Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: CyberSecurity
-

Web 3.0, often referred to as the Semantic or Decentralized Web, has emerged over the past few years as a both an ideological and technological shift from the current state of the internet, referred to as Web 2.0. The new technology is defined by decentralized databases and distributed ledgers across nodes, reducing the risks in…
-

A notable security vulnerability has been flagged and cataloged by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in Adobe Acrobat Reader, making a critical entry in its Known Exploited Vulnerabilities (KEV) catalog. The flaw, tracked as CVE-2023-21608 with a CVSS (Common Vulnerability Scoring System) score of 7.8, is categorized as high-severity due to its…
-

A critical vulnerability within the GNU C Library (glibc) has recently come to light, putting a spotlight on the inherent complexities and potential oversights in system security, even within well-established, widely used open-source software. This vulnerability granted the name “Looney Tunables” by the researchers from Qualys, resides in glibc’s dynamic loader, a crucial component in…
-

As technology advances, so do both cyberattacks and cybersecurity, both are constantly evolving in order to surpass the other. As new, cutting edge technology develops, like quantum computing, network defenders have a substantial problem on their hands, as quantum decryption could be a powerful tool for attackers. While it’s a thrilling shift with the promise…
-

The FBI recently released a PIN (Private Industry Notification) in order to “highlight emerging ransomware trends,” in this case “dual ransomware attacks,” a type of attack that targets the same organization twice with two different types of ransomware, resulting in a significantly more encrypted system for the victims. A dual ransomware attack is classified by…
-

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from September that should be immediately patched or addressed if present in your environment. Detailed writeups below:…
-
Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this email, the actors are appearing as LastPass, the password manager company, and informing you that action needs to be taken on your account in order to avoid deactivation, in this case…
-

The list of export-restricted military documents leaked by players of the popular free-to-play game War Thunder just got longer. The flight manual for the F-117 Nighthawk, a stealth aircraft manufactured by Lockheed Martin, was posted on the War Thunder official site forum, a place for community discussion about various War Thunder related topics like in-game…
-

38 Terabytes. That’s the amount of storage it takes to store 7600 hours of HD video, enough to watch for 316 days without repeating anything. It’s also the amount of private company data that Microsoft AI researchers accidentally exposed, including over 30,000 internal Teams messages, according to cloud security company Wiz. The Microsoft Azure Leak…
-

On September 12, Microsoft released new information about threat actors Storm-0324, a group that gains initial access to systems through email-based phishing and then distributes access to other malicious groups. The transfer of access typically leads to ransomware deployment, making Storm-0324 essentially a middle-man group for system intrusion, one that specializes in initial system penetration.…