Category: Attack Feeds

The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think – [email protected] (The Hacker News)

– According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year’s report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded credentials in public GitHub repositories alone. One of the more troubling aspects of this report is...

Battling Teen Sextortion on the Net – cyberpro

– [[{“value”:” All social media platforms, messaging apps, and websites are an open invitation to threat actors for the worst behavior. Most teens lack the critical thinking abilities to differentiate between what might be friend or foe and are perfect to be “played” by those that have bad intentions. Sextortion arrives in a number of ways and […] The post...

Gmail’s New Shielded Email Feature Lets Users Create Aliases for Email Privacy – [email protected] (The Hacker News)

– [[{“value”:”Google appears to be readying a new feature called Shielded Email that allows users to create email aliases when signing up for online services and better combat spam. The feature was first reported by Android Authority last week following a teardown of the latest version of Google Play Services for Android. The idea is to create unique, single-use email...

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17) – [email protected] (The Hacker News)

– [[{“value”:”What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people. This week makes one thing clear: no system, no person, no organization is truly off-limits. Attackers are getting smarter, faster, and more creative—using everything from human trust to hidden flaws in”}]] ...

Beyond Compliance: The Advantage of Year-Round Network Pen Testing – [email protected] (The Hacker News)

– [[{“value”:”IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad guys out. But here’s the thing: hackers don’t wait around for compliance schedules. Most companies approach network penetration testing on a set schedule, with the most common frequency being twice a year (29%), followed by three to four times per year (23%)...

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information – [email protected] (The Hacker News)

– [[{“value”:”A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate brands with the goal of stealing their personal information ahead of the Black Friday shopping season. “The campaign leveraged the heightened online shopping activity in November, the peak season for Black Friday discounts. The threat actor used fake discounted...

NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit – [email protected] (The Hacker News)

– [[{“value”:”Legal documents released as part of an ongoing legal tussle between Meta’s WhatsApp and NSO Group have revealed that the Israeli spyware vendor used multiple exploits targeting the messaging app to deliver Pegasus, including one even after it was sued by Meta for doing so. They also show that NSO Group repeatedly found ways to install the invasive surveillance...

Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites – [email protected] (The Hacker News)

– [[{“value”:”A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin for WordPress that, if successfully exploited, could grant an attacker to remotely gain full administrative access to a susceptible site. The vulnerability, tracked as CVE-2024-10924 (CVSS score: 9.8), impacts both free and premium versions of the plugin. The”}]]  – Read More ...

PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released – [email protected] (The Hacker News)

– [[{“value”:”Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed that a new zero-day vulnerability impacting its PAN-OS firewall management interface has been actively exploited in the wild. To that end, the company said it observed malicious activity originating from below IP addresses and targeting PAN-OS management web interface IP”}]]  –...

Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials – [email protected] (The Hacker News)

– [[{“value”:”A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to extract VPN credentials as part of a modular framework called DEEPDATA. Volexity, which disclosed the findings Friday, said it identified the zero-day exploitation of the credential disclosure vulnerability in July 2024, describing BrazenBamboo as the developer behind DEEPDATA,”}]]  – Read More ...

NSO Group used WhatsApp exploits after the messaging app sued the spyware developer, court filing says – Tim Starks

– [[{“value”:” NSO Group developed malware that used WhatsApp to infect victims even after WhatsApp sued the leading spyware vendor over allegations that it violated federal and state anti-hacking laws, according to a court filing by the messaging app and its parent company Meta on Thursday. It was one of a bevy of revelations and new details found in the...

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. Cybersecurity company Check Point has codenamed the malware WezRat, stating it has been detected in the wild since at least September 1, 2023, based on artifacts uploaded to the”}]]  –...

More bugs in Palo Alto Expedition see active exploitation, CISA warns – Christian Vasquez

– [[{“value”:” The Cybersecurity and Infrastructure Security Agency warned Thursday that a vulnerability in Palo Alto Networks’ firewall management software is actively being exploited in the wild, following last week’s attacks that exploited other flaws in the same software. The two bugs in Palo Alto’s Expedition tool, tracked as CVE-2024-9463 and CVE-2024-9465, could expose firewall credentials and affect versions 1.2.96...

Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices – [email protected] (The Hacker News)

– [[{“value”:”In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and business continuity. Are you prepared to act swiftly when the unexpected happens? Join DigiCert’s exclusive webinar, “When Shift Happens: Are You Ready for Rapid”}]]  – Read More  – The...

Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed two security flaws in Google’s Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate privileges and exfiltrate models from the cloud. “By exploiting custom job permissions, we were able to escalate our privileges and gain unauthorized access to all data services in the project,” Palo Alto Networks”}]]  – Read...

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia – [email protected] (The Hacker News)

– [[{“value”:”A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer. The malware “targets victims’ sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software,””}]]  – Read More  – The Hacker...

How AI Is Transforming IAM and Identity Security – [email protected] (The Hacker News)

– In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into its analytical capabilities to monitor access patterns and identify anomalies that could signal a potential security breach. The focus has expanded beyond merely managing human  – Read More  –...

High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure. The vulnerability, tracked as CVE-2024-10979, carries a CVSS score of 8.8. Environment variables are user-defined values that can allow a program”}]]  – Read More  – The Hacker...

Safeguarding Healthcare Organizations from IoMT Risks – [email protected]

– [[{“value”:” The healthcare industry has undergone significant transformation with the emergence of the Internet of Medical Things (IoMT) devices. These devices ranging from wearable monitors to network imaging systems collect and process vast amounts of sensitive medical data based on which they make critical decisions about patients’ health. But at the same time, they also raise serious privacy and...

Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin – [email protected] (The Hacker News)

– [[{“value”:”Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday. Lichtenstein was charged for his involvement in a money laundering scheme that led to the theft of nearly 120,000 bitcoins (valued at over $10.5 billion at current prices) from...

CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild. To that, it has added the vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates by December 5,”}]]  –...

An Interview With the Target & Home Depot Hacker – BrianKrebs

– [[{“value”:” In December 2023, KrebsOnSecurity revealed the real-life identity of Rescator, the nickname used by a Russian cybercriminal who sold more than 100 million payment cards stolen from Target and Home Depot between 2013 and 2014. Moscow resident Mikhail Shefel, who confirmed using the Rescator identity in a recent interview, also admitted reaching out because he is broke and...

HackerOne urges U.S. to advocate for research protections in UN cybercrime treaty – Greg Otto

– [[{“value”:” HackerOne has expressed serious concerns over the recently proposed UN Convention Against Cybercrime, which the company says lacks strong protections for good-faith security researchers.  In an open letter sent to Secretary of State Antony Blinken, Attorney General Merrick Garland, and United States Agency for International Development Administrator Samantha Power, Ilona Cohen, chief legal and policy officer for HackerOne,...

Experts Uncover 70,000 Hijacked Domains in Widespread ‘Sitting Ducks’ Attack Scheme – [email protected] (The Hacker News)

– [[{“value”:”Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks to hijack legitimate domains for using them in phishing attacks and investment fraud schemes for years. The findings come from Infoblox, which said it identified nearly 800,000 vulnerable registered domains over the past three months, of which approximately 9% (70,000) have been subsequently”}]]  –...

Bitsight acquires Cybersixgill for $115 million – Christian Vasquez

– [[{“value”:” BitSight Technologies, Inc. announced an agreement Thursday to acquire the cyber threat intelligence firm Cybersixgill for $115 million. Bitsight, a more than decade-old security rating company, aims to use the real-time intelligence collected by the Tel Aviv-based data firm to mitigate customer supply chain threats. Cybersixgill, formed in 2014 and formerly called Sixgill, looks at data from the...

ShrinkLocker ransomware: what you need to know – Graham Cluley

– [[{“value”:”ShrinkLocker is a family of ransomware that encrypts an organisation’s data and demands a ransom payment in order to restore access to their files. It was first identified by security researchers in May 2024, after attacks were observed in Mexico, Indonesia, and Jordan. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  –...

Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes – [email protected] (The Hacker News)

– [[{“value”:”Google has revealed that bad actors are leveraging techniques like landing page cloaking to conduct scams by impersonating legitimate sites. “Cloaking is specifically designed to prevent moderation systems and teams from reviewing policy-violating content which enables them to deploy the scam directly to users,” Laurie Richardson, VP and Head of Trust and Safety at Google, said. “The landing”}]]  –...

Here’s how misconfigurations in Microsoft Power Pages could lead to data breaches – Greg Otto

– [[{“value”:” Microsoft’s Power Pages is a low-code platform that enables users to create data-driven websites with minimal coding requirements or knowledge. It’s used by both the public and private sector, at organizations large and small, to assist in all sorts of scenarios where a customer or a citizen needs data to solve a problem. These pages also may be...

The UN cybercrime convention threatens security research. The US should do something about it – Greg Otto

– [[{“value”:” The United Nations’ recent adoption of a new cybercrime convention has sparked significant discussion within the global cybersecurity community. While the UN Convention Against Cybercrime aims to enhance international cooperation to combat malicious hacking, the convention raises serious concerns for those involved in security research and ethical hacking.  The treaty’s provisions related to security research conflict with best...

5 BCDR Oversights That Leave You Exposed to Ransomware – [email protected] (The Hacker News)

– Ransomware isn’t just a buzzword; it’s one of the most dreaded challenges businesses face in this increasingly digitized world. Ransomware attacks are not only increasing in frequency but also in sophistication, with new ransomware groups constantly emerging. Their attack methods are evolving rapidly, becoming more dangerous and damaging than ever. Almost all respondents (99.8%) in a recent  – Read...

IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord – Graham Cluley

– [[{“value”:”Jack Teixeira, the 22-year-old former Air National Guardsman who leaked hundreds of classified documents online, has been sentenced to 15 years in prison. Teixeira, who served as an IT specialist at Otis Air National Guard Base in Massachusetts, was arrested in April 2023 after abusing his privileged position to share highly-sensitive documents with friends he had met via a...

TikTok Pixel Privacy Nightmare: A New Case Study – [email protected] (The Hacker News)

– Advertising on TikTok is the obvious choice for any company trying to reach a young market, and especially so if it happens to be a travel company, with 44% of American Gen Zs saying they use the platform to plan their vacations. But one online travel marketplace targeting young holidaymakers with ads on the popular video-sharing platform broke GDPR...

New RustyAttr Malware Targets macOS Through Extended Attribute Abuse – [email protected] (The Hacker News)

– [[{“value”:”Threat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr. The Singaporean cybersecurity company has attributed the novel activity with moderate confidence to the infamous North Korea-linked Lazarus Group, citing infrastructure and tactical overlaps observed in connection with prior campaigns, including”}]]  – Read More  – The...

LevelBlue Cybersecurity Awareness Month Recap – [email protected]

– [[{“value”:” Each year, Cybersecurity Awareness Month serves as a reminder of the critical role that cybersecurity plays in our lives. Every October, LevelBlue champions this initiative which brings awareness to cyber risks, and promotes best practices to protect against growing cyber threats. Throughout the month, we focused the spotlight on cyber resilience – sharing key trends and insights through...

Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails – [email protected] (The Hacker News)

– [[{“value”:”A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day by a suspected Russia-linked actor as part of cyber attacks targeting Ukraine. The vulnerability in question, CVE-2024-43451 (CVSS score: 6.5), refers to an NTLM hash disclosure spoofing vulnerability that could be exploited to steal a user’s NTLMv2 hash. It was patched by Microsoft...

Smashing Security podcast #393: Who needs a laptop to hack when you have a Firestick? – Graham Cluley

– [[{“value”:”Arion Kurtaj, a teenager from the UK, amassed a fortune through audacious cybercrimes. From stealing Grand Theft Auto 6 secrets to erasing Brazil’s COVID vaccination data, his exploits were legendary. But his hacking spree took a bizarre turn when he was placed under police protection… in a Travelodge outside Oxford. Plus Bengal cat lovers in Australia should be on...

Trump administration should focus on cyber rules, grants and international partnerships, Biden official says – mbracken

– [[{“value”:” On the same day outgoing President Joe Biden met with President-elect Donald Trump to discuss the transition between them, a top White House cyber official made some recommendations for early cyber priorities for the incoming administration. In its first 100 days, the Trump administration should build a framework for minimum cybersecurity standards for critical infrastructure companies, establish cybersecurity...

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel – [email protected] (The Hacker News)

– [[{“value”:”A threat actor affiliated with Hamas has expanded its malicious cyber operations beyond espionage to carry out disruptive attacks that exclusively target Israeli entities. The activity, linked to a group called WIRTE, has also targeted the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt, Check Point said in an analysis. “The [Israel-Hamas] conflict has not disrupted the WIRTE’s”}]]  –...