Zacco logotypeDigital Trust

Discover

Weekly News Digest

Each week Zacco tracks the latest cyber security threats, current industry news or trends and insights into the latest protection best practice. The Cyber Security Digest is a weekly compilation of the most significant developments within both cybersecurity and digital protection space, with links to further information on how it might affect you, your company or your clients.

Essential reading for cyber security professionals, as well as the general public, to keep you informed of current events and emerging threats.

Leaked files reveal Iran’s interest in targeting ICS

Sky news a British news agency was about to get their hands on five internal reports for a secret offensive cyber unit of the Iranian government which is the Islamic Revolutionary Guard Corps. There were around 60 files and all the files were marked very confidential. The Iranian government is trying to improve its offensive cyber capabilities, including targeting industrial control systems (ICS).

Read more

Syrian e-Government portal used by hackers to deliver Android Trojan

Zhengyu Dong, Fyodor Yarochkin, and Steven Du researchers from Trend Micro said that this is the first time they have seen this APT group has been publicly observed in delivering the Android Trojan. This Trojan could read contacts, write to external storage, keep the device awake, access information about cellular and Wi-Fi networks, precise location

Read more

D-Link issues fix for DIR 3040 routers

The network equipment vendor has released firmware fixes for its DIR 3040 routers which have multiple vulnerabilities. A successful exploit can allow hackers to execute arbitrary code, gain access to sensitive information or even crash the device. The flaws were discovered by Cisco Talos researchers

Read more

Microsoft Security Patch July 2021

Microsoft has released fixes for 117 vulnerabilities for July 2021. Among 117, 13 are classified as critical and 103 as important, and 1 as moderate. 53% of the vulnerabilities are locally exploitable and 44% are remotely exploitable

Read more

Cryptocurrency enthusiasts being scammed by 170 android apps

Lookout Threat lab security research has identified around 170 fake android applications from which 25 of them have been found in the play store. These apps scam people interested in investing in cryptocurrency. The hackers have managed to steal 350000 million dollars from 93000 users

Read more

Cobalt malware disguised as Kaseya patch email

Taking advantage of the cyberattack incident in Kaseya there is a rise in the number of email campaigns. The email claims to be a shipping order renewal with a link to Kaseya’s own website. When the user clicks the link, it is direct to a different server where the malicious file exists

Read more

Bug in Edge browsers could have let hackers steal your secrets

The vulnerability was discovered by Ignacio Laurence, Vansh Devgan, and Shivam Kumar Singh with CyberXplore Private Limited. Windows has now rolled out updates that fix two security issues. One of being a security bypass vulnerability that, if exploited, could inject, and execute arbitrary code in the context of any website

Read more

Google’s latest scorecard tool scans open-source software for security risks

The updated version of Google Scorecard produces a “Risk Score” for open-source software with improved checks and capabilities to make the data accessible for analysis. The update comes with features like, checks for contributions from malicious authors or compromised accounts that can introduce potential backdoors into code. Use of fuzzing (e.g., OSS-Fuzz), and static code analysis tools (e.g., CodeQL), signs of CI/CD compromise, and bad dependencies

Read more

New RCE flaw exploited in the wild, affects Windows Print Spooler

On Thursday, Microsoft issued a warning against an RCE vulnerability (Printnightmare) affecting windows print spooler. Windows said that a successful exploit could allow attackers to run arbitrary code with system privileges and could install programs; view, change or delete data; or create new accounts with full user rights

Read more