Category: Attack Feeds

0

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks – [email protected] (The Hacker News)

– [[{“value”:”Identity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale” of credential stuffing attacks aimed at online services. These unprecedented attacks, observed over the last month, are said to be facilitated by “the broad availability of residential proxy services, lists of previously stolen credentials (‘combo lists’), and scripting tools,” the”}]]  –...

0

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file (“signal-2023-12-20-160512.ppsx”) as the starting point, with”}]]  – Read More  – The Hacker News 

0

DHS Establishes AI Safety Board with Tech Titans and Experts – Waqas

– [[{“value”:” By Waqas The Department of Homeland Security (DHS) has formed an AI Safety Board to ensure secure AI use in critical infrastructure. This is a post from HackRead.com Read the original post: DHS Establishes AI Safety Board with Tech Titans and Experts “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Bogus npm Packages Used to Trick Software Developers into Installing Malware – [email protected] (The Hacker News)

– [[{“value”:”An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick them into downloading a Python backdoor. Cybersecurity firm Securonix is tracking the activity under the name DEV#POPPER, linking it to North Korean threat actors. “During these fraudulent interviews, the developers are often asked”}]]  – Read More  – The Hacker News 

0

Cyberattack hits Georgia county at center of voting software breach – djohnson

– [[{“value”:” The computer infrastructure of a Georgia county at the center of an effort to falsely claim that the state’s 2020 presidential election was marked by fraud was struck by a cyberattack earlier this month that prompted state officials to sever Coffee County’s access to statewide election systems.  In a statement Friday, the Coffee County Board of Commissioners said...

0

7-Year-Old 0-Day in Microsoft Office Exploited to Drop Cobalt Strike – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Hackers are dusting off old tricks! A recent attack exploited vulnerabilities in systems running outdates Microsoft Office to deliver Cobalt Strike malware. Learn how to protect yourself! This is a post from HackRead.com Read the original post: 7-Year-Old 0-Day in Microsoft Office Exploited to Drop Cobalt Strike “}]]  – Read More  – Hackread – Latest...

0

Severe Flaws Disclosed in Brocade SANnav SAN Management Software – [email protected] (The Hacker News)

– [[{“value”:”Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from incorrect firewall rules,”}]]  – Read More  – The Hacker News 

0

Feds Bust Privacy-Centric Samourai Wallet Over BTC Money Laundering – Waqas

– [[{“value”:” By Waqas The official website of Samourai Wallet has been seized, while its official app on the Apple Store and Google Play has been removed. This is a post from HackRead.com Read the original post: Feds Bust Privacy-Centric Samourai Wallet Over BTC Money Laundering “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Integrated Residential Security Solutions to Employ in 2024 – Waqas

– [[{“value”:” By Waqas In 2024, integrated residential security solutions are vital for comprehensive protection against evolving threats, safeguarding homes and families with advanced technology and seamless connectivity. This is a post from HackRead.com Read the original post: Integrated Residential Security Solutions to Employ in 2024 “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Ensuring the Security and Efficiency of Web Applications and Systems – Waqas

– [[{“value”:” By Waqas As the number of applications and systems used in businesses grows, so do the threats and vulnerabilities that… This is a post from HackRead.com Read the original post: Ensuring the Security and Efficiency of Web Applications and Systems “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack – [email protected] (The Hacker News)

– [[{“value”:”Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that has come under active exploitation. The vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has been addressed in”}]]  – Read More  – The Hacker News 

0

New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates – [email protected] (The Hacker News)

– [[{“value”:”Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. “Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware,” Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development,”}]]  – Read More  – The Hacker News 

0

10 Critical Endpoint Security Tips You Should Know – [email protected] (The Hacker News)

– [[{“value”:”In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers’ favorite targets.  According to the IDC, 70% of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT”}]]  – Read More  – The Hacker News 

0

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites – [email protected] (The Hacker News)

– [[{“value”:”Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. “This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as”}]]  –...

0

AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry – cybernewswire

– [[{“value”:” By cybernewswire San Juan, Puerto Rico, April 25th, 2024, CyberNewsWire The telecom company AeroNet Wireless announced the launch of its… This is a post from HackRead.com Read the original post: AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures – [email protected] (The Hacker News)

– [[{“value”:”The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, “aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from [command-and-control] server,” Avast security researcher Luigino”}]]  – Read More  – The Hacker News 

0

“Junk gun” ransomware: the cheap new threat to small businesses – Graham Cluley

– [[{“value”:”A wave of cheap, crude, amateurish ransomware has been spotted on the dark web – and although it may not make as many headlines as LockBit, Rhysida, and BlackSuit, it still presents a serious threat to organizations. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

Google Patches Critical Chrome Vulnerability and Additional Flaws – Waqas

– [[{“value”:” By Waqas Using Google Chrome? Update your browser to the latest version right now! This is a post from HackRead.com Read the original post: Google Patches Critical Chrome Vulnerability and Additional Flaws “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

NDR in the Modern Cybersecurity Landscape – Uzair Amir

– [[{“value”:” By Uzair Amir The role of Network Detection and Response (NDR) in cybersecurity. Learn how NDR tools empower organizations to tackle evolving threats effectively. This is a post from HackRead.com Read the original post: NDR in the Modern Cybersecurity Landscape “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Popular File Transfer Software CrushFTP Hit by Zero-Day Exploit – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Popular File Transfer Software Hit by Zero-Day Exploit: Millions Potentially Exposed – Install Patches Right Now! This is a post from HackRead.com Read the original post: Popular File Transfer Software CrushFTP Hit by Zero-Day Exploit “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Network Threats: A Step-by-Step Attack Demonstration – [email protected] (The Hacker News)

– [[{“value”:”Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit”}]]  – Read More  – The Hacker News 

0

Campaigns and political parties are in the crosshairs of election meddlers – djohnson

– [[{“value”:” Foreign nations, criminal hacking groups and other malicious actors looking to influence elections have dedicated fewer resources to directly targeting or hacking election infrastructure and have shifted toward attacking major players in the electoral ecosystem, such as campaigns, political parties, news outlets and social media, according to a report released Thursday by Mandiant and Google Cloud. Attacks on...

0

DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over $2 billion in illegal transactions and for laundering more than $100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and William Lonergan Hill, 65, have been charged”}]]  – Read More  – The Hacker News 

0

State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage – [email protected] (The Hacker News)

– [[{“value”:”A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka Storm-1849 by Microsoft). “”}]]  – Read More  – The Hacker News 

0

Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny – [email protected] (The Hacker News)

– [[{“value”:”Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox initiative. The tech giant said it’s working closely with the U.K. Competition and Markets Authority (CMA) and hopes to achieve an agreement by the end of the year. As...

0

Smashing Security podcast #369: Keeping the lights on after a ransomware attack – Graham Cluley

– [[{“value”:”Leicester City Council suffers a crippling ransomware attack, and a massive data breach, but is it out of the dark yet? And as election fever hits India we take a close eye at deepfakery. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.”}]]  – Read...

0

CISA ransomware warning program set to fully launch by end of 2024 – Christian Vasquez

– [[{“value”:” The Cybersecurity and Infrastructure Security Agency plans to fully launch by year’s end an automated vulnerability warning program to alert organizations that are running software with vulnerabilities being exploited by ransomware gangs, the agency’s director, Jen Easterly, said Wednesday. Currently running in a pilot phase, the program is mandated by the Cyber Incident Reporting for Critical Infrastructure Act...

0

FCC wants rules for ‘most important part of the internet you’ve probably never heard of’ – Tim Starks

– [[{“value”:” The Federal Communications Commission is set to vote Thursday on restoring landmark net neutrality rules that the commission says will strengthen its footing to write more cybersecurity regulations, but industry and some cyber-focused organizations have warned that those potential new rules could lead to less security, not more. As part of its bid to reinstate the net neutrality...

0

Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime. – [email protected]

– [[{“value”:” Understanding the factors influencing cybercriminal behavior is essential for developing effective cybercrime prevention strategies. Rationality plays a significant role in shaping criminal decisions, particularly through the lens of the rational actor model and deterrence theory. This blog explores how rationality influences cybercriminal behavior, focusing on the rational actor model, the concepts of deterrence theory, their implications for understanding...

0

Dexalot Announces Launch of Its Central Limit Order Book DEX on Arbitrum – Owais Sultan

– [[{“value”:” By Owais Sultan Central limit order book (CLOB) decentralized exchange Dexalot has announced it is launching on Arbitrum. The move marks… This is a post from HackRead.com Read the original post: Dexalot Announces Launch of Its Central Limit Order Book DEX on Arbitrum “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Popular Keyboard Apps Leak User Data: Billion Potentially Exposed – Waqas

– [[{“value”:” By Waqas Popular keyboard apps leak user data! Citizen Lab reports 8 out of 9 Android IMEs expose keystrokes. Change yours & protect passwords! This is a post from HackRead.com Read the original post: Popular Keyboard Apps Leak User Data: Billion Potentially Exposed “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Russian APT28 Exploiting Windows Vulnerability with GooseEgg Tool – Waqas

– [[{“value”:” By Waqas Update Windows Now or Get Hacked: Microsoft Warns of Actively Exploited Vulnerability! This is a post from HackRead.com Read the original post: Russian APT28 Exploiting Windows Vulnerability with GooseEgg Tool “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. “SSLoad is designed to stealthily infiltrate systems, gather sensitive”}]]  – Read More  – The Hacker News 

0

U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) from at least 2016 to April 2021. This includes the front companies Mehrsam Andisheh Saz Nik (MASN) and Dadeh”}]]  – Read More  – The...

0

City street lights “misbehave” after ransomware attack – Graham Cluley

– [[{“value”:”The UK’s Leicester City Council was thrown into chaos last month when a crippling cyber attack forced it to shut down its IT systems and phone lines. But the ransomware attack also had a more unusual impact… Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

0

Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users – [email protected] (The Hacker News)

– [[{“value”:”Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose keyboard app did not have any security”}]]  – Read More  – The Hacker News 

0

eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners – [email protected] (The Hacker News)

– [[{“value”:”A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm Avast said the activity is the work of a threat actor with possible connections to a North Korean hacking group dubbed “}]]  – Read More  –...

0

CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers – [email protected] (The Hacker News)

– [[{“value”:”A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnamese-origin”}]]  – Read More  – The Hacker News 

0

Iranian nationals charged with hacking U.S. companies, Treasury and State departments – AJ Vicens

– [[{“value”:” The U.S. government on Tuesday took sweeping action against four Iranian nationals, accusing them of participating in hacking operations that targeted the U.S. Treasury and State departments, defense contractors and two New York-based companies on behalf of the Iranian Islamic Revolutionary Guard Corps (IRGC). All four were indicted and charged with conspiracy to commit computer fraud, conspiracy to...

0

Stolen Change Healthcare data could contain information on ‘a substantial portion’ of Americans – AJ Vicens

– [[{“value”:” Sensitive and personal health information related to “a substantial portion of people in America” could be among the data stolen by cybercriminals who attacked Change Healthcare in February, the company said in a statement Monday. Nearly two dozen screenshots purportedly from roughly 4 terabytes of Change Healthcare data were posted April 7 to the website operated by RansomHub,...

0

Democratic operative behind Biden AI robocall says lawsuit won’t ‘get anywhere’ – djohnson

– [[{“value”:” The Democratic operative behind an AI-generated robocall impersonating President Joe Biden that reached thousands of New Hampshire voters earlier this year said he is cooperating with state and federal authorities and that a lawsuit filed against him is without merit — even as he claimed not to have seen it. In a phone call with CyberScoop on Monday,...

0

0G and OnePiece Labs Collaborate to Create Crypto x AI Incubator – Owais Sultan

– [[{“value”:” By Owais Sultan 0G Labs and One Piece Labs have announced the launch of the first incubator for startups working at… This is a post from HackRead.com Read the original post: 0G and OnePiece Labs Collaborate to Create Crypto x AI Incubator “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Apache Cordova App Harness Targeted in Dependency Confusion Attack – [email protected] (The Hacker News)

– [[{“value”:”Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This&”}]]  – Read More  – The Hacker News 

0

GitHub Comments Abused to Spread Malware in Fake Microsoft Repositories – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Hackers are exploiting GitHub comments to spread malware disguised as Microsoft software downloads tricking users into downloading malware. This is a post from HackRead.com Read the original post: GitHub Comments Abused to Spread Malware in Fake Microsoft Repositories “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

This Website is Selling Billions of Private Messages of Discord Users – Deeba Ahmed

– [[{“value”:” By Deeba Ahmed Millions of Discord messages sold online! Protect yourself from leaked usernames, photos & financial details. Learn how to secure your Discord account. This is a post from HackRead.com Read the original post: This Website is Selling Billions of Private Messages of Discord Users “}]]  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto &...