Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail52.atl111.rsgsv.net;

Posted on August 30, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:

DevOps orchestration tools represent a new risk to the enterprise

Orchestration tools help manage configuration and application deployment. They track and control code base changes and store file versions in a central configuration management database, allowing different developers to work on the same code base without worrying about version control. They also automate releases, enabling DevOps teams to achieve one of their core goals: continuous delivery.

DevOps methodologies completely disrupt traditional team setups, and implementing automated orchestration tools is sometimes seen as too far of a departure from traditional deployment techniques.

But companies that do embrace these orchestration tools often put too much trust in them. You could become a target for hackers when you rely on them as centralized tools that enforce policies across your whole enterprise. Once hackers get into your system, they hold the keys to the kingdom. They can modify any configurations they want — like altering firewalls, adding accounts, granting remote access to production systems, extracting data, changing prices, and installing known vulnerable software.

Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=7e67424fdb&e=20056c7556

Using Evernote as an Threat Intelligence Management Platform

[Video]

Most people are already familiar with Evernote. It?s easy to just throw all our miscellaneous data into the Elephant and effortlessly find it later with a quick search or correlate similar ideas with tags. Evernote is literally our external brain that increases our intelligence and helps us become more productive overall. This presentation discusses an experiment of using Evernote as an informal threat intelligence management platform, the specific concepts and strategies used, and its overall effectiveness. Although using Evernote in this way in large enterprises is probably not possible, the same lessons learned can be applied to implement a similarly effective system using open source or commercial software.

Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c7a10da833&e=20056c7556

NEW POS MALWARE DESIGNED TO STRIKE ORACLE SYSTEMS

The MalumPOS malware is a newly discovered attack tool with the ability to steal payment data from point-of-sale systems running a popular type of Oracle software, Trend Micro threat analyst Jay Yaneza said in a recent blog post.

Its prime target is Oracle’s MICROS platform, which is currently deployed on over 330,000 sites worldwide. The software is widely used in the U.S., especially within the hospitality, food and beverage, and retail industries, putting numerous high-profile companies and their customers at risk.

Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0055b00a84&e=20056c7556

Microsoft to introduce Antimalware Scan Interface (AMSI) in Windows 10

Here is a reason why Windows 10 users would have added security from malware. Microsoft has announced a new tool called as Antimalware Scan Interface (AMSI) for Windows 10 that allows application developers to further strengthen up the security of their application. With Antimalware Scan Interface, applications would be automatically integrated with the available antimalware program present on the PC, ensuring that no malware code escapes the check.

Intelligent Malware programs usually skip security scans and succeed in infecting PC’s, however, with AMSI coming for Windows 10 all content shall be sent for malware check to the locally installed antivirus software.

Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=a704f35528&e=20056c7556

Microsoft Confirms Ask Toolbar is Not Malware; Current Application is Compliant with Recently Updated Policies

“The latest Ask Toolbar is compliant with Microsoft’s objective criteria for third party software,” a Microsoft spokesperson said.

Microsoft’s Malware Protection Center previously erroneously stated the Ask Toolbar was flagged as unwanted software due to its search protection feature, which alerts toolbar users to third party application requests to change their settings (the feature does not prevent users themselves from changing their own settings). This search protection feature was removed from the current product months ago in preparation for Microsoft’s new policy roll out.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ba32883c9f&e=20056c7556

Fraudulent MERS emails from North Korea contained real computer virus

SEOUL, June 12 (UPI) — Email messages containing false updates about Middle East Respiratory Syndrome in South Korea also were found to be delivering malignant codes, possibly of North Korean origin.

The subject line of the email message read, “Guidelines on MERS Infection Prevention” in Korean and a document titled “Hospital and Patient List” was attached to the email.

The message was made to appear as if it were sent from the Korea Centers for Disease Control and Prevention, and the fake document upon opening would download a malignant code to the user’s computer, according to the Korea Internet and Security Agency.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ec3ad5e029&e=20056c7556

TEXAS OPENING NEW INTELLIGENCE CENTER TO BATTLE BORDER CRIME

With the signing of House Bill 11 on June 9 by Texas Governor Greg Abbott, a new intelligence center will be established in Hidalgo County, designed to target border crime more effectively. However, details are unclear regarding how this center’s mission will differ significantly from the multiple fusion and joint intelligence centers located across the state, calling into question whether the $2.1 million start-up cost is justified.

Officially known as the Texas Transnational Intelligence Center (TTIC), it will be operated by the Hidalgo County Sheriff’s Office and the McAllen Police Department, with assistance from the Texas Department of Public Safety, according to Action4 News.

However, Texas is already home to several fusion and joint operations centers designed to share crime information across agencies. These include the El Paso Intelligence Center (EPIC), the Texas Crime Information Center (TCIC) run by the Texas Department of Public Safety in Austin, the Austin Regional Intelligence Center, the Dallas Fusion Center, the El Paso Multi-Agency Tactical Response Information eXchange (MATRIX), the North Central Texas Fusion Center in McKinney, the Border Security Operations Center (BSOC) in Austin, and the Southwest Texas Fusion Center in San Antonio.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=eb002b1740&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage2.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage1.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=bc0e8745ee)

** Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme