Category: Attack Feeds

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities – [email protected] (The Hacker News)

– [[{“value”:”An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company Cloudflare is tracking the activity under the name SloppyLemming, which is also called Outrider Tiger and Fishing Elephant. “Between late 2022 to present, SloppyLemming”}]]  – Read More  – The...

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign – [email protected] (The Hacker News)

– [[{“value”:”Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall Street Journal reported Wednesday. The activity has been attributed to a threat actor that Microsoft tracks as Salt Typhoon, which is also known as FamousSparrow and GhostEmperor. “Investigators”}]]  –...

House panel moves bill that adds AI systems to National Vulnerability Database – djohnson

– [[{“value”:” A bill that would push the National Institute of Standards and Technology to set up a formal process for reporting security vulnerabilities in AI systems sailed through a House committee Wednesday. The AI Incident Reporting and Security Enhancement Act, introduced by Reps. Deborah Ross, D-N.C., Jay Obernolte, R-Calif., and Don Beyer, D-Va., was approved via voice vote by...

IRGC hacked a Swedish SMS service in response to Quran burning, authorities say – AJ Vicens

– [[{“value”:” A hacking unit working with the Iranian government penetrated a Swedish telecommunications firm in August 2023 and pushed 15,000 text messages calling for revenge against people who burned the Quran, Swedish authorities said Tuesday. Using a persona they dubbed “Anzu Team,” hackers working with the Islamic Revolutionary Guard Corps (IRGC) penetrated an unnamed Swedish company that operated a...

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52% – [email protected] (The Hacker News)

– [[{“value”:”Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping from 76% to 24% over a period of six years. The tech giant said focusing on Safe Coding for new features not only reduces the overall security risk of...

House Intel Republicans request FBI, SEC briefing on Temu – djohnson

– [[{“value”:” Congressional Republicans on the House Permanent Select Committee on Intelligence are requesting a briefing from the FBI and Securities Exchange Commission on e-commerce app Temu and its parent company, Pinduoduo, saying both pose a potential threat to national security and the personal data of Americans. In a letter sent Tuesday to FBI Director Christopher Wray and SEC Chair...

Timeshare Owner? The Mexican Drug Cartels Want You – BrianKrebs

– [[{“value”:” The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel that tries to trick elderly people into believing someone wants to buy their property. This is the story of a couple who recently lost more than $50,000 to an ongoing timeshare scam that spans at least two dozen...

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the program on several customers’ systems. “It has a standard set of features commonly found in penetration testing tools and its developer created it using the Rust programming language,” Unit...

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent – [email protected] (The Hacker News)

– [[{“value”:”Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature called Privacy Preserving Attribution (PPA) without explicitly seeking users’ consent. “Contrary to its reassuring name, this technology allows Firefox to track user behavior on websites,” noyb said”}]]  – Read...

Expert Tips on How to Spot a Phishing Link – [email protected] (The Hacker News)

– [[{“value”:”Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it’s too late. See these key indicators that security experts use to identify phishing links:1. Check Suspicious URLs  Phishing URLs are often long, confusing, or filled with random characters. Attackers use these to disguise the link’s...

Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises – [email protected] (The Hacker News)

– Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of technology and 10 years of advancements, SOAR hasn’t fully delivered on its potential, leaving SOCs still grappling with many of the same  – Read More  – The Hacker News 

Enhancing Cyber Resilience in Manufacturing Organizations – [email protected]

– [[{“value”:” 2024 Cyber Resilience Research Unveils Manufacturing Sector Challenges New data illuminates how manufacturing leaders can prioritize resilience. Manufacturing organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to manufacturing providers. Get your complimentary copy of the report. One...

Enhancing Cyber Resilience in Transportation Organizations – [email protected]

– [[{“value”:” 2024 Cyber Resilience Research Unveils Transportation Sector Challenges New data illuminates how transportation leaders can prioritize resilience. Transportation organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to transportation providers. Get your complimentary copy of the report. One...

ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function – [email protected] (The Hacker News)

– [[{“value”:”A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible for attackers to plant long-term persistent spyware into the artificial intelligence (AI) tool’s memory. The technique, dubbed SpAIware, could be abused to facilitate “continuous data exfiltration of any information the user typed or responses received by ChatGPT, including any future chat sessions”}]]  – Read...

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware – [email protected] (The Hacker News)

– [[{“value”:”Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. As many”}]]  – Read...

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2024-7593 (CVSS score: 9.8), which could be exploited by a remote unauthenticated attacker to bypass the”}]]  – Read More  –...

CrowdStrike exec apologizes in front of Congress over huge global IT outage – Tim Starks

– [[{“value”:” A CrowdStrike executive apologized Tuesday over a faulty update that caused a massive IT outage two months ago, saying the company has taken steps to make sure it can’t happen again. The history-making July 19 problem involved new threat detection configurations for CrowdStrike’s Falcon security platform that were sent to sensors running on Microsoft Windows devices that the...

Iranian-linked election interference operation shows signs of recent access – AJ Vicens

– [[{“value”:” The people behind the alleged Iranian hacking effort targeting former President Donald Trump’s campaign continue to share material with journalists, including a letter dated Sept. 15, suggesting recent access to campaign materials or that the election interference operation is ongoing. Judd Legum, the publisher of the Popular Information newsletter, reported Tuesday that the persona that had been reaching...

FEC expands campaign spending rules to allow for physical, cybersecurity purchases – djohnson

– [[{“value”:” The Federal Election Commission is expanding the use of federal campaign funds to pay for physical and cybersecurity measures for political candidates, their families and their campaign staff. The amended rules were first proposed earlier this year and passed unanimously by the commission during a Sept. 19 open meeting. They would expand the ability of federal candidates and...

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store – [email protected] (The Hacker News)

– [[{“value”:”Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some of the malicious apps have also been found on the Google Play Store. They have been cumulatively downloaded 11 million times. They include – Wuta Camera – Nice Shot...

Announcing Pwn2Own Automotive for 2025 – Dustin Childs

– [[{“value”:” If you just want to read the rules, you can find them here. Earlier this year we held our inaugural Pwn2Own Automotive contest, and it was a rousing success. On our biggest-ever stage (literally), we awarded $1,323,750 over the three-day event as researchers from around the globe demonstrated 49 unique zero days. Today, we’re excited to announce that...

Automatic tank gauge vendors alerted of software vulnerabilities in their products – Christian Vasquez

– [[{“value”:” Some vendors for automatic tank gauge systems found in gas stations, airports, and hospitals around the U.S. have ignored warnings concerning multiple critical vulnerabilities, according to alerts from the Department of Homeland Security and a report from the cybersecurity firm Bitsight. Bitsight TRACE researchers and the Cybersecurity and Infrastructure Security Agency worked together to disclose 10 vulnerabilities impacting...

Warnings after new Valencia ransomware group strikes businesses and leaks data – Graham Cluley

– [[{“value”:”A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site’s so-called “Wall of shame” links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a...

U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian Tech – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Department of Commerce (DoC) said it’s proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that of the People’s Republic of China (PRC) and Russia. “The proposed rule focuses on hardware and software integrated into the Vehicle Connectivity System (VCS) and software integrated into the...

The AI Fix #17: Why AI is an AWFUL writer and LinkedIn’s outrageous land grab – Graham Cluley

– [[{“value”:”In episode 17 of The AI Fix, our hosts meet the worst newsreaders in the world, Graham learns about Big Trak and is shocked by a food delivery robot, Mark explains why he won’t be dressing as a pirate, ChatGPT angelically removes a peanut butter sandwich from a VCR, and everyone thinks they’ve got Ebola. Graham explains how his...

Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising Concerns – [email protected] (The Hacker News)

– [[{“value”:”Antivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effective September 19, 2024, ahead of its formal exit at the end of the month. “Kaspersky antivirus customers received a software update facilitating the transition to UltraAV,” the company said in a post announcing the move on September 21. “This update...

The SSPM Justification Kit – [email protected] (The Hacker News)

– [[{“value”:”SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half measures and hope their SaaS stack will remain secure. Unfortunately, this approach is lacking and will leave security teams blind to threat prevention and detection, as well as open to regulatory violations, data leaks, and significant...

Exclusive: House Homeland Security chair releases, pushes forth cyber workforce bill – Tim Starks

– [[{“value”:” House Homeland Security Chairman Mark Green, R-Tenn., is introducing and seeking to advance a bill this week to address his top legislative priority: strengthening the cybersecurity workforce. The bill — full details of which CyberScoop is first reporting — would create an Reserve Officer Training Corps (ROTC)-like program housed within the Cybersecurity and Infrastructure Security Agency, where students...

Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar – [email protected] (The Hacker News)

– [[{“value”:”Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But there’s good news: you don’t have to be defenseless. What if you could gain a strategic edge? Join our exclusive webinar, “Unpacking the 2024 Ransomware Landscape:...

New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions. The new version has been codenamed Octo2 by the malware author, Dutch security firm ThreatFabric said in a report shared with The Hacker News, adding campaigns distributing the malware have”}]]  –...

Two men arrested one month after $230 million of cryptocurrency stolen from a single victim – Graham Cluley

– [[{“value”:”Two men have been arrested by the FBI and charged in relation to their alleged involvement in a scam which saw almost a quarter of a billion dollars worth of cryptocurrency stolen from a single victim. Two men arrested one month after $230 million of cryptocurrency stolen from a single victim. The men were allegedly less than careful hiding...

Cybersecurity Threats: Top Risks Facing Your Startup – [email protected]

– [[{“value”:” The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Delivering a unique value proposition, researching markets, and attracting much-needed starting capital requires all hands on deck for any hopeful startup. Data security, privacy protection, and...

Telegram Agrees to Share User Data With Authorities for Criminal Investigations – [email protected] (The Hacker News)

– [[{“value”:”In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone numbers to authorities in response to valid legal requests in an attempt to rein in criminal activity on the platform. “We’ve made it clear that the IP addresses and phone numbers of those who violate our rules can be...

Adversaries’ generative AI use isn’t fooling the masses  – djohnson

– [[{“value”:” U.S. intelligence officials report that despite  Russia, China and Iran ramping up AI-generated content meant to influence the 2024 election cycle, they lag in generating convincing material that can fool existing detection tools. In their fourth election-related briefing this year, officials from the Office of the Director of National Intelligence and the FBI told reporters that they continue...

White House proposes rule to ban Chinese, Russian parts for networked vehicles – Christian Vasquez

– [[{“value”:” The Department of Commerce took another step Monday in its push to scrutinize supply chains by proposing a ban on Chinese and Russian components deemed a national security threat from connected and automated vehicles. The White House and Commerce Department are looking for comments on a rule that would prohibit the sale or importation of vehicles outfitted with...

Microsoft’s security culture reboot includes cyber governance council, all-staff trainings – Christian Vasquez

– [[{“value”:” The tech giant with the figurative and often literal keys to everyone’s kingdom released a progress report Monday on the cyber overhaul it has undertaken following a spree of major security failures. Microsoft — which is branding the effort as a “Secure Future Initiative” — first launched the cultural shift in November 2023 amid increasing criticism for multiple...