News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Detection tool for Pegasus and other spyware
Kaspersky_news

Kaspersky's Global Research and Analysis Team (GReAT) has developed a new detection method for Pegasus and similarly sophisticated iOS spyware. The cybersecurity provider is providing a publicly available infection check tool on Github. The spyware Pegasus was recently used in Germany. To make it easier to identify spyware infections, Kaspersky experts have developed a self-check tool for users. In addition to Pegasus, the iOS spyware Reign and Predator are also detected. Kaspersky experts were able to develop the new detection method because they realized that Pegasus infections leave traces in the system log “Shutdown.log”, which is in the diagnostic archive of every mobile...

Read more

Hope: Black Basta data decryption tool
B2B Cyber ​​Security ShortNews

Hackers also make mistakes: According to a report on GitHub, the experts at SRLabs have discovered a vulnerability in the Black Basta ransomware. You were then able to build a decryption tool, which can probably save the data in many cases. The APT group Black Basta has caused a lot of damage with its ransomware. Many of the companies affected did not take part in the blackmail, but they often lost some data. Now there is hope again for the recovery of some data: the experts at SRLabs have discovered a vulnerability in the ransomware of...

Read more

Fail: APT group only rudimentarily deletes telltale data
B2B Cyber ​​Security ShortNews

Members of the APT37 group have only rudimentarily deleted their collected attack data. Experts restored the data and analyzed it in detail. They found activity timelines, malicious code, and plenty of useful clues to internal workings. Even cybercriminals store data on GitHub and forget to completely delete their data. The Zscaler ThreatLabz team got a closer look at the tools, techniques, and processes (TTPs) of APT37 (aka ScarCruft or Temp.Reaper), a North Korean-based Advanced Persistent Threats threat actor. Data from APT37 shows the procedure In their research,…

Read more

Microsoft only closes known vulnerabilities after 100 days
Microsoft only closes known vulnerabilities after 100 days

Orca Security criticizes the slow reaction from Microsoft in fixing the SynLapse vulnerability, which was only closed after 100 days. Further isolation and hardening for better cloud security is recommended. Although SynLapse (CVE-2022-29972) is a Critical vulnerability, it has taken Microsoft over 100 days to complete the necessary steps to resolve the vulnerability. 100 days of open vulnerability After Microsoft was informed about the SynLapse vulnerability on January 4th and after several follow-ups, the first patch was only provided in March, which Orca Security was able to bypass. Microsoft has the original…

Read more