Misconfiguration practices might make companies lucrative targets for threat actors
Monthly Archives: June 2022
Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia
Telecommunications companies in Pakistan and Afghanistan and a port in Malaysia targeted
Carnival Cruises bruised by $6.25 million fine after series of cyberattacks
Carnival Cruises, the world’s largest travel leisure firm which operates over 100 ships for millions of vacationing customers, has been fined a total of $6.25 million following a series of security mishaps.
Read more in my article on the Hot for Security blog.
Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says
Cyberattacks on the Lithuanian government and private institutions conducted by the Russian cybercollective Killnet, and the group’s possible collaboration with the Conti hacking gang, were shared on the Telegram messaging service ahead of a major DDoS (distributed denial of service) attack Monday, according to cybersecurity company Flashpoint.
Multiple attacks on Lithuanian entities have been claimed by Killnet on its Telegram channel “WE ARE KILLNET,” in response to Lithuania’s June 18 restrictions of trade routes with Russia.
A Flashpoint blog post confirms that Killnet warned about the attacks on the Telegram channel, highlighting the cloud-based instant messaging platform’s use as a popular communication channel for threat actors.
Android Spyware ‘Revive’ Upgraded to Banking Trojan
Dubbed ‘Revive’ because of its ability to automatically restart in case it stops working, the tool seems to be designed for persistent campaigns.
Clear Rules Needed to Prevent Conflict and Struggle in Cyber Space, Says NCSC Chief
NCSC chief executive Lindy Cameron explains that clear rules are needed to govern the use of cyber capabilities
Microsoft’s Defending Ukraine report offers fresh details on digital conflict and disinformation
Last week Microsoft published an in-depth examination of the early cyber lessons learned from the war in Ukraine, offering fresh insight into the scope of Russia’s malicious digital activities and new details about the sophisticated and widespread Russian foreign influence operations surrounding the war. Microsoft has been uniquely positioned to observe the digital landscape in Ukraine since Russia invaded on February 24 and even before then.
vim-8.2.5172-1.fc35
FEDORA-2022-bb7f3cacbf
Packages in this update:
vim-8.2.5172-1.fc35
Update description:
Security fixes for CVE-2022-2124, CVE-2022-2129, CVE-2022-2125, CVE-2022-2126, CVE-2022-1720, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2231, CVE-2022-2210, CVE-2022-2207, CVE-2022-2208, CVE-2022-2206
vim-8.2.5172-1.fc36
FEDORA-2022-719f3ec21b
Packages in this update:
vim-8.2.5172-1.fc36
Update description:
Security fixes for CVE-2022-2124, CVE-2022-2129, CVE-2022-2125, CVE-2022-2126, CVE-2022-1720, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2231, CVE-2022-2210, CVE-2022-2208, CVE-2022-2207, CVE-2022-2206
pcs-0.11.3-1.fc37
FEDORA-2022-28e171f780
Packages in this update:
pcs-0.11.3-1.fc37
Update description:
Automatic update for pcs-0.11.3-1.fc37.
Changelog
* Tue Jun 28 2022 Miroslav Lisik <mlisik@redhat.com> – 0.11.3-1
– Rebased to latest upstream sources (see CHANGELOG.md)
– Updated pcs-web-ui
– Resolves: rhbz#2068452