Category: Attack Feeds

0

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03) – [email protected] (The Hacker News)

– [[{“value”:”This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? 🕵️‍♀️) We’re talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! 🥷 It’s enough to make...

0

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested – [email protected] (The Hacker News)

– [[{“value”:”German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. “The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own,” the Federal Criminal Police Office (aka”}]]  –...

0

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine – [email protected] (The Hacker News)

– [[{“value”:”Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant described the development as the “first real-world vulnerability” uncovered using the artificial intelligence (AI) agent. “We believe this is the first public example of an AI agent finding”}]]  –...

0

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It) – [email protected] (The Hacker News)

– [[{“value”:”As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s”}]]  – Read More  – The Hacker...

0

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. “FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming”}]]  – Read More  –...

0

FBI flags false videos impersonating agency, claiming Democratic ballot fraud – djohnson

– [[{“value”:” The FBI is warning that a pair of videos circulating online that purport to be from the bureau are fake, including one making false claims about arresting groups linked to the Democratic party for ballot fraud. “The FBI is aware of two videos falsely claiming to be from the FBI relating to election security, one stating the FBI...

0

Booking.com Phishers May Leave You With Reservations – BrianKrebs

– [[{“value”:” A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We’ll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world’s most visited...

0

Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare – [email protected] (The Hacker News)

– [[{“value”:”U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel’s participation in the sporting event. The activity has been pinned on an entity that’s known as Emennet Pasargad, which the agencies said has been operating”}]] ...

0

Georgia Secretary of State: Haitian immigrant voting video is likely Russian disinformation – Greg Otto

– [[{“value”:” Georgia Secretary of State Brad Raffensperger said a video posted on X and other social media sites depicting a supposed Haitian immigrant using multiple Georgia state IDs to cast ballots is “false” and “likely foreign interference.” “This is false, and is an example of targeted disinformation we’ve seen this election,” Raffensperger said in a statement Thursday night. “It...

0

5 SaaS Misconfigurations Leading to Major Fu*%@ Ups – [email protected] (The Hacker News)

– [[{“value”:”With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams. Misconfigurations are silent killers, leading to major”}]]  – Read More  – The Hacker...

0

Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have flagged a “massive” campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket belonging to a prior victim. The bucket,”}]]  – Read More  –...

0

Fired Disney worker accused of hacking into restaurant menus, replacing them with Windings and false peanut allergy information – Graham Cluley

– [[{“value”:”A disgruntled former Disney employee is facing charges that he hacked into the company’s restaurant menu systems and wreaked havoc on its digital displays that could have potentially put lives at risk. Read more in my article on the Hot for Security blog.”}]]  – Read More  – Graham Cluley 

0

Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft – [email protected] (The Hacker News)

– [[{“value”:”Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork-1658, stating the password spray operations are used to steal credentials from multiple Microsoft customers. “Active since at least 2021, Storm-0940 obtains initial access”}]]  –...

0

Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns – [email protected] (The Hacker News)

– [[{“value”:”Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot+ PCs, stating it’s taking the time to improve the experience. The development was first reported by The Verge. The artificial intelligence-powered tool was initially slated for a preview release starting in October. “We are committed to delivering a secure and trusted experience with Recall,” the”}]] ...

0

New Phishing Kit Xiū gǒu Targets Users Across Five Countries With 2,000 Fake Sites – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain, the U.K., and the U.S. since at least September 2024. Netcraft said more than 2,000 phishing websites have been identified the kit, known as Xiū gǒu, with the offering used in attacks aimed at a variety of verticals, such...

0

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar – [email protected] (The Hacker News)

– [[{“value”:”Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT”}]]  – Read More ...

0

Industry trade groups still have ‘concerns’ with cyber reporting mandate – Christian Vasquez

– [[{“value”:” A coalition of influential infrastructure trade groups and associations want to change key definitions around an incoming cyber reporting mandate, citing long-standing “concerns” around the Cybersecurity and Infrastructure Security Agency’s engagement process and existing regulatory requirements. In a letter to CISA Director Jen Easterly this week, 21 organizations from the communications, energy, aviation, IT, and transportation sectors, among...

0

Biden administration nears completion of second cybersecurity executive order with plethora of agenda items – Tim Starks

– [[{“value”:” The White House is close to finalizing a second executive order on cybersecurity that covers a wide range of subjects for federal agencies to address, including artificial intelligence, secure software, cloud security, identity credentialing and post-quantum cryptography, according to sources familiar with work on the document. The executive order, a follow-up to the sweeping cybersecurity executive order President...

0

Fraudsters exploit US General Election fever, FBI warns – Graham Cluley

– [[{“value”:”As the United States of Americas enter the final days of the race for the White House, the FBI has warned that fraudsters are using the presidential election campaign to scam citizens out of their savings and personal data. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

LottieFiles Issues Warning About Compromised “lottie-player” npm Package – [email protected] (The Hacker News)

– [[{“value”:”LottieFiles has revealed that its npm package “lottie-player” was compromised as part of a supply chain attack, prompting it to release an updated version of the library. “On October 30th ~6:20 PM UTC – LottieFiles were notified that our popular open source npm package for the web player @lottiefiles/lottie-player had unauthorized new versions pushed with malicious code,” the company...

0

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. “While the iOS implant delivery method closely mirrors that of the macOS version, the post-exploitation and privilege escalation stages differ”}]]  – Read More  – The...

0

Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations – Tim Starks

– [[{“value”:” Sen. Ron Wyden is asking the Commerce Department to strengthen proposed rules meant to keep U.S. technologies out of the hands of repressive nations that spy on dissidents, journalists and American citizens, arguing that regulators should expand the list of applicable countries and close a loophole that could be used to avoid the restrictions. The proposed rules promulgated...

0

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities – [email protected] (The Hacker News)

– In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as “the new perimeter”, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them vulnerable to data  –...

0

Smashing Security podcast #391: The secret Strava service, deepfakes, and crocodiles – Graham Cluley

– [[{“value”:”In this week’s episode your hosts practice standing on one leg, Carole gives Graham a deepfake quiz, and we investigate how Strava may be exposing the movements of world leaders. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.”}]]  – Read More  –...

0

LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites – [email protected] (The Hacker News)

– [[{“value”:”A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE-2024-50550 (CVSS score: 8.1), has been addressed in version 6.5.2 of the plugin. “The plugin suffers from an unauthenticated privilege escalation vulnerability”}]]  – Read More  –...

0

Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead – Tim Starks

– [[{“value”:” Top federal security and IT officials recently met to discuss 2025 cyber policy priorities, setting an emphasis on sustaining zero trust, building up awareness of threats against agency systems, securing the cloud and getting ready for post-quantum cryptography, the interim Federal Chief Information Security Officer said Wednesday. At that joint federal Chief Information Officers Council and Federal CISO...

0

FBI has conducted more than 30 disruption operations in 2024   – Christian Vasquez

– [[{“value”:” The FBI is seeing progress in the fight against ransomware gangs after conducting more than 30 disruption operations this year in which officials targeted the infrastructure used by those groups, one of the bureau’s top cybersecurity officials said Wednesday. Cynthia Kaiser, deputy assistant director of the FBI’s cyber division, said during CyberScoop’s CyberTalks event that disruption operations against...

0

Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says – mbracken

– [[{“value”:” As federal agencies race to hit a White House deadline to submit updated zero-trust implementation plans next week, a top Cybersecurity and Infrastructure Security Agency official said she’s seen promising data leading up to that “inflection point.” Speaking Wednesday at CyberScoop’s CyberTalks event in Washington, D.C., Shelly Hartsook, acting associate director of CISA’s Cybersecurity Division, said more details...

0

White House to agencies: Don’t wait to test your post-quantum encryption – djohnson

– [[{“value”:” A White House official warned federal agencies Wednesday not to wait until their new post-quantum encryption algorithms are deployed in production to test them. Agencies have been slowly working to integrate into federal IT systems new encryption algorithms that can defend against future hacks from quantum computers, but the White House wants to make sure the new protections...

0

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack – [email protected] (The Hacker News)

– [[{“value”:”Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation Troy,”}]] ...

0

Legal barriers complicate justice for spyware victims – Greg Otto

– [[{“value”:” Last month, Apple sought to drop its lawsuit against spyware industry leader NSO Group, citing a number of difficulties with advancing the case. This month, WhatsApp parent company Meta asked a judge to punish the same company for not complying with orders to hand over its source code. And for years, many victims have failed to get courts...