Zum Inhalt der Seite gehen

Suche

Beiträge, die mit cybersecurity getaggt sind


"Oracle isn’t commenting on recent reports that it has experienced two separate data breaches that have exposed sensitive personal information belonging to thousands of its customers.

The most recent data breach report, published Friday by Bleeping Computer, said that Oracle Health—a health care software-as-a-service business the company acquired in 2022—had learned in February that a threat actor accessed one of its servers and made off with patient data from US hospitals. Bleeping Computer said Oracle Health customers have received breach notifications that were printed on plain paper rather than official Oracle letterhead and were signed by Seema Verma, the executive vice president & GM of Oracle Health.

The other report of a data breach occurred eight days ago, when an anonymous person using the handle rose87168 published a sampling of what they said were 6 million records of authentication data belonging to Oracle Cloud customers. Rose87168 told Bleeping Computer that they had acquired the data a little more than a month earlier after exploiting a vulnerability that gave access to an Oracle Cloud server."

https://arstechnica.com/security/2025/03/oracle-is-mum-on-reports-it-has-experienced-2-separate-data-breaches/

#CyberSecurity #Oracle #DataBreaches #DataProtection


"[T]he main thing that people need to understand about Signal is that messages are encrypted from my phone to your phone in such a way that Signal can't read them as they go through their servers. The government could not read them off of Signal servers even with a warrant, even if they really wanted to. But if somebody has access to your phone, they can read those messages the same way you can by looking at them with their eyeballs because the messages have to be decrypted for you to read.

Now, there are a lot of ways that you can get access to somebody's phone. You can look over their shoulder while they're reading their messages, right? You can find out their password and unlock their phone, right? You can use forensic tools that police have like a Cellebrite or a break-in device to unlock phones, and then you can read the messages that way. You can also use malware. Installing malware on somebody's phone is a way that governments often gain access to people's private encrypted communications. Things like Pegasus malware or they're recently written about malware from Paragon Solutions that was going after WhatsApp messages, which was also end-to-end encrypted.

A concern about national security folks using these devices for the communications is that it makes it much more likely that their devices will get targeted by malware. And there's a lot of countries that have espionage capabilities that have the capability to target people's phones that would be very interested in knowing what Pete Hegseth is talking about, or what other high-level cabinet officials are talking about. So that makes for a very juicy intelligence target for foreign intelligence, and I think it's safe to assume that's something that many countries are now going to be going after."

https://www.techpolicy.press/about-that-signal-chat/

#USA #Trump #CyberSecurity #Signal #Encryption #CyberWarfare


Microsoft-Domain von Spammern gekapert: MicrosoftStream[dot]com zeigte statt Firmenvideos nun Casino-Werbung. Betroffen warenSharePoint-Seiten mit internen Inhalten. #Microsoft #Cybersecurity https://winfuture.de/news,149935.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


"The app’s security is viewed as fairly strong due to its robust privacy features and minimal data collection, as well as default end-to-end encryption of all messages and voice calls. The app also includes a function that deletes all messages from a conversation within a set time frame, adding an additional layer of data protection. But experts agree that it shouldn’t be used by government officials as an alternative to communicating through more secure, sanctioned government communications — which Signal is not.

“It’s so unbelievable,” a former White House official, granted anonymity to discuss The Atlantic’s report candidly, said Monday. “These guys all have traveling security details to set up secure comms for them, wherever they are.”

The former White House official pointed out that members of Trump’s Cabinet — including the vice president, Defense Secretary Pete Hegseth, and Director of National Intelligence Tulsi Gabbard, among others — were likely using personal devices, since in most cases, Signal cannot be downloaded onto official federal devices. This alone creates a host of cybersecurity issues."

https://www.politico.com/news/2025/03/25/signal-cybersecurity-trump-war-planning-00246881

#USA #Trump #CyberSecurity #Signal #Privacy


"Whittaker acknowledges that WhatsApp licenses Signal’s end-to-end encryption technology. Nevertheless, a lot of personal and intimate information isn’t protected. According to Signal’s president, this involves users’ location data, contact lists, when they send someone a message, when they stop, what users are in their group chats, their profile picture, and much more.

“These differences may be marketing gloss to Meta, but to us, they’re fundamental life or death issues that the public deserves to understand so they can make an informed choice,” Whittaker concludes.

On Sunday, WhatsApp sent a message to Dutch users stating that the company can’t read their messages, including text and voice messages, photos, videos, and calls.

“They are protected by end-to-end encryption because we are always committed to protecting your privacy,” the note reads."

https://cybernews.com/news/whatsapp-signal-executives-battle/

#Cybersecurity #Privacy #Encryption #Signal #WhatsApp


Sicherheitsforscher entdecken 46 neue Schwachstellen in Solarwechselrichtern. 80% der Lücken gelten als kritisch. Risiken für Stromnetze und Datenschutz. #Cybersecurity #Solar https://winfuture.de/news,149910.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


Keep in mind that just because an application is open source doesn't mean it's safer. If nobody checks its code for bugs or malware, it could be worse than other software.

----

We have so many questions that are making us feel a bit uneasy: ❓

In what ways can you be certain that a particular open-source software solution is secure?

What factors do individuals with an IT background consider when making decisions about open source software safety?

Certain open source software solutions have extensive code bases. Consequently, it would require a significant investment of time to verify the absence of bugs or malicious code. 🐞 ☠️

That said, even those who can understand code may not always have the time or energy to investigate every piece of software they install. So what are their criteria for endorsing a particular piece of software that they haven't analysed its code? 🧭

And what tips do you have for people who aren't developers, to help them make the best choices when they can't understand the code? Who can they trust?

#opensource #cybersecurity


Sicherheitsforscher entdeckt schwerwiegende Lücke in #VMware für Windows. Broadcom veröffentlicht dringenden Patch. Über 37.000 Systeme weiterhin angreifbar. #Cybersecurity https://winfuture.de/news,149874.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


Google veröffentlicht Notfall-Patch für Chrome gegen aktive Spionage-Angriffe. Schwachstelle in Mojo-Bibliotheken ermöglichte Umgehung der Sicherheit. Update dringend empfohlen! #Chrome #Cybersecurity https://winfuture.de/news,149864.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


"Shortly after senior Trump administration officials discussed and celebrated the bombing of Yemen in an encrypted group chat that, unbeknownst to them, included the editor-in-chief of the Atlantic, a subset of the group feasted at an opulent, secret dinner featuring the president where guests were asked to pay $1 million apiece to snag a seat.

The date was Saturday, March 15. President Donald Trump was at his Mar-a-Lago estate attending a “candlelight” dinner that wasn’t on his public calendar. On the lawn outside, luxury cars were on display: a Rolls Royce was parked near a Bugatti and Lamborghini. Guests milled about, taking photographs of each other and the vehicles. Earlier that day, the United States had bombed Yemen, targeting Houthi leadership. At least 53 people, including children, were killed.

Trump flew to the event on Air Force One with Elon Musk and Musk’s four year old son X, according to photos and videos viewed by WIRED. Throughout the weekend, Musk was in close contact with Trump and at least one member of the president’s brain trust who was participating in a Signal group chat where highly sensitive details of the planned operation were being shared. Experts say the conversation appears to have violated government protocols on information sharing."

https://www.wired.com/story/trump-officials-signal-chat-candlelight-dinner-mar-a-lago-yemen/

#USA #Trump #Musk #Leaks #PressFreedom #Signal #CyberSecurity #Privacy


Aus aktuellem Anlass Anfrage bei offiziellen Stellen: Kommunizieren deutsche Behörden auch über Signal? Oder was nutzen sie für Gespräche mit Geheimhaltungsstufe? (Webex aus Gründen wohl nicht mehr...)
"Frau Wolfangel, Sie wollen sich doch nur wieder heimlich einwählen."
Ich schwöre, ich wähle mich (jedenfalls heute 😜 ) nicht ein, sondern schreibe nur unschuldig einen Artikel. Wer weiß die Antwort?
#signal #cybersecurity


December 2023: US District Attorney Jessica Aber indicts 4 Russians for war crimes in #Ukraine

September 2024: US District Attorney Jessica Aber indicts Russian cryptocurrency money launderer / cybercriminal #SergeyIvanov

November 2024: US District Attorney Jessica Aber accuses Virginia based companies of running "three different schemes to illegally transship sensitive American technology to Russia," including sending equipment to a Russian telecommunications company linked to the #Kremlin and Russia's notorious #FSB security agency.

March 2025: Former US District Attorney Jessica Aber found dead at age 43

More: https://www.newsweek.com/jessica-aber-death-2049234

#Putin #VladimirPutin #JessicaAber #Russia #UkraineWar #Virginia #Vapol #crime #alexandria #TrueCrime #uspol #eupol #eu #AsifRahman #infosec #ransomware #cybersecurity
WASHINGTON, DC — DECEMBER 6: U.S. Attorney for the Eastern District of Virginia Jessica Aber speaks during a press conference at the U.S. Department of Justice on December 6, 2023 in Washington, DC. The Department of Justice announced today that four Russian military personnel have been indicted for war crimes committed against a U.S. national living in Ukraine, the first of such charges ever to be brought under the U.S. war crimes statute. (Photo by Samuel Corum/Getty Images)

Former US attorney for eastern district of Virginia found dead at age 43

Alexandria police find Jessica Aber unresponsive after responding to reports and say investigation under way
Maya Yang
Sun 23 Mar 2025 14.55 EDT

The former US attorney for the eastern district of Virginia was found dead in Alexandria on Saturday, authorities said.

In a statement on social media, Alexandria police announced that at about 9.18am on Saturday, police responded to the 900 block of Beverley Drive following reports of an unresponsive woman. Upon arriving at the scene, authorities located a deceased woman who they later identified as 43-year-old Jessica Aber.


Neue Malware-Gefahr auf #Steam: Als Spiele-Demo getarnt verbreitet "Sniper: Phantom's Resolution" Schadsoftware über externe Downloads. Die Malware umgeht Windows-Sicherheitssysteme. #Cybersecurity https://winfuture.de/news,149807.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


"Law enforcement requests for user data from Apple, Google, and Meta mean that these companies can decide whether government authorities have access to your personal information, including location data. This means the companies with the most insight into our lives, movements, and communications are frontline arbiters of our constitutional rights and the rights of non-US citizens—a fact some are likely feeling more acutely now than ever.

Collaboration between Big Tech and the Trump administration began before Donald Trump’s swearing-in on January 20. Amazon, Meta, Google, Microsoft, and Uber each gave $1 million to Trump’s inauguration. Separately, in personal donations, so did Meta CEO Mark Zuckerberg and Apple’s Tim Cook.

Americans concerned about the Trump administration and Silicon Valley’s embrace of it, may consider becoming a “digital expat”—moving your digital life off of US-based systems. Meanwhile, Europeans are starting to see US data services as “no longer safe” for businesses, governments, and societies.

Here’s a brief rundown of the privacy, security, and civil liberties issues related to the use of US-based digital services that suddenly feel more urgent—and what to do about it."

https://www.wired.com/story/trump-era-digital-expat/

#USA #Trump #BigTech #Privacy #CyberSecurity #DataProtection


Sicherheits-Alarm bei #VisualStudioCode: In zwei Erweiterungen wurden Komponenten einer Ransomware entdeckt. Microsoft reagiert, nachdem man Meldungen erst ignorierte. #Cybersecurity https://winfuture.de/news,149755.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


"A consumer-grade spyware operation called SpyX was hit by a data breach last year, TechCrunch has learned. The breach reveals that SpyX and two other related mobile apps had records on almost two million people at the time of the breach, including thousands of Apple users.

The data breach dates back to June 2024 but has not been previously reported, and there is no indication that SpyX’s operators ever notified its customers or those targeted by the spyware.

The SpyX family of mobile spyware is now, by our count, the 25th mobile surveillance operation since 2017 known to have experienced a data breach, or otherwise spilled or exposed their victims’ or users’ data, showing that the consumer-grade spyware industry continues to proliferate and put people’s private data at risk.

The breach also provides a rare look at how stalkerware like SpyX can also target Apple customers.

Troy Hunt, who runs data breach notification site Have I Been Pwned, received a copy of the breached data in the form of two text files, which contained 1.97 million unique account records with associated email addresses."

https://techcrunch.com/2025/03/19/data-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/

#CyberSecurity #Spyware #SpyX #Apple #Stalkerware #Surveillance


"- Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware called Graphite. The company differentiates itself by claiming it has safeguards to prevent the kinds of spyware abuses that NSO Group and other vendors are notorious for.
- Infrastructure Analysis of Paragon Spyware. Based on a tip from a collaborator, we mapped out server infrastructure that we attribute to Paragon’s Graphite spyware tool. We identified a subset of suspected Paragon deployments, including in Australia, Canada, Cyprus, Denmark, Israel, and Singapore.
- Identifying a Possible Canadian Paragon Customer. Our investigation surfaced potential links between Paragon Solutions and the Canadian Ontario Provincial Police, and found evidence of a growing ecosystem of spyware capability among Ontario-based police services.
- Helping WhatsApp Catch a Zero-Click. We shared our analysis of Paragon’s infrastructure with Meta, who told us that the details were pivotal to their ongoing investigation into Paragon.
- WhatsApp discovered and mitigated an active Paragon zero-click exploit, and later notified over 90 individuals who it believed were targeted, including civil society members in Italy.
- Android Forensic Analysis: Italian Cluster. We forensically analyzed multiple Android phones belonging to Paragon targets in Italy (an acknowledged Paragon user) who were notified by WhatsApp. We found clear indications that spyware had been loaded into WhatsApp, as well as other apps on their devices."

#CyberSecurity #Israel #Paragon #Spyware #WhatsApp #Meta #Italy #Surveillance

https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/


"The fundamental issue is simple: encryption is mathematics and mathematics doesn’t discriminate between a government investigator and a criminal hacker — a back door is a back door and if it’s there, anyone can enter.

There’s also a contradiction at play. If politicians dream of making the UK a technology hub they should not be working to undermine the foundations of cyber security, on which a workable tech industry relies.

The government should withdraw its misguided mandate. Instead of surreptitiously cutting the brake cables on the technological car, it should be working to strengthen security and privacy of the technology that forms the nervous system of our world. Business leaders must also take a role, making it clear that these dangerous moves are unacceptable, and pushing the companies they license technology from to deploy encryption, and other protections, without which their interests and those of their customers will be vulnerable.

We have ceded so many of the core operations of our lives and institutions to tech, we must recognise that strong encryption isn’t the enemy of security — it is security. The argument that weakening encryption will make any of us safer is as wrong as it is dangerous."

https://www.ft.com/content/a934150f-e0f5-4e75-a2d1-a3671ea52ca0

#UK #CyberSecurity #Encryption #Backdoors #Privacy #Apple


@heiseonline
#Cybersecurity #Journal #Netzpolitik #Security #news

Oh weh, da kann man den Menschen nur alles Gute und viel Glück wünschen. Im Kreml lacht man sich bestimmt den Rücken krumm.
Liebe Leute, lasst euch das eine Warnung sein, was passiert, falls hier jemals die #AFD irgendetwas relevantes zu sagen bekommt. Die werden denn Staat genauso auf links ... äh ... rechts drehen und alles zerstören, was über Jahrzehnte mühsam aufgebaut wurde!


Virtue or Vice? A First Look at Paragon's Proliferating Spyware Operations

The report investigates Paragon Solutions, an Israeli spyware company founded in 2019 that sells a product called Graphite. Through infrastructure analysis, the researchers identified potential Paragon deployments in several countries. They also found evidence linking Paragon to the Canadian Ontario Provincial Police. Working with WhatsApp, they discovered and mitigated a Paragon zero-click exploit targeting civil society members. Forensic analysis of Android devices in Italy confirmed Paragon infections. The report also examines a potentially related iPhone spyware case. It highlights Paragon's targeting of individuals involved in migrant rescue operations in the Mediterranean, raising questions about the company's claims of only selling to customers respecting human rights. The findings challenge Paragon's marketing approach and demonstrate the ongoing risks of mercenary spyware abuse, even in democracies.

Pulse ID: 67db3e42358011c1a3975302
Pulse Link: https://otx.alienvault.com/pulse/67db3e42358011c1a3975302
Pulse Author: AlienVault
Created: 2025-03-19 21:59:30

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Android #Canadian #CyberSecurity #InfoSec #Israel #Italy #OTX #OpenThreatExchange #RAT #RCE #SpyWare #WhatsApp #bot #AlienVault


(Citizenlab.ca) Virtue or Vice? A First Look at Paragon’s Proliferating Spyware Operations https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/

Very interesting deep-dive into the Paragon spyware by Israeli company Paragon Solutions Ltd.

Summary:
A First Look at Paragon's Proliferating Spyware Operations" investigates Paragon Solutions, an Israeli spyware vendor founded in 2019 that sells a product called Graphite. Paragon claims to have safeguards against abuse, distinguishing itself from competitors like NSO Group. The investigation mapped Paragon's server infrastructure, identifying potential deployments in Australia, Canada, Cyprus, Denmark, Israel, and Singapore, with a possible connection between Paragon and the Ontario Provincial Police in Canada. Meta and WhatsApp discovered and mitigated a Paragon zero-click exploit, notifying over 90 targeted individuals. Targets included civil society members in Italy, with forensic analysis confirming spyware infections on Android phones. The findings raise serious concerns about Paragon's claims of preventing abuse, as evidence shows targeting of human rights groups, government critics, and journalists.

#Cybersecurity #Spyware #Israel #Denmark #Canada #Journalists #WhatsApp #Paragon


Back on my boring post grind to document my learning.

New #Blog post going through a #TryHackMe challenge. This time detecting two different attack types with snort!

https://ligniform.blog/posts/snort-live-attacks/

💜 🌱

#InfoSec #Learning #CyberSecurity #BlueTeam #Hacking


So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use.

Let me put the important words in uppercase.

So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use.

[Edit with H/T: https://benjojo.co.uk/u/benjojo/h/cR4dJWj3KZltPv3rqX]

https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/

#cloudflare #password #cybersecurity


Niederlande sollen sich von US-Software lösen: Parlament fordert Schaffung einer nationalen Cloud unter eigener Kontrolle. Ziel: Stärkung der Cybersicherheit und digitalen Autonomie. #Cybersecurity #Cloud https://winfuture.de/news,149678.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


Chaos bei der CISA: US-Cybersicherheitsbehörde holt Gefeuerte per Website zurück

Geschasste Mitarbeiter sollen sich per E-Mail melden - und werden nach Rückkehr sofort freigestellt. Gerüchte über ihr Red Team dementiert die CISA.

https://www.heise.de/news/Chaos-bei-der-CISA-US-Cybersicherheitsbehoerde-holt-Gefeuerte-per-Website-zurueck-10320140.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Cybersecurity #Journal #Netzpolitik #Security #news


Sekoia: https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/

A few days ago Brian Krebs wrote about ClickFix, and now Sekoia has written a technical deep dive of said malicious framework.

In the Sekoia report they analyze the evolution of ClearFake, a malicious JavaScript framework that compromises legitimate websites to deliver malware through drive-by downloads. Since its emergence in July 2023, ClearFake has evolved from displaying fake browser updates to using sophisticated social engineering tactics called 'ClickFix' that trick users into executing malicious PowerShell code. The latest variant (December 2024-February 2025) uses fake reCAPTCHA or Cloudflare Turnstile verifications alongside technical issues to deceive users. ClearFake leverages the Binance Smart Chain through a technique called 'EtherHiding' to store malicious code, making it impossible to remove. The framework has infected thousands of websites and is actively distributing Lumma Stealer and Vidar Stealer malware.

https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/

@briankrebs
@sekoia_io

#CyberSecurity #ClickFix #ThreatIntel


'LAPD knew protests were coming: 2 days earlier, the dept received👉advanced warning 👈on #Dataminr, a socialmedia #surveillance firm ...and👉“official partner” of X👈.

....LosAngeles #ACAB Department emails obtained via public records show city police used Dataminr to track Gaza-related demonstrations and other constitutionally protected #freespeech.'

"#LAPD Surveilled #Gaza #Protests Using #SocialMedia Tool"

https://theintercept.com/2025/03/17/lapd-surveillance-gaza-palestine-protests-dataminr/ #CyberSecurity #DomesticSpying #CyberStalking @palestine


Cyber-Attacke auf Schweizer #Spar-Gruppe: Kartenzahlung und Warenwirtschaftssystem ausgefallen. Supermärkte im Notfallmodus - mobile Geräte von SumUp als Ersatzlösung. #Cybersecurity #SparSchweiz #Schweiz https://winfuture.de/news,149628.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


👋 Hallo Mastodon!

Ich bin neu hier und beschäftige mich mit #Informationssicherheit, #Datenschutz und #IT-Risikomanagement. Mein Fokus liegt auf #ISO27001, #BSIITGrundschutz und #DSGVO.

Ich betreibe das [ISMS-Ratgeber-Wiki](https://wiki.isms-ratgeber.info), eine freie Wissenssammlung für alle, die sich mit ISMS beschäftigen. Schaut gern vorbei und lasst uns austauschen! 🚀

#CyberSecurity #Informationssicherheit #ISMS #Datenschutz #ITSicherheit #neuhier