Category: Attack Feeds

0

CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS score: 9.1) – A path traversal vulnerability in Mitel MiCollab that could allow an attacker”}]]  – Read...

0

National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office – Tim Starks

– [[{“value”:” Days after the four-year anniversary of the creation of the Office of the National Cyber Director and days before its current chief is set to depart, that man, Harry Coker Jr., looked both backward and forward at the office in a speech Tuesday and a separate interview with CyberScoop. Coker touched on software liability, regulations, the authorities of...

0

A Day in the Life of a Prolific Voice Phishing Crew – BrianKrebs

– [[{“value”:” Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications...

0

The AI Fix #32: Agentic AI, killer robot fridges, and the robosexual revolution – Graham Cluley

– [[{“value”:”In episode 32 of The AI Fix, our hosts learn the meaning of “poronkusema”, Mark discovers his dream job, a school tries using AI instead of teachers, the “Godfather of AI” says AI will see us as toddlers, and Graham lifts the lid on the hidden threat of killer robot fridges. Mark explains why 2025 is the year of...

0

White House launches cybersecurity label program for consumers – Greg Otto

– [[{“value”:” The White House announced Tuesday the official launch of the U.S. Cyber Trust Mark, a cybersecurity labeling initiative aimed at enhancing the security of internet-connected devices.  The initiative tackles rising consumer concerns about the security vulnerabilities of “smart” devices essential to modern homes. As households become more dependent on interconnected gadgets — with a 2023 Deloitte study revealing...

0

Android patches several vulnerabilities in first security update of 2025 – Greg Otto

– [[{“value”:” Android has released its first security update of the year, disclosing several critical and high-severity vulnerabilities that affect a wide range of Android devices.  The bulletin identifies five critical remote code execution (RCE) vulnerabilities affecting what Android categorizes as the “system,” which encompasses Android’s core components and underlying architecture. These vulnerabilities could allow attackers to execute code without...

0

Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. “The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM [Compatibility Support Mode] mode and without Secure Boot or standard”}]]  – Read More  –...

0

Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year – [email protected] (The Hacker News)

– It’s time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing threats. Much like a...

0

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies. The agency said it’s working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts. “The security of federal systems and the data...

0

New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities – [email protected] (The Hacker News)

– [[{“value”:”Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework. The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution. “The key”}]]  – Read More ...

0

Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers – [email protected] (The Hacker News)

– [[{“value”:”Taiwan-based Moxa has warned of two security vulnerabilities impacting its cellular routers, secure routers, and network security appliances that could allow privilege escalation and command execution. The list of vulnerabilities is as follows – CVE-2024-9138 (CVSS 4.0 score: 8.6) – A hard-coded credentials vulnerability that could allow an authenticated user to escalate privileges and gain”}]]  – Read More  –...

0

Industrial networking manufacturer Moxa reports ‘critical’ router bugs – djohnson

– [[{“value”:” Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs that can escalate privileges for an attacker, give root-level access or allow for unauthorized execution of commands. In a pair of CVEs published Jan. 3, Moxa called the flaws “critical” and warned they “pose a significant...

0

India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements – [email protected] (The Hacker News)

– [[{“value”:”The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation. “Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent,” India’s Press Information Bureau (PIB) said in a statement released Sunday. “Citizens are empowered with rights to demand data erasure,”}]]  – Read More ...

0

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices – [email protected] (The Hacker News)

– [[{“value”:”An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore – a popular app store in the Russian Federation,””}]]  –...

0

From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch – [email protected] (The Hacker News)

– In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The cyber threat arena saw standout  –...

0

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] – [email protected] (The Hacker News)

– [[{“value”:”Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive into the hidden risks,...

0

Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,”}]]  – Read More  – The...

0

Tenable CEO Amit Yoran dies at 54 – Greg Otto

– [[{“value”:” Amit Yoran, an influential figure in cybersecurity and the CEO and chairman of Tenable, passed away on Friday at the age of 54.  Yoran’s death marks the end of a career characterized by significant contributions to the cybersecurity industry, marked leadership, and a dedicated pursuit of digital safety. A native of Virginia, Yoran succumbed to cancer after a...

0

Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution – [email protected] (The Hacker News)

– [[{“value”:”A high-severity security flaw has been disclosed in ProjectDiscovery’s Nuclei, a widely-used open-source vulnerability scanner that, if successfully exploited, could allow attackers to bypass signature checks and potentially execute malicious code. Tracked as CVE-2024-43405, it carries a CVSS score of 7.4 out of a maximum of 10.0. It impacts all versions of Nuclei later than 3.0.0. “The”}]]  – Read...

0

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution. The backdoor, according to Google’s Managed Defense team, shares functional overlaps with a known remote administration tool referred to as Gh0st RAT, which had its source”}]]  – Read More  –...

0

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims. These attacks have been publicly attributed to a Chinese state-sponsored threat actor tracked as Flax Typhoon (aka Ethereal Panda or”}]]  – Read More  – The Hacker...

0

U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet – Tim Starks

– [[{“value”:” The U.S. government on Friday sanctioned a Chinese company that Western nations had connected to a Beijing-sponsored hacking group’s botnet, which had compromised hundreds of thousands of devices before a joint takedown operation last year. Flax Typhoon hackers made use of infrastructure at Integrity Technology Group to exploit victims, according to the Treasury Department’s Office of Foreign Assets...

0

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation – djohnson

– [[{“value”:” On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years, the FCC has...

0

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation – djohnson

– [[{“value”:” On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years, the FCC has...

0

NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT – Deeba Ahmed

– Researchers discovered a malicious package on the npm package registry that resembles a library for Ethereum smart contract vulnerabilities but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

New AI Jailbreak Method ‘Bad Likert Judge’ Boosts Attack Success Rates by Over 60% – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model’s (LLM) safety guardrails and produce potentially harmful or malicious responses. The multi-turn (aka many-shot) attack strategy has been codenamed Bad Likert Judge by Palo Alto Networks Unit 42 researchers Yongzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata...

0

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers – [email protected] (The Hacker News)

– [[{“value”:”A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition. The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5). It was addressed by Microsoft as part of Patch Tuesday updates for December 2024, alongside CVE-2024-49112 (“}]]  – Read More  – The...

0

Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption – [email protected] (The Hacker News)

– [[{“value”:”Microsoft has announced that it’s making an “unexpected change” to the way .NET installers and archives are distributed, requiring developers to update their production and DevOps infrastructure. “We expect that most users will not be directly affected, however, it is critical that you validate if you are affected and to watch for downtime or other kinds of breakage,” Richard...

0

Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Siri Privacy Violations – [email protected] (The Hacker News)

– [[{“value”:”Apple has agreed to pay $95 million to settle a proposed class action lawsuit that accused the iPhone maker of invading users’ privacy using its voice-activated Siri assistant. The development was first reported by Reuters. The settlement applies to U.S.-based individuals current or former owners or purchasers of a Siri-enabled device who had their confidential voice communications with the”}]] ...

0

Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API that could result in data exposure. The flaws, discovered by Melbourne-based cybersecurity company Stratus Security, have been addressed as of May 2024. Two of the three shortcomings reside in Power Platform’s OData Web API Filter, while the third vulnerability is rooted in the...

0

The AI Fix #31: Replay: AI doesn’t exist – Graham Cluley

– [[{“value”:”Mark and I took a break for the new year, but we’ll be back for a new episode of “The AI Fix” podcast at the usual time next week. In the meantime, here is another chance to hear one of our favourite episodes again. The very first episode from April 2024… Graham attempts to convince Mark that AI doesn’t,...

0

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them – [email protected] (The Hacker News)

– In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS  – Read More  –...

0

Three Russian-German Nationals Charged with Espionage for Russian Secret Service – [email protected] (The Hacker News)

– [[{“value”:”German prosecutors have charged three Russian-German nationals for acting as secret service agents for Russia. The individuals, named Dieter S., Alexander J., and Alex D., have been accused of working for a foreign secret service. Dieter S. is also alleged to have participated in sabotage operations as well as taking pictures of military installations with an aim to endanger...

0

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named ethereumvulncontracthandler, was published to npm on December 18, 2024, by a user”}]]  – Read More ...

0

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites – [email protected] (The Hacker News)

– [[{“value”:”Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. “Instead of relying on a single click, it takes advantage of a double-click sequence,” Yibelo said.”}]]  – Read More  – The...