Tag Archive for: bulletin

Google Delivers September Android Security Bulletin, but No Pixel Update Yet


Yesterday, Google released the September Android security bulletin, sticking to its commitment of delivering these bulletins on the first Monday of every month. However, there was no Pixel update alongside it, leading to some confusion and complaints on social media platforms.

It’s important to note that Google deviated from its regular first-Monday schedule for Pixel updates starting in April, allowing themselves more flexibility in the delivery of monthly updates. This means that the absence of a Pixel update does not indicate any delay or failure on Google’s part.

The speculation about the release of Android 14 was also addressed in the article. Although Beta 5.1 and Beta 5.2 with bug fixes were rolled out in August, there has been no sign of the final Android 14 release. Google has only published the security bulletin build, which still carries the Android 13 designation.

In summary, if you have been eagerly refreshing your Pixel phone’s update page, hoping for a September update, you can stop for now. Google has not yet released an update, and it remains uncertain whether they will, or if it will be based on Android 13 or Android 14. Rest assured, we will keep you updated if there are any changes or announcements.

Source: Original article.

Source…

Rochester Public Schools fixes internet glitch that blocked school board candidates’ website – Post Bulletin


ROCHESTER — Rochester Public Schools has reported that an issue with its internet security has been fixed, no longer blocking the joint website of four school board candidates.

The candidates

raised the issue

during a recent debate at the Rochester Public Library, accusing the school district of cancel culture and voter suppression. The candidates include John Whelan, Elena Niehoff, Kim Rishavy and Rae Parker.

RPS subsequently responded with a statement, clarifying that the candidates’ website was unable to be accessed since it was “incorrectly flagged on some RPS devices” as a “parked domain” by the district’s security vendor, Netskope. The terms refers to websites that are “in development or waiting for a new owner,” according the Google Ads Center.

As of Sunday, RPS said Netskope had reclassified the website as “education.”

Source…

Malawi Household Food Security Bulletin | Mobile Vulnerability Analysis and Mapping (mVAM) on the Effects of COVID-19 in Malawi Round 17: 8th September – 7 th October 2021 – Malawi


SUMMARY OF KEY FINDINGS

  • The food security situation across the country remains stable, with almost all interviewed households classified as having acceptable to borderline food consumption as they consume from the 2021 harvest.

  • The proportion of households who are employing the most severe consumption-based coping strategies remains relatively low, ranging between 19 percent and 21 percent for the current round and the immediate past four rounds, indicating a generally stable food security situation.

  • Physical access to markets has increased slightly, likely due to the decrease in new COVID-19 cases as the third wave of the pandemic dies down coupled with the fact that rural households are still selling their produce from the recent harvest.

BACKGROUND

During this reporting period, Malawi continued experiencing a decline in the number of COVID-19 cases, deaths, and admissions to Emergency Treatment Units (ETUs). As of the last day of this reporting period (7th October 2021), the Ministry of Health indicated that the country registered nine new COVID-19 cases in the past 24 hours, down from 952 cases during the peak of third wave on 22 July 2021.

Cumulatively, Malawi has recorded 61,648 cases, including 2,287 deaths with a case fatality rate at 3.71 percent.
Further, cumulatively, 56,208 cases recovered, with an overall recovery rate of 91.2 percent. Furthermore, on 8th October 2021, the Government announced the continued observance of the COVID-19 restrictions, which include wearing face masks, observing social distancing, and washing hands to prevent the spread of the disease.

METHODOLOGY

Round 17 of remote household-level survey data collection in response to COVID-19 monitoring and seasonal trends in food security took place between 8th September – 7 th October 2021. The survey for this report was conducted using live telephone calls, collecting information from some 2,504 households in all districts and major cities across the country.

The sample size was calculated based on the Integrated Food Security Phase Classification Technical Manual (Version 3.0) guideline of having at least 150 samples per strata. Additional details on this methodology are available in…

Source…

Cyberespionage malware threatens PH – Manila Bulletin


A rare, wide-scale, cyberespionage malware now targets users in Southeast Asia, mostly in the Philippines.

Already, the advanced persistent threat (APT) campaign victimized 1,400 users in the Philippines, some of which were government entities, according to experts of cybersecurity firm Kaspersky.

Initial infection occurs via spear-phishing emails containing a malicious word document.

Once downloaded in one system, the malware spreads to other hosts through removable Universal Serial Bus (USB) drives.

Advanced persistent threat campaigns are highly targeted, often focusing on just a few dozen users are targeted, with surgical-like precision.

However, the recently uncovered APT was a rare, widespread threat campaign in Southeast Asia, Kaspersky stressed.

The malware, dubbed LuminousMoth, had been conducting cyberespionage attacks against government entities since October 2020, at least.

While initially focusing their attention on Myanmar, the attackers have since shifted their focus to the Philippines.

The attackers typically gain an initial foothold in the system through a spear-phishing email with a Dropbox download link.

Once clicked, this link downloads a RAR archive disguised as a Word document that contains the malicious payload.

Once downloaded on a system, the malware attempts to infect other hosts by spreading through removable USB drives.

If a drive is found, the malware creates hidden directories on the drive, where it then moves all of the victim’s files, along with the malicious executables.

The malware also has two post-exploitation tools that can in turn be used for lateral movement.

One consists of a signed, fake version of Zoom and another steals cookies from the Chrome browser.

Once on the device, LuminousMoth proceeds to exfiltrate data to the command and control (C2) server.

For the targets in Myanmar, these C2 servers were often domains that impersonated known news outlets.

Kaspersky experts attribute LuminousMoth to the HoneyMyte threat group, a long-standing, Chinese-speaking threat actor, with medium to high confidence.

HoneyMyte gathers geopolitical and economic intelligence in Asia and Africa.

Source…