<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 10/13/2023

SHARE

Breaches

Estes cyberattack affected carrier's phones, other communications

Estes Express Lines' main communications lines, including the company's phones, were affected by the cyberattack on the LTL carrier last week, President and COO Webb Estes said in a video message to employees and customers last week. But Estes still managed to move customers' freight and process payroll for its 22,000 employees, he said. It has restored operations to many core systems and is working around the clock to bring the rest online with more security. READ MORE...


Giant health insurer struck by ransomware didn't have antivirus protection

The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by the Medusa ransomware group in September. Antivirus software-or more correctly, its modern descendents endpoint security and Endpoint Detection and Response (EDR)-are essential tools in the battle against cybercrime. EDR can detect an intruder's suspicious activity in advance of them running ransomware, as well as being able to identify the ransomware itself. READ MORE...

Malware

FBI shares AvosLocker ransomware technical details, defense tips

The U.S. government has updated the list of tools AvosLocker ransomware affiliates use in attacks to include open-source utilities along with custom PowerShell, and batch scripts. In a joint cybersecurity advisory, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) also share a YARA rule for detecting malware in the guise of a legitimate network monitoring tool. READ MORE...

Information Security

Brands Beware: X's New Badge System Is a Ripe Cyber-Target

Fraudsters are taking advantage of the new verification system implemented by X, formerly known as Twitter, in order to impersonate brands and steal personal information. The infamous blue checkmark used to be reserved for verified companies and influencers. But after purchasing the microblogging giant, and following a period of rapidly declining users and revenue, Elon Musk changed the rules, enabling anybody to obtain one simply by paying a monthly fee. READ MORE...


What the Hollywood Writers Strike Resolution Means for Cybersecurity

In the wake of the Writers Guild of America's (WGA) momentous five-month strike, one thing is abundantly clear: The creative industry stands at a crossroads where technology and human creativity must learn to coexist harmoniously. At its core, this dispute revolved around the role of artificial intelligence (AI) in creative processes, a topic that demands thoughtful consideration as we navigate the uncharted territory of AI's vast potential in many sectors, including cybersecurity. READ MORE...

Exploits/Vulnerabilities

Dozens of Squid Proxy Vulnerabilities Remain Unpatched 2 Years After Disclosure

Dozens of vulnerabilities affecting the Squid caching and forwarding web proxy remain unpatched two years after a researcher responsibly disclosed them to developers. Squid is a widely used open source proxy. According to the official site, "Many of you are using Squid without even knowing it! Some companies have embedded Squid in their home or office firewall devices, others use Squid in large-scale web proxy installations to speed up broadband and dialup internet access. READ MORE...


Juniper Networks Patches Over 30 Vulnerabilities in Junos OS

Networking equipment manufacturer Juniper Networks on Thursday announced patches for more than 30 vulnerabilities in Junos OS and Junos OS Evolved, including nine high-severity flaws. The most severe of these issues is an incorrect default permissions bug that allows an unauthenticated attacker with local access to a vulnerable device to create a backdoor with root privileges. READ MORE...

On This Date

  • ...in 1775, The Continental Congress authorizes construction of two warships, thus instituting an American naval force.
  • ...in 1941, singer-songwriter Paul Simon ("50 Ways to Leave Your Lover", "Bridge Over Troubled Water") is born in Newark, NJ.
  • ...in 1958, Michael Bond's children's book "A Bear Called Paddington" is first published, introducing the classic title character.
  • ...in 2010, all 33 Chilean miners trapped by a cave-in are rescued, after spending more than 69 days underground.