<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 12/27/2019

SHARE

Hacking_ITSEC

Nepal Arrests 122 Chinese Over Suspected Cyber Scam

More than 100 Chinese nationals in Nepal on tourist visas have been detained over a suspected cyber scam, police said Wednesday, in the country's largest ever crackdown involving foreigners. Eight women were among the 122 Chinese nationals arrested in a coordinated police raid on nine houses in the capital Kathmandu on Monday. Police said the houses were set up like hostels with large kitchens, bunk beds and rows of tables and chairs for working.


Thai Officials Say Prison Cameras Were Hacked, Broadcast

Authorities in Thailand say they are investigating an apparent online break-in by a computer hacker that allowed him to broadcast surveillance video from inside a prison in the country's south. Thai media reported that the video was broadcast live on YouTube for several hours Tuesday by an account with the name BigBrother's Gaze. It showed prisoners' activities from several different security cameras.

Malware_ITSEC

Ryuk Ransomware Stops Encrypting Linux Folders

A new version of the Ryuk Ransomware was released that will purposely avoid encrypting folders commonly seen in *NIX operating systems. After the City of New Orleans was infected by ransomware, BleepingComputer confirmed that the city was infected by the Ryuk Ransomware using an executable named v2.exe. After analyzing the v2.exe sample, security researcher Vitali Kremez shared with BleepingComputer an interesting change in the ransomware.

Info_Security_ITSEC

How to get rid of your old devices safely

Black Friday, Cyber Monday and even Christmas are behind us. Which means some of us may have been fortunate enough to unwrap a shiny new laptop, smartphone or tablet. But what about our old devices? Some of us keep our old devices as back-ups in case something goes amiss. On the other hand, the majority likes either to share the holiday cheer and gift their old devices or sell them. Whatever the case may be, there are some things you should do before you can pass the device along safely.

Exploits_ITSEC

New Magellan 2.0 SQLite Vulnerabilities Affect Many Programs

New vulnerabilities in the SQLite database engine affect a wide range of applications that utilize it as a component within their software packages. SQLite is a relational database management system that is used by a wide variety of programs including Google Chrome, Mozilla Firefox, Windows 10, and many other well-known programs. Almost one year after disclosing the original Magellan 1.0 SQLite vulnerabilities, Tencent Blade Team has disclosed another batch of SQLite vulnerabilities called Magellan 2.0.


Critical Citrix Bug Puts 80,000 Corporate LANs at Risk

Digital workspace and enterprise networks vendor Citrix has announced a critical vulnerability in the Citrix Application Delivery Controller (ADC) and Citrix Gateway. If exploited, it could allow unauthenticated attackers to gain remote access to a company’s local network and carry out arbitrary code execution. The Citrix products (formerly the NetScaler ADC and Gateway) are used for application-aware traffic management and secure remote access, respectively.