Report Cyber Crime

Blog

CTCI a Game-Changer for Threat Intel

After 14 years and plenty of blood, sweat and tears, threat intelligence company CTCI emerges from stealth with some game-changing technology. Co-founders Andrew Grealy and Michael Freeman talk with Alan Shimel about the company, startup misconceptions and the opportunity in the threat intel space. The video is below, followed by a transcript. Alan Shimel: Hey,

Read More

Apple patches actively exploited zero-day affecting iOS, macOS

Apple has rolled out security updates for its iOS and macOS operating systems to address a security vulnerability, which the iPhone maker says may have been exploited in the wild. The flaw, tracked as CVE-2021-30807, is a buffer overflow issue within the IOMobileFrameBuffer subsystem, which can be exploited by a local attacker to execute arbitrary

Read More

Mitre Releases 2021 Top 25 Most Dangerous Software Weaknesses

Mitre Releases 2021 Top 25 Most Dangerous Software Weaknesses Source link Is your business effected by Cyber Crime? If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice fraud,

Read More

Brazil creates cyberattack response network

Brazil has created a cyberattack response network aimed at promoting faster response to cyber threats and vulnerabilities through the coordination between federal government bodies. Created through a presidential decree signed on July 16, the Federal Cyber Incident Management Network will encompass the Institutional Security Office of the presidency as well as all bodies and entities

Read More

Babuk Ransomware Gang Ransomed, New Forum Stuffed With Porn

A comment spammer flooded Babuk’s new ransomware forum with gay orgy porn GIFs and demanded $5K in bitcoin. Source link Is your business effected by Cyber Crime? If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud,

Read More

2021 CWE Top 25 Most Dangerous Software Weaknesses

Introduction The 2021 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses (CWE Top 25) is a demonstrative list of the most common and impactful issues experienced over the previous two calendar years. These weaknesses are dangerous because they are often easy to find, exploit, and can allow adversaries to completely take over a

Read More

Apple Products Remote Code Execution Vulnerability

A vulnerability was identified in Apple products, a remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system.   Note: CVE-2021-30807 is being exploited in the wild. Impact Remote Code Execution System / Technologies affected Versions prior to:   iOS 14.7.1 iPadOS 14.7.1 macOS Big Sur 11.5.1 Solutions Before installation

Read More

Linux Kernel Multiple Vulnerabilities

Multiple vulnerabilities were identified in Linux Kernel, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution System / Technologies affected Ubuntu 14.04 ESM Ubuntu 16.04 ESM Ubuntu 18.04 LTS Ubuntu 20.04 LTS Solutions Before

Read More

Links 26/7/2021: Nanotale on GNU/Linux and IBM Promoting Microsoft GitHub

Links 26/7/2021: Nanotale on GNU/Linux and IBM Promoting Microsoft GitHub Source link Is your business effected by Cyber Crime? If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice

Read More

Microsoft Rushes Fix for ‘PetitPotam’ Attack PoC

Microsoft Rushes Fix for ‘PetitPotam’ Attack PoC Source link Is your business effected by Cyber Crime? If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice fraud, email scams,

Read More