Open source software hijacked by North Korean hackers

Infamous North Korean threat actor Lazarus Group has been observed engaging in a highly sophisticated, targeted malware attack that involves compromising popular open-source software and running spear phishing campaigns.  As a result, it has managed to compromise “numerous” organizations in the media, defense and aerospace, as well as IT services industries, a report from Microsoft has concluded.  The company claims Lazarus (or ZINC, as it dubs the group) compromised PuTTY, among other open-source applications, with malicious code that installs spyware. PuTTY is a free and open-source terminal emulator, serial console,…

Read More

Ubuntu is now available on AWS

Ubuntu WorkSpaces on AWS, a fully managed virtual desktop infrastructure (VDI), is now generally available on the public cloud platform. This marks the first time that a virtual Linux OS desktop has been available on AWS, which has previously only offered iOS and Windows operating systems. Ubuntu has consistently counted as among the most popular Linux distros, and Canonical, the developer behind Ubuntu, says the new tie-up gives developers access to a wide choice of open source tools and libraries in fields like data science, artificial intelligence and machine learning,…

Read More

Red Hat gives enterprise Linux a major boost

Red Hat is set to launch the beta of the latest version of the Red Hat Enterprise Linux (RHEL) platform, dubbed the 8.7 and 9.1 milestones.  Both RHEL 8.7 and 9.1 add new features and capabilities designed to help organizations more effectively use its Podman containers. Podman is an open-source tool for developing, managing, and running containers on Linux systems, developed by Red Hat engineers alongside the open source community, Podman allows users to manage their container ecosystem using the libpod library.  What can users look forward too? Enterprise users will now be…

Read More

This new Royal ransomware is already asking for millions

A brand new ransomware operator has been discovered active in the wild, and even though it’s a new entrant, it’s already demanding major ransom payments.  A new report from BleepingComputer together with cybersecurity intelligence firm AdvIntel has analyzed the group’s activities, its encryptor, and its methodology. Apparently, the group is made up of experienced ransomware actors that came from other operations. They joined forces in January this year, and don’t work as a RaaS, but rather as a private group with affiliates. At first, the group used other criminals’ encryptors,…

Read More

European cloud market is being dominated by three big players

Amazon Web Services (AWS), Microsoft, and Google now control nearly three-quarters (72%) of the European enterprise cloud storage market, a new study has claimed. Synergy Research Group found tha, although cloud hosting providers local to the region have seen revenues rise by 167% since 2017, they’ve also taken a huge hit to their market share – which has fallen from 27% to just 13% within the same period, as the giant US providers have overtaken them. Synergy claims that, out of all the European cloud providers, SAP and Deutsche Telekom…

Read More

VMware virtualization software is being hijacked to spy on businesses

Criminals have managed to compromise VMware’s ESXi hypervisors and gain access to countless virtual machines, meaning they can spy on numerous businesses using the hardware without those businesses ever knowing they’re being spied upon. The warning was given out by cyber threat intelligence firm Mandiant, together with virtualization firm VMware.  According to the two companies, unknown threat actors with possible ties to China, installed two malicious programs on bare-metal hypervisors, using vSphere Installation Bundles. They named them VirtualPita and VirtualPie (“Pita” also means “pie” in some Slavic languages). Furthermore, they…

Read More

Windows 11 22H2 printer bug breaks key features for some users

Windows 11 22H2 is embroiled in a fresh bug controversy, with the big feature update causing trouble with printers. Microsoft updated its support document on known issues with 22H2 to explain more about a fresh bug which means that some printers are being forced back to their default settings (as Neowin flagged up). The affected printers are those using the Microsoft IPP Class Driver or Universal Print Class Driver, and are having connectivity issues to the device. In other words, with no connectivity, the printer is set up with default…

Read More

Windows 11 update gives users more control over what’s using a file

While File Explorer will finally be gaining tabs in the next update to Windows 11, now that the first major 2022 update for it is available, PowerToys is also bringing in a useful update to see what’s using your files as it’s slowing down your PC. PowerToys is an app that has a collection of tools to help improve your PC or laptop, from putting a spotlight on your mouse to easily find it, or adding some additional tools to File Explorer, which is where this latest update comes in.…

Read More

Windows 11 22H2 printer bug breaks key features for some users

Windows 11 22H2 is embroiled in a fresh bug controversy, with the big feature update causing trouble with printers. Microsoft updated its support document on known issues with 22H2 to explain more about a fresh bug which means that some printers are being forced back to their default settings (as Neowin flagged up). The affected printers are those using the Microsoft IPP Class Driver or Universal Print Class Driver, and are having connectivity issues to the device. In other words, with no connectivity, the printer is set up with default…

Read More

Nearly all firms have suffered cloud security threats this year

The vast majority of organizations have suffered at least one cloud-related cybersecurity incident in the last 12 months, a new report from Venafi has claimed.  It found that rising complexity, and the lack of clarity over whose responsibility cloud security really is, are two major contributors to these incidents. According to Venafi, 81% of firms experienced at least one such incident in the last year. Almost half (45%) suffered as many as four incidents.  Security and operational risks Most of the time, they experience security incidents during runtime (34%), unauthorized…

Read More