Web application

Taliban data seizure. DeFi platform robbed. Hardware backdoors? LockBit dumps airline


Attacks, Threats, and Vulnerabilities

This is the real story of the Afghan biometric databases abandoned to the Taliban (MIT Technology Review) By capturing 40 pieces of data per person—from iris scans and family links to their favorite fruit—a system meant to cut fraud in the Afghan security forces may actually aid the Taliban.

J&K cops cracking down on ‘white-collar jihadis’, term them ‘worst terrorists’ (Firstpost) A new generation of terrorists have emerged in Jammu and Kashmir, as per the state police. Termed ‘white-collar jihadis’, these people use the anonymity offered by the cyberspace to create unrest in the Valley. The battleground is new where conventional weaponry and the fighting zones of a warren of narrow streets and forests are replaced by computers and smartphones to wage war from just about anywhere — in Kashmir or outside, safe inside their homes or out on the streets, from a nearby cafe or even just a convenient roadside, say police.

Report: Indonesian Government’s Covid-19 App Accidentally Exposes Over 1 Million People in Massive Data Leak (vpnMentor) Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in the Indonesian government’s eHAC program created to tackle the COVID-19 pandemic spread in

Microsoft Azure Cosmos DB Vulnerability Allows ‘Manipulation’ of Customer Data: Report (CRN) Cybersecurity company Wiz issued a report on a Microsoft Azure Cosmos DB vulnerability that could allow hackers to download and edit commercial data.

Hackers steal $29 million from crypto-platform Cream Finance (The Record by Recorded Future) Hackers are estimated to have stolen more than $29 million in cryptocurrency assets from Cream Finance, a decentralized finance (DeFi) platform that allows users to loan and speculate on cryptocurrency price variations.

Bangkok Airways hit by LockBit ransomware attack, loses lotsa data after refusing to pay (Register) Partial credit card numbers appear and, worse still, passengers’ meal preferences

Cyber attack threat looms over Glasgow climate conference (Business Insurance) Scottish police and security experts have issued warning for possible cyber attacks on the infrastructure of Glasgow – the venue for the 2021 United Nations Climate Change Conference.

LockFile ransomware uses intermittent encryption to evade detection (CSO Online) This newly discovered ransomware works fast, has multiple ways to avoid detection, and preys on Windows systems with known vulnerabilities.

How ransomware runs the underground economy (CSO Online) Ransomware gangs are adopting all the core elements of legitimate businesses—including defined staff roles, marketing plans, partner ecosystems, and even venture capital investments—and some hallmarks of more traditional criminal enterprises.

Vulnerability Summary for the Week of August 23, 2021 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

CISA: Don’t use single-factor auth on Internet-exposed systems (BleepingComputer) Single-factor authentication (SFA) has been added today by the US Cybersecurity and Infrastructure Security Agency (CISA) to a very short list of cybersecurity bad practices it advises against.

Bad Practices (CISA) As recent incidents have demonstrated, cyberattacks against critical infrastructure can have significant impacts on the critical functions of government and the private sector.

Division 1 College Football Teams and Mascots Keep Showing Up on Breached Password Lists (Specops Software) The Rambling Wreck of Georgia Tech may not have earned a single vote in the AP’s preseason college football Top 25 rankings, but when it comes…

Boris Johnson ignored security guidance over use of personal phone (Computing) A classified document warned ministers in 2019 that hackers could compromise their personal devices

Security Patches, Mitigations, and Software Updates

Update on the vulnerability in the Azure Cosmos DB Jupyter Notebook Feature (Microsoft Security Response Center) On August 12, 2021, a security researcher reported a vulnerability in the Azure Cosmos DB Jupyter Notebook feature that could potentially allow a user to gain access to another customer’s resources by using the account’s primary read-write key. We mitigated the vulnerability immediately.

Microsoft Azure Cosmos DB Guidance (CISA) CISA is aware of a misconfiguration vulnerability in Microsoft’s Azure Cosmos DB that may have exposed customer data. Although the misconfiguration appears to have been fixed within the Azure cloud, CISA strongly encourages Azure Cosmos DB customers to roll and regenerate their certificate keys and to review Microsoft’s guidance on how to Secure access to data in Azure Cosmos DB. 

What are the cybersecurity threats every board needs to be aware of today? (ITProPortal) As cybercrime becomes more prevalent what are the threats to watch out for

Outpatient Facilities Now Top Targets for Healthcare Data Breaches (Health IT Security) Cyber criminals are shifting their healthcare data breach targets away from hospitals and onto outpatient facilities and business associates, a new report shows.

Does the World Really End This Way? (The Cipher Brief) BOOK REVIEW: This is How They Tell Me the World Ends: The Cyberweapons Arms Race By Nicole Perlroth / Bloomsbury Publishing Reviewed by Christopher Gallup The Author: Nicole Perlroth is an award-winning staff writer at The New York Times, she covers digital espionage, and cybersecurity. The Reviewer: Christopher Gallup is a Senior Cloud Security Architect, … Continue reading “Does the World Really End This Way?”


Check Point Buys Cloud Email Security Provider Avanan (SecurityWeek) Israeli software giant Check Point joins the cybersecurity shopping spree with a definitive deal to acquire cloud-based email security firm Avanan

EIB signs €15 million deal with Dutch cybersecurity company EclecticIQ (Devdiscourse) The EIB financing is backed by the European Commission through the European Fund for Strategic Investments (EFSI), the main pillar of the Investment Plan for Europe.

Tesserent reports growth amid investments in software platform (CRN Australia) After integrating its six acquisitions in 12 months.

$9 billion Tanium quietly laid off most of its senior product marketers, a month after its latest CMO left, sources say (Business Insider) Cybersecurity firm Tanium had layoffs last week, impacting mostly employees in marketing. The company is currently assessing if it’s ready to IPO.

Former Mossad chief’s cybersecurity company to operate in Gulf (Globes) Tamir Pardo’s XM Cyber will bid to protect…


Read More:Taliban data seizure. DeFi platform robbed. Hardware backdoors? LockBit dumps airline

Products You May Like