Category: Attack Feeds

0

TSA issues proposed cyber mandates for pipelines, rail, airlines – Christian Vasquez

– [[{“value”:” The Transportation Security Administration issued long-waited proposed cyber mandates Thursday that would set in stone, harmonize, and add to the emergency security directives first issued following the Colonial Pipeline ransomware attack in 2021. The notice of proposed rulemaking (NOPR) will serve as one of the last major policy actions the Biden administration will take to protect critical infrastructure...

0

Host of House panels getting briefed on major Chinese hacker telecom breaches – Tim Starks

– [[{“value”:” Executive branch agencies were briefing a slate of House committees Thursday about a Chinese hack that infiltrated major telecommunications companies and reportedly targeted the phones of top members of the Donald Trump campaign — including the president-elect himself — and top U.S. officials, according to a source familiar with the plans. The committees receiving the briefing are the...

0

A Hacker’s Guide to Password Cracking – [email protected] (The Hacker News)

– Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their moves. Read on to...

0

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS – [email protected] (The Hacker News)

– [[{“value”:”A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as”}]]  – Read More  –...

0

Congress must demand a study of America’s cyber forces – Greg Otto

– [[{“value”:” In an era of political polarization, congressional efforts to shore up America’s cybersecurity offer a rare beacon of bipartisanship. But these legislative efforts are currently under threat.  Recently, the Defense Department asked lawmakers to kill a bipartisan proposal — across both chambers of Congress — that would mandate an independent study of the readiness of America’s cyber forces....

0

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait – [email protected] (The Hacker News)

– [[{“value”:”The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an organization in the region. “During this attack, the threat actor used as a lure the upcoming World Expo, which will be held in 2025 in Osaka, Japan,” ESET said in its...

0

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers’ Amazon Web Services (AWS) credentials. The package in question is “fabrice,” which typosquats a popular Python library known as “fabric,” which is designed to execute shell commands remotely over”}]]  – Read...

0

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims – [email protected] (The Hacker News)

– [[{“value”:”An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. “The campaign”}]]  – Read More  – The Hacker News 

0

5 Most Common Malware Techniques in 2024 – [email protected] (The Hacker News)

– [[{“value”:”Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN’s Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging”}]]  –...

0

China’s elite hackers expand target list to European Union – Christian Vasquez

– [[{“value”:” China’s elite government-backed hackers are using legitimate VPN tools to camouflage their presence on the expanding list of victim networks, according to a new report from the cybersecurity firm ESET. Released Thursday, ESET’s report on the latest state-backed cybersecurity threats detail a growing target list that experts believe is a concerted effort to further Beijing’s intelligence goals.  The...

0

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems – [email protected] (The Hacker News)

– [[{“value”:”Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management”}]]  – Read More  – The...

0

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns – [email protected] (The Hacker News)

– [[{“value”:”The Canadian government on Wednesday ordered ByteDance-owned TikTok to dissolve its operations in the country, citing national security risks, but stopped short of instituting a ban on the popular video-sharing platform. “The decision was based on the information and evidence collected over the course of the review and on the advice of Canada’s security and intelligence community and other”}]] ...

0

Smashing Security podcast #392: Pasta spies and private eyes, and are you applying for a ghost job? – Graham Cluley

– [[{“value”:”A Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.”}]]  – Read More  – Graham...

0

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware – [email protected] (The Hacker News)

– [[{“value”:”An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. “Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to”}]]  – Read More  – The Hacker...

0

How early-stage companies can go beyond cybersecurity basics – Greg Otto

– [[{“value”:” The digital landscape has become a battleground, with cybercriminals constantly evolving their tactics and outmaneuvering even the most advanced defenses. Phishing scams are becoming increasingly sophisticated, zero-day vulnerabilities are emerging at an alarming rate, and ransomware attacks are crippling organizations worldwide. To stay ahead of this ever-shifting threat landscape, businesses must adopt a proactive approach to cybersecurity that...

0

New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. “Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute”}]]  – Read More  – The Hacker News 

0

9 Steps to Get CTEM on Your 2025 Budgetary Radar – [email protected] (The Hacker News)

– Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity...

0

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime – [email protected] (The Hacker News)

– [[{“value”:”INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. “Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down...

0

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers – [email protected] (The Hacker News)

– [[{“value”:”Meta has been fined 21.62 billion won ($15.67 million) by South Korea’s data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country’s Personal Information Protection Commission (PIPC) said Meta gathered information such as”}]]  – Read More  – The...

0

Enhancing Cyber Resilience in Energy and Utilities Organizations – [email protected]

– [[{“value”:” 2024 Cyber Resilience Research Unveils Energy and Utilities Industry Challenges New data illuminates how energy and utilities leaders can prioritize resilience. Energy and utilities organizations find themselves at the intersection of progress and peril in the rapidly evolving digital landscape. The latest data underscores that the trade-offs are significant and pose substantial risks to utility providers. Download the...

0

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users – [email protected] (The Hacker News)

– [[{“value”:”Google’s cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security. “We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025,” Mayank Upadhyay, vice president of engineering...

0

False bomb threats at polling sites only blemish on Election Day voting process – djohnson

– [[{“value”:” Election officials and federal authorities have spent a considerable amount of time over the past few weeks debunking fake or false media regarding the integrity of U.S. elections. Election Day has been a continuation of that trend, as federal, state and local election officials in swing states have attempted to stay on top of the routine kind of...

0

Schneider Electric reports cyberattack, its third incident in 18 months – Christian Vasquez

– [[{“value”:” Multinational energy management company Schneider Electric said Tuesday it was the victim of a cyberattack, with attackers behind a new ransomware variant claiming responsibility. “Schneider Electric is investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms which is hosted within an isolated environment,” a spokesperson said in an emailed statement. “Our...

0

Canadian Man Arrested in Snowflake Data Extortions – BrianKrebs

– [[{“value”:” A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake. On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of Kitchener, Ontario, on a provisional arrest warrant from the United States. Bloomberg first reported Moucka’s alleged ties to...

0

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. “An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed”}]]  – Read More  –...

0

The AI Fix #23: Murder most weird, and why 9.11 is bigger than 9.9 – Graham Cluley

– [[{“value”:”In episode 23 of The AI Fix, an AI finds a new way to make life difficult for women in STEM, Graham reveals his brilliant idea for treating any medical emergency, a beloved chat show host returns from the grave, and our hosts learn that computer viruses were almost called computer weeds. Graham tells Mark a story involving a...

0

Man arrested in Canada believed to be behind Snowflake breach – Greg Otto

– [[{“value”:” Canadian authorities have arrested a person suspected of orchestrating a series of data exfiltration attacks targeting customers of the data storage firm Snowflake.  Alexander “Connor” Moucka was taken into custody Oct. 30, based on a provisional arrest warrant, according to Canada’s Department of Justice. He is scheduled to appear in court Tuesday. The Canadian Department of Justice confirmed...

0

New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers – [email protected] (The Hacker News)

– [[{“value”:”Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. “ToxicPanda’s main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF),” Cleafy researchers Michele Roviello, Alessandro Strino”}]]  – Read More  –...

0

Leveraging Wazuh for Zero Trust security – [email protected] (The Hacker News)

– Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are not automatically trusted upon gaining access. Zero Trust security encourages continuous monitoring of every device and user, which ensures sustained protection after  – Read More  – The Hacker News 

0

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices – [email protected] (The Hacker News)

– [[{“value”:”Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an “”}]]  – Read More  –...

0

Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks – [email protected] (The Hacker News)

– [[{“value”:”Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander “Connor” Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request...

0

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages – [email protected] (The Hacker News)

– [[{“value”:”An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few”}]]  – Read More  –...

0

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System – [email protected] (The Hacker News)

– [[{“value”:”Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to “Android/data,” “Android/obb,” and “Android/sandbox” directories and its sub-directories,”}]]  – Read More  – The Hacker...

0

Android warns of Qualcomm exploit in latest security bulletin – Christian Vasquez

– [[{“value”:” Android’s monthly security bulletin published Monday warns of two vulnerabilities with “limited, targeted exploitation” in the wild. One vulnerability impacts Qualcomm chipsets via a use-after-free vulnerability in its FastRPC driver. Designated as CVE-2024-43047, the bug was reported to be under active exploitation in early October and is rated “high” severity with a CVSS score of 7.8. A FastRPC...

0

The post-election threats you need to prepare for, according to experts – djohnson

– [[{“value”:” After weeks of early voting, voters on Tuesday will head to the polls across the country to determine the next President of the United States. But federal agencies, state and local election officials, and experts say that while American voters will ultimately choose the next chief executive, they are preparing for a chaotic, disruptive and messy post-election period....

0

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. “Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including”}]]  – Read More  – The...

0

Monitoring Distributed Microservices – Waqas

– As data and usage grow, apps adopt distributed microservices with load balancers for scalability. Monitoring error rates, resource…  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03) – [email protected] (The Hacker News)

– [[{“value”:”This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? 🕵️‍♀️) We’re talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! 🥷 It’s enough to make...