securityboulevard.com Open in urlscan Pro
2606:4700:10::6816:29c  Public Scan

URL: https://securityboulevard.com/2021/11/the-security-digest-87/
Submission: On November 18 via api from GB — Scanned from GB

Form analysis 2 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST /2021/11/the-security-digest-87/

<form method="post" enctype="multipart/form-data" id="gform_10" action="/2021/11/the-security-digest-87/">
  <div class="gform_body gform-body">
    <ul id="gform_fields_10" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_10_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_1">Email<span class="gfield_required"><span
              class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_10_1" type="text" value="" class="large" placeholder="Your Email" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_10_2" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="gsection_description"><a href="https://securityboulevard.com/privacy-policy/">View Security Boulevard <u>Privacy Policy</u></a></div>
      </li>
      <li id="field_10_3" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_10_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_10_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_5" class="gfield gfield--width-full field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_5">CAPTCHA</label>
        <div id="input_10_5" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn&amp;co=aHR0cHM6Ly9zZWN1cml0eWJvdWxldmFyZC5jb206NDQz&amp;hl=en&amp;v=yZguKF1TiDm6F3yJWVhmOKQ9&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=8npwetghdnqg"
                width="256" height="60" role="presentation" name="a-f4ism8e0lq0g" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </li>
      <li id="field_10_6" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_10_6">Comments</label>
        <div class="ginput_container"><input name="input_6" id="input_10_6" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_10_6">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_10" class="gform_button button" value="Subscribe Now"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_10&quot;]){return false;}  window[&quot;gf_submitting_10&quot;]=true;  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_10&quot;]){return false;} window[&quot;gf_submitting_10&quot;]=true;  jQuery(&quot;#gform_10&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_10" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="10">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_10" value="WyJbXSIsImExN2ZmNzMxNzRmOWUyZjU4NDM0NzI5MzVhYzMzZjI2Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_10" id="gform_target_page_number_10" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_10" id="gform_source_page_number_10" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="1637215936201"></p>
</form>

Text Content

Thursday, November 18, 2021
 * Remote Workforce Cybersecurity Concerns Hit New High
 * A behavioral approach to device fingerprinting
 * Cybersecurity for Oil and Gas: An Overview
 * Tech CEO Pleads to Wire Fraud in IP Address Scheme
 * The Security Digest: #87

 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Bloggers Network
   * Latest Posts
   * Contributors
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Events
   * Upcoming Events
   * Upcoming Webinars
   * On-Demand Events
   * On-Demand Webinars
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
 * Library
 * Related Sites
   * Techstrong Group
   * Container Journal
   * DevOps.com
   * Security Boulevard
   * Techstrong Research
   * Techstrong TV
   * Devops Chat
   * DevOps Dozen
   * DevOps TV
   * Digital Anarchist
 * Media Kit
 * About Us



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor


TwitterLinkedInFacebookRedditEmailShare
Security Bloggers Network 

HOME » SECURITY BLOGGERS NETWORK » THE SECURITY DIGEST: #87

THE SECURITY DIGEST: #87

by Dylan Broxson on November 17, 2021

Do you check Mail on your Apple watch? Learn why researchers are warning against
it. A new zero day has been fixed for iPhone iOS 15.0.2 flaw. There are security
issues in embedded devices for Linux users involving BusyBox. A mysterious
Israeli company is recently under fire for helping facilitate widespread cyber
attacks on people who visited a popular British news website. There is a new
form of phishing called “smishing”, where hackers pose their attack as a SMS
text message.

APPLE UPDATES:

 * Beware using Mail on your Apple Watch. Security researchers have found that
   receiving messages on your wrist compromises Mail Privacy Protection in iOS
   15 by revealing your IP address to senders. Mail Privacy Protection —
   available across Mac, iPhone and iPad — is designed to prevent this from
   happening by masking your actual IP address. But it seems that using Mail on
   Apple Watch completely undermines it. Read more.

 * Apple recently fixed a zero-day iPhone flaw with iOS 15.0.2 — update now as
   iOS 15.0.2 and iPadOS 15.0.2 are extremely important. Read more at Tom’s
   Guide.

CRITICAL VULNERABILITIES FOUND IN BUSYBOX:

 * Researchers warn users to update Linux systems now.
 * BusyBox is one of the most widely used Linux software suites, and many of the
   world’s leading operational technology (OT) and Internet of Things (IoT)
   devices run BusyBox. Some of the threats could have resulted in denial of
   service (DoS) attacks in exploited, and in rarer cases, could also lead to
   information leaks and possibly remote code execution. Read more at TechRadar.

BRITISH NEWS WEBSITE HACKED:

 * A popular British news website, the Middle East Eye, was hacked using a
   “watering hole attack” by a mysterious Israeli company, specifically
   targeting and manipulating the devices of users who visited the site. A
   watering hole attack is a tactic that “places malicious software on a website
   to infect and hack the computers of people who visit it.” The U.S. Commerce
   Department added the Israeli company, Candiru, to the trade blacklist in
   early November for helping an unknown foreign government facilitate
   cybersecurity attacks against journalists, political figures, government
   officials and others. Candiru was previously accused of helping authoritarian
   regimes by providing hacking technology and other services. Read more at NBC
   News.

A NEW HYBRID OF PHISHING:

 * We’ve all heard of phishing scams and the many ways people have inadvertently
   been hacked. “Smishing” or phishing in the form of an SMS text message, is
   evolving. KrebsOnSecurity reports about “a hybrid form of smishing — blasting
   out linkless text messages about suspicious bank transfers as a pretext for
   immediately calling and scamming anyone who responds via text,” and breaks
   down details of an example of this phone-based attack.


OWL FUN AND FACTS:

Shelley’s Eagle Owl. Credit: Dr. Robert Williams / Imperial College London

British scientists working in Ghana have rediscovered a “holy grail” giant owl
that has lurked almost unseen in African rainforests for 150 years. Read more at
Phys org.


ABOUT:

TSD began as an internal newsletter created by our security team that would be
circulated to the team each Tuesday. It proved to be a great resource for all of
us so we thought, why not share it with all of you? Our hope is that it helps
make you just a bit more secure.

Check back here every Tuesday for more TSD or sign up below to stay in the loop!

Please reach out to us directly, via security@cyral.com or follow us on twitter
@cyralinc if you have any questions, concerns, tips or anything else!

The post The Security Digest: #87 appeared first on Cyral.

*** This is a Security Bloggers Network syndicated blog from Blog – Cyral
authored by Dylan Broxson. Read the original post at:
https://cyral.com/blog/the-security-digest-87/

November 17, 2021November 17, 2021 Dylan Broxson 0 Comments

 * ← DEF CON 29 Voting Village – Kevin Skoglund’s ‘Are Barcodes On Ballots Bad’
 * Tech CEO Pleads to Wire Fraud in IP Address Scheme →






TECHSTRONG TV – LIVE


Watch latest episodes and shows


SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.
 * Email*
   
 * View Security Boulevard Privacy Policy
 * 
 * 
 * CAPTCHA
   
 * Comments
   
   This field is for validation purposes and should be left unchanged.



Δ


MOST READ ON THE BOULEVARD

FBI Email—‘Threat Actor in Systems’—is Spam
Cybersecurity for Sports and Entertainment
US Treasury Again Threatens to Sanction Ransomware Victims
OWASP Addresses API Security
Data and the Cat-and-Mouse Game of Security
DEF CON 29 Voting Village – Maurice Turner’s ‘Why Hacking Voters Is Easier Than
Hacking Ballots’
Hoax Email Blast Abused Poor Coding in FBI Website
Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked
XKCD ‘Flinch’
XKCD ‘TTSLTSWBD’


UPCOMING WEBINARS

Thu 18


MODERN RANSOMWARE: HOW WE GOT HERE AND WHERE WE’RE GOING

November 18 @ 3:00 pm - 4:00 pm
Mon 22


SECURING OPEN SOURCE: BEST PRACTICES

November 22 @ 1:00 pm - 2:00 pm
Mon 29


CYBERSECURITY MAYHEM: 2021 THREATS AND WHAT TO EXPECT NEXT

November 29 @ 11:00 am - 12:00 pm
Tue 30


SECURING YOUR DEVELOPMENT INFRASTRUCTURE AND APPS FROM SUPPLY CHAIN ATTACKS

November 30 @ 11:00 am - 12:00 pm
Tue 30


SECURING ACCESS TO SENSITIVE CORPORATE DATA AND APPLICATIONS IN THE HYBRID WORLD

November 30 @ 3:00 pm - 4:00 pm
Dec 01


PROTECTING APPLICATIONS RUNNING ON KUBERNETES

December 1 @ 12:00 pm - 1:00 pm

More Webinars


DOWNLOAD FREE EBOOK




RECENT SECURITY BOULEVARD CHATS

 * Cloud, DevSecOps and Network Security, All Together?
 * Security-as-Code with Tim Jefferson, Barracuda Networks
 * ASRTM with Rohit Sethi, Security Compass
 * Deception: Art or Science, Ofer Israeli, Illusive Networks
 * Tips to Secure IoT and Connected Systems w/ DigiCert




INDUSTRY SPOTLIGHT

Cloud Security Cybersecurity Data Security Industry Spotlight IoT & ICS
Security Security Boulevard (Original) Threat Intelligence Vulnerabilities 


HOW VIRTUALIZATION HELPS SECURE CONNECTED CARS

November 17, 2021 Andrew Zola | Yesterday 0 Comments
Application Security Cloud Security Cybersecurity Data Security Industry
Spotlight Mobile Security Network Security Security Boulevard (Original) 


CYBERSECURITY FOR SPORTS AND ENTERTAINMENT

November 15, 2021 Bindu Sundaresan | 2 days ago 0 Comments
Cyberlaw Cybersecurity Data Security Governance, Risk & Compliance Industry
Spotlight Security Awareness Security Boulevard (Original) 


RANSOMWARE AND THE UNCERTAINTIES OF CYBERINSURANCE

November 4, 2021 Christopher Escobedo Hart | Nov 04 0 Comments


TOP STORIES

Cybersecurity Data Security Endpoint Featured IoT & ICS Security Malware Network
Security News Security Boulevard (Original) Spotlight Threat
Intelligence Vulnerabilities 


BLASTWAVE AIMS TO SIMPLIFY SECURING EDGE COMPUTING

November 17, 2021 Michael Vizard | Yesterday 0 Comments
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data
Security DevOps Editorial Calendar Endpoint Featured Identity & Access IoT & ICS
Security Malware Mobile Security News Securing Open Source Security
Awareness Security Boulevard (Original) Social Engineering Spotlight Threat
Intelligence Threats & Breaches Vulnerabilities 


ROWHAMMER REDUX: ‘BLACKSMITH’ FUZZING—PANIC NOW?

November 16, 2021 Richi Jennings | 1 day ago 1 Comment
Application Security Cloud Security Cybersecurity Featured Network
Security News Security Boulevard (Original) Spotlight 


PALO ALTO NETWORKS EXTENDS CLOUD SECURITY PORTFOLIO

November 16, 2021 Michael Vizard | 1 day ago 0 Comments


SECURITY HUMOR

JOY OF TECH® ‘THE TRUTH ABOUT PINCH AND ZOOM’






JOIN THE COMMUNITY

 * Add your blog to Security Bloggers Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsors Info
 * Copyright
 * TOS
 * DMCA Compliance Statement
 * Privacy Policy


RELATED SITES

 * Techstrong Group
 * Container Journal
 * DevOps.com
 * Techstrong Research
 * Techstrong TV
 * DevOps Chat
 * DevOps Dozen
 * DevOps TV
 * Digital Anarchist

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2021 Techstrong Group Inc. All rights reserved.
✓
Thanks for sharing!
AddToAny
More…




Notifications





previousnextslideshow