<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 6/10/22

SHARE

Breaches

Cloud data breaches: 4 biggest threats to cloud storage security

Just about anywhere you look, organizations are using the cloud in some form-and they're not all large enterprises. Small and medium businesses (SMBs) are also reaping the many benefits that the cloud offers over on-premise software, especially the lowered IT costs, increased scalability, and large storage capacity that come along with it. No doubt, with a cloud provider like AWS or Azure taking the wheel of some (or all) of your infrastructure, you have less to worry about. READ MORE...

Hacking

Russia escalates threats against West in response to cyberattacks

A Russian official threatened the West on Thursday, asserting that a "direct military clash" could result if Western governments continue to mount cyberattacks against its infrastructure. "The militarization of the information space by the West and attempts to turn it into an arena of interstate confrontation, have greatly increased the threat of a direct military clash with unpredictable consequences," the Russian foreign ministry's head of international information security said Thursday. READ MORE...

Malware

Emotet malware gang re-emerges with Chrome-based credit card heistware

The criminals behind the Emotet botnet - which rose to fame as a banking trojan before evolving into spamming and malware delivery - are now using it to target credit card information stored in the Chrome web browser. Once the data - including the user's name, the card's numbers and expiration information - is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses. READ MORE...


Highly-Evasive Linux Malware 'Symbiote' Infects All Running Processes

Security researchers with BlackBerry and Intezer have shared details on a new Linux malware that "parasitically" infects all running processes on a target machine. Once it has infected all running processes, the malware, which the researchers have named Symbiote, provides attackers with rootkit capabilities, as well as with remote backdoor access and the ability to harvest credentials. The malware, BlackBerry and Intezer discovered, can execute commands with the highest privileges possible on an infected machine. READ MORE...


Researchers unearth highly evasive "parasitic" Linux malware

Security researchers at Intezer and BlackBerry have documented Symbiote, a wholly unique, multi-purpose piece of Linux malware that is nearly impossible to detect. "What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes. READ MORE...

Information Security

How AI Is Useful - and Not Useful - for Cybersecurity

Artificial intelligence has advanced greatly in the past decade. On my phone, I'm reading Apple and Google news that is well-tailored to me, thanks to AI recommendation models. Self-driving cars are already picking up passengers for rides in downtown San Francisco. The same transformation is happening in the cybersecurity world too. However, questions remain: Will AI replace security professionals? READ MORE...

On This Date

  • ...in 1776, The Continental Congress appoints a committee to write a Declaration of Independence.
  • ...in 1920, The Republican Party convention in Chicago endorses women's suffrage.
  • ...in 1940, Italy declares war on France and Great Britain.
  • ...in 1944, Cincinnati Reds pitcher Joe Nuxhall makes his major league baseball debut and becomes the youngest player in history at the age of 15.