A dangerous cream is eating his way through software packages


New findings of this Week showed that a incorrect platform used by the Homeland Security Department, sensitive national security information – including data on American oversight – was exposed to thousands. Meanwhile, 15 New York officials were arrested this week by the New York Customs and Police Department this week about 26 federal plasies – where the ice arrests people in what courts have ordered.

Russia tested explicit military exercises that tested HPRP rockets near the NATO borders and created tensions in the area after the Kremlin recently transported drones to Polish and Romania. The fraudsters have a new tool for sending spam texts, known as “Blasters SMS”, which can send 100,000 texts per hour while escaping the anti -spam actions of the telecommunications company. Carriers deploy Rogues cell towers that deceive people’s phones in connecting to malicious devices so that they can circumvent the texts directly and bypass filters. And a pair of defects in the Microsoft Identity and Access Management System, which are patched, can be misused to access almost all azure customer accounts – a potential catastrophic catastrophe.

This week’s Wired released a detailed guide to accessing the torch phone as well as other options that are more private than a regular phone but not as real as a real torch. And we updated your guide to the best VPNs

But wait, there are more things! Every week, we collect security news and privacy that we have not covered deeply. Click the titles to read the full stories. And stay safe there.

The world of cyber security has grown up with many software supply chain attacks, in which hackers hide their code in a legal software to silence any system that uses that code worldwide. In recent years, hackers have even tried to link one software supply chain attack to another and find a second software developer goal among their victims to endanger another software and launch a new round of infections. This week, it saw a new and worrying evolution of those tactics: a full -fledged supply chain worm.

This malware, named after Fremen for monster sands in the sci -fi novel Hill (And the name of the GitHub page, where the malware has published the credentials of its victims) has endangered hundreds of open source software packages in managing the code tank or NPM used by JavaScript developers. The Shai-Hulud cream is designed to infect a system that uses one of the software packages, then hunts for more NPM in that system so that it can ruin another bundle and continue its expansion.

With one account, the cream has expanded to more than 180 software packages, including the 25 used by Crowdstrike Cyber ​​Security, although Crowdstrike has removed them from the NPM tank since then. A number of Cyber ​​Security Company Reversinglabs have made their number far more affected by more than 700 packages. This makes Shaha Halde one of the biggest supply chain attacks in history, though the purpose of its mass robbery is far from it.

Western privacy advocates have long been referring to China’s monitoring systems, as potential dustops awaiting countries such as the United States if the technology industry fails to examine and collect government data. But an extensive Associated Press research shows how China’s monitoring systems are largely built on US technologies. AP reporters showed evidence that the China Monitoring Network – from the “Golden Shield” police system that Beijing officials have previously censored Internet censorship and claimed to be terrorists to target, pursue and often Uyghurs and the country’s Xinjiang region, which appears to have been built with the help of US companies. Microsoft, Thermo Fisher, Motorola, Amazon Web Services, Western Digital and HP. In many cases, the AP has found Chinese -language marketing materials in which Western companies specifically provide supervisory and tool programs for Chinese police and internal information services.

Spreading spider, a hack and extortion and extortion, mainly based in Western countries, has been publishing a sequel to chaos on the Internet for many years, and has targeted targets from MGM and Caesar Palace to the Marks & Spencer food chain in England. Two members of the infamous group are now arrested in the UK: 19-year-old Talha Jubair and Owen Gul 18, both on charges of hacking transportation for the London transit system-which have continuously damaged more than $ 50 million-in other goals. JUBAIR alone is accused of targeting 47 organizations. These arrests are just the newest field to target the scattered spider, which has continued to continue an almost uninterrupted string of violations. Noah Urban, who was convicted of scattered spider activity, spoke from Bloomberg BusinessWeek for a long time in his cyber criminal profession. A 21 -year -old city has been sentenced to a decade of prison.

Leave a Reply

Your email address will not be published. Required fields are marked *