Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week. This week's volume was curated by Secjuice writers Prasanna, Ross Moore, Muhammad Luqman, Andy74, Sinwindie, and Tony Kelly.
In this edition we have news articles, blog posts, learning content, and events.
Hacker leaks data of 2.28 million dating site users
Data belongs to dating site MeetMindful and includes everything from real names to Facebook account tokens, and from email addresses and geo-location information.
Historic victory for privacy as dating app receives gigantic fine
The Norwegian Data Protection Authority issued an advance notification of a 100 million NOK (€ 9 600 000) fine to the dating app Grindr, as a result of a legal complaint filed by the Norwegian Consumer Council.
Google: North Korean hackers have targeted security researchers via social media
Google TAG warns security researchers to be on the lookout when approached by unknown individuals on social media.
Environmental Regulator Suffers Ransomware Blow
SEPA warns it will take some time to restore all services.
Apple Warns of 3 iOS Zero-Day Security Vulnerabilities Exploited in the Wild
Apple releases security updates for iOS, iPadOS, and tvOS with fixes for three security vulnerabilities actively exploited in the wild.
New Attack Could Let Remote Hackers Target Devices On Internal Networks
A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network, according to the latest research.
New Docker Container Escape Bug Affects Microsoft Azure Functions
Cybersecurity researcher Paul Litvak today disclosed an unpatched vulnerability in Microsoft Azure Functions that could be used by an attacker to escalate privileges and escape the Docker container used for hosting them.
ADT Security Camera Flaws Open Homes to Eavesdropping
Researchers publicly disclosed flaws in ADT's LifeShield DIY HD Video Doorbell, which could have allowed local attackers to access credentials, video feeds and more.
Windows Installer zero-day vulnerability gets free micropatch
A vulnerability in the Windows Installer component, which Microsoft attempted to fix several times to no avail, today received a micropatch to deny hackers the option of gaining the highest privileges on a compromised system.
Perl.com domain stolen, now using IP address tied to malware
The domain name perl.com was stolen this week and is now points to an IP address associated with malware campaigns.
Operation Dream Job by Lazarus - JPCERT/CC Eyes
Lazarus (also known as Hidden Cobra) is known to use various kinds of malware in its attack operations, and we have introduced some of them in our past articles. In this article, we present two more; Torisma and LCPDot.
CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)
The Qualys Research Team has discovered a heap overflow vulnerability in sudo, a near-ubiquitous utility available on major Unix-like operating systems. Any unprivileged user can gain root privileges.
Elasticsearch and Kibana are now business risks
If your organisation uses the open source versions of either Elasticsearch or Kibana in its products or projects, it is now at risk of being forced to release its intellectual property under terms dictated by another.
Wormable Android malware spreads via WhatsApp messages
Android users should watch out for malware that spreads via WhatsApp and lures the targets into downloading an app from a website posing as Google Play.
Three key documents you need BEFORE you have a security breach
Every minute you waste during a crisis reduces your chances of recovery and wastes valuable resources. Wasted time can be avoided with the creation of three documents.
Machine-in-the-Middle (MitM) BLE Attack
Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of attack technique, namely a relay attack. The relay attack is a form of MitM attack, not to be confused with the more well-known replay attack.
Free Cybersecurity Training | Free Online Cybersecurity Program
Get access to 20 free cybersecurity training modules from RangeForce to help upskill your cyber skills, or provide access to your IT team.
Open-Source Intelligence (OSINT) Summit | SANS Cyber Security and OSINT Training
Summit: February 11-12 | Training: February 8-10 & 15-20
The OSINT Summit & Training will bring together leading security practitioners and investigators to share proven techniques and tools that can be applied to OSINT gathering and analysis. Learn how to collect information across the Internet, analyze the results, and utilize key data to reach your objectives.