetle’, observed over the last two years as they have exploited multiple known and likely unpatched vulnerabilities, stealing millions of dollars from organizations worldwide using an arsenal of over 80 unique tools and scripts. The Sygnia report detailed the approach of targeting Java applications on Linux systems and overwriting non-threating files as they slowly prepare for the true attack. An expert with Gurucul has offered some perspective.
As reported by TechCrunch, U.S. organizations that fail to secure customer data against Log4Shell, a zero-day vulnerability in the widely used Log4j Java logging library, could face legal repercussions, the Federal Trade Commission (FTC) has warned. In an alert this week, the consumer protection agency warned that the “serious” flaw, first discovered in December, is being exploited by a growing number of attackers and poses a “severe risk” to millions of consumer products. The public letter urges organizations to mitigate the vulnerability in order to reduce the likelihood of harm to consumers and to avoid potential legal action. “When vulnerabilities…
2021 was (sadly) the year for hackers- from the continuous rise of ransomware to new phishing scams creeping onto the scene. It has only just been revealed a record-breaking 17 million customer accounts were stolen by hackers from 17 companies, as a critical consequence from credential stuffing attacks.
While running an initial check on that just experienced a supply chain attack on over 100 real estate websites operated by the company, Cyberpion discovered that sothebys.com, the multinational of which Sotheby’s International Realty is a subsidiary, is not adopting the best security policies that should have been implemented from past experience, especially considering their site was infected with digital skimming code back in 2018. According to Sotheby’s privacy policy, they may share information with Sotheby’s International Realty Other key findings include: Sotheby’s home page (sothebys.com) is accessible over an insecure connection:This page also refers to their login page (which…
The cities of Albuquerque, Los Ranchos, and Tijeras were shut down Wednesday by a ransomware attack. In a press release on Wednesday, officials in Bernalillo County disclosed the attack, saying they had taken affected systems offline and severed network connections. Most county buildings had to shut down and employees are working remotely to attempt to maintain services during the system outage. However, as employees cannot access the public databases, there is little they can do for now. The name and type of the ransomware used in the attack is unknown. The disruption is thought to have occurred between Midnight and 5:30…
New York’s attorney general has confirmed credential stuffers have compromised over a million customer accounts linked to 17 well-known companies.
Due to the advancement in digitization, and the rise of internet technologies, cybersecurity threats have become pervasive. Cybercriminal groups have become more sophisticated, and many threats to cyber safety are beyond our control. These attacks cause severe damage to a different sector, such as it can cause financial damage, regulatory penalties, reputation damage, lawsuits, and business continuity disruptions. No organization is safe in the present digital world. As intruders increasingly rely on the latest and sophisticated technologies, organizations feel hopeless as their critical assets and confidential data fall prey to these attacks. Moreover, the rapid adoption of advanced technologies, such…
The Microsoft 365 Defender Threat Intelligence Team and the Microsoft Threat Intelligence Center (MSTIC) has issued a new update to the December 11th guidance for preventing, detecting and hunting for exploitation of the Log4j vulnerability. The MSTIC has encourage Windows and Azure users to remain vigilant after observing the Log4j flaw through December. An expert from Gurucul has provided perspective.