Cyberattacks Use Office 365 to Target Supply Chain

From securityintelligence.com

Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information. But they need not stop there. They can also single out other entities with which the target does business for supply chain cyberattacks.

Read more…

Oopukrecku.com ads (spam)

From 2-spyware.com

Oopukrecku.com

Oopukrecku.com ads come to the screen of the device, and notifications also keep you from accessing wanted material. Redirects and additional pop-ups get triggered when you interact with any of the advertisements and commercial material. There are various issues related to the commercial content because all the sites you get exposed to can include malicious download scripts and other PUPs. These are not the worst cyber intruders, but potentially unwanted and possibly malicious applications trigger other issues with the machine: diminishes speed and performance overall.

Read more…

New Edition of Pipeline Cybersecurity Standard Covers All Control Systems

From securityweek.com

The American Petroleum Institute (API) this month published the third edition of its pipeline cybersecurity standard, which focuses on managing cyber risks associated with industrial automation and control environments.

The third edition of Standard 1164, Pipeline Control Systems Cybersecurity, has been in the works since 2017, and it’s based on input from over 70 organizations. The standard is based on NIST’s Cybersecurity Framework and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards.

According to the API, which is the largest trade association for the oil and natural gas industry, this edition covers all control systems, rather than just SCADA systems as the previous edition did.

Read more…

Scam artists are recruiting English speakers for business email campaigns

From zdnet.com

Native English speakers are being recruited in their droves by criminals trying to make Business Email Compromise (BEC) more effective. 

BEC schemes can be simple to execute and among the most potentially devastating for a business, alongside threats such as ransomware. 

A BEC scam will usually start with a phishing email, tailored and customized depending on the victim. Social engineering and email address spoofing may also be used to make the message appear to originate from someone in the target company — such as an executive, the CEO, or a member of an accounts team — in order to fool an employee into making a payment to an account controlled by a criminal.

Read more…

Tachyum’s Prodigy emulator achieves first boot, runs Linux and says ‘hello, world’

From theregister.com

Tachyum has announced a milestone on the road to finally launching its much-vaunted high-performance “universal processor,” Prodigy, with a first-boot into Linux – but its FPGA prototype is still a long way away from proving the company’s bold claims.

Founded in 2017 by a team made up of Skyera and SandForce co-founder Dr Radoslav “Rado” Danilak, Wave Computing co-founder Ken Wagner, engineer Igor Shevlyakov, and hardware architect Rod Mullendore, Tachyum is in the process of designing what it calls a “universal processor.’ Dubbed Prodigy, the design – originally known as the “Cloud Chip” – is claimed to be able to run programs written for x86, Arm, and RISC-V architectures as well as its own native architecture, and to do so 10 times faster than its rivals.

Read more…

HPE Warns Sudo Bug Gives Attackers Root Privileges to Aruba Platform

From threatpost.com

Hewlett Packard Enterprise (HPE) is warning a vulnerability in Sudo, an open-source program used within its Aruba AirWave management platform, could allow any unprivileged and unauthenticated local user to gain root privileges on a vulnerable host.

Rated high in severity, HPE warns the Sudo flaw could be part of a “chained attack” where an “attacker has achieved a foothold with lower privileges via another vulnerability and then uses this to escalate privileges,” according to a recent HPE security bulletin.

The Aruba AirWave management platform is HPE’s real-time monitoring and security alert system for wired and wireless infrastructures. The Sudo bug (CVE-2021-3156) was reported in January by Qualys researchers and is believed to impact millions of endpoint devices and systems.

Read more…

BoobSnail: generating Excel 4.0 XLM macro

From securityonline.info

BoobSnail allows generating XLM (Excel 4.0) macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation. Features:

  • various infection techniques;
  • various obfuscation techniques;
  • translation of formulas into languages other than English;
  • can be used as a library – you can easily write your own generator.

Read more…