A dangerous cream is to take a way through software packages


New results for this The week showed that an incorrect platform used by the Ministry of Internal Security, sensitive national security information – including data related to American supervision – was exposed to thousands. Meanwhile, 15 New York officials were arrested this week by the Customs and Police Department in New York this week about 26 federal panels – where the ice arrested people in what the courts requested.

Russia tested the explicit military exercises that tested HPRP missiles near NATO borders and created tensions in the region after the Kremlin recently transferred drones to the Polish and Romania. Bachelor’s have a new tool for sending random mail texts, known as “SMS Blasters”, which can send 100,000 texts per hour while escaping from SPAM anti -telecommunications actions. Transport companies publish cell towers that deceive people’s phones in connecting to harmful devices so that they can circumvent the texts directly and the bypass filters. A pair of defects can be used in the Microsoft Identity and Access Management system, which is corrected, to reach almost all AZURE customer accounts – a possible disaster.

This week, WIRED released a detailed guide to access to the Torch phone as well as other options that are more special than the regular phone but not as real as the real flame. We updated your guide to the best VPNS

But wait, there are more things! Every week, we collect security and privacy news that we did not cover deeply. Click on the titles to read full stories. And stay in safety there.

Cyber ​​security world grew up with many software supply attacks, as infiltrators are hiding their symbol in a legal program to silence any system that uses this symbol all over the world. In recent years, infiltrators have tried to link another software supply attack and find a second developer goal of their victims to threaten another program and launch a new round of injuries. This week, it has witnessed a new and worrying development of these tactics: full supply chain worm.

These harmful programs, named after Fremen for Monster Sands in the SCI -Fi novel Hill (And the name of the GitHub page, where the malware has published its victim’s accreditation data), hundreds of open programs for the source in the symbol tank management or NPM used by Javascript developers. The Shai-Hulud cream is designed to injure a system that uses a software package, then searches for more NPM in this system so that it can destroy another package and continue to expand.

Through one account, the cream expanded to include more than 180 software packages, including 25 used by Crowdstrike Cyber ​​Security, although Crowdstrike has removed it from the NPM reservoir since then. A number of Cyber ​​Security Respiraslabs has made its number more affected by more than 700 packages. This makes Shah Haldey one of the largest supply chain attacks in history, although the purpose of her collective theft is far from that.

Western privacy advocates have long refer to observation systems in China, where possible dust awaits states like the United States if the technology industry fails to examine and collect government data. But Associated Press’s large -scale research shows how China monitoring systems are largely based on American technologies. AP correspondents have shown evidence that the China Watch Network – from the “Golden Shield” police system that Beijing officials have previously controlled the Internet control and claimed that they are terrorists to target and follow them and often be in the country’s Xinjiang area, which seems to be built with the help of American companies. Microsoft, Thermo Fisher, Motorola, Amazon Web Services, Western Digital and HP. In many cases, AP found Chinese marketing materials in a language in which Western companies offer supervisory programs, Chinese police tools and internal information services.

Spider, the penetration, extortion and extortion, mainly based in Western countries, publishes a supplement to chaos on the Internet for many years, and has targeted goals from MGM and Caesar Palace to the Marks & Spencer Food series in England. Two-year-old members in the UK Group: 19-year-old Talha Jubair and Jul 18, on charges of transporting the Transit system in London-which has been constantly affected by more than $ 50 million in other goals. Jubair alone is accused of targeting 47 organizations. These arrests are just the latest field to target scattered spider, which continued to continue a series of violations almost without interruption. Noah Urban, who was condemned to the scattered spider activity, spoke from Bloomberg Business Week for a long time in his electronic criminal profession. The city of 21 years has been sentenced for a decade of prison.

Leave a Reply

Your email address will not be published. Required fields are marked *