Category: Attack Feeds

0

Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability – [email protected] (The Hacker News)

– [[{“value”:”Microsoft closed out its Patch Tuesday updates for 2024 with fixes for a total of 72 security flaws spanning its software portfolio, including one that it said has been exploited in the wild. Of the 72 flaws, 17 are rated Critical, 54 are rated Important, and one is rated Moderate in severity. Thirty-one of the vulnerabilities are remote code...

0

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls – [email protected] (The Hacker News)

– [[{“value”:”The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020. Guan Tianfeng (aka gbigmao and gxiaomao), who is said to have worked at Sichuan Silence Information Technology Company, Limited, has been charged with conspiracy to commit computer fraud and conspiracy to commit wire fraud. Guan has...

0

Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities – [email protected] (The Hacker News)

– [[{“value”:”Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and Connect Secure products that could lead to privilege escalation and code execution. The list of vulnerabilities is as follows – CVE-2024-11639 (CVSS score: 10.0) – An authentication bypass vulnerability in the admin web console of Ivanti CSA before 5.0.3 that allows a...

0

Patch Tuesday, December 2024 Edition – BrianKrebs

– [[{“value”:” Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138, a security weakness in the Windows Common Log File System (CLFS) driver — used by applications to write transaction logs — that could let an...

0

Microsoft closes 2024 with extensive security update – Greg Otto

– [[{“value”:” In its final Patch Tuesday update of 2024, Microsoft has addressed 71 new security vulnerabilities, including a zero-day flaw that is currently being actively exploited.  The zero-day vulnerability, documented as CVE-2024-49138, is a bug in the company’s Windows Common Log File System (CLFS). It poses a significant threat as it enables attackers to achieve system-level privileges via a...

0

Wyden legislation would mandate FCC cybersecurity rules for telecoms – Tim Starks

– [[{“value”:” Sen. Ron Wyden, D-Ore., introduced legislation Tuesday that would require the Federal Communications Commission to regulate the cybersecurity of telecommunications companies under federal wiretapping law. Wyden’s proposal is the latest response to the breach of telecom firms by Salt Typhoon, the Chinese government-connected hackers who carried out a potentially yearslong espionage campaign by infiltrating telecom networks. Those hackers...

0

The December 2024 Security Update Review – Dustin Childs

– [[{“value”:” We have made it to the end of the year and the final Patch Tuesday of 2024. As expected, Microsoft and Adobe have released what (hopefully) will be their last patches of the year. Take a break from your holiday preparations and join us as we review the details of their latest security alerts. If you’d rather watch...

0

The AI Fix #28: Robot dogs with bombs, and who is David Mayer? – Graham Cluley

– [[{“value”:”In episode 28 of The AI Fix, the new version of ChatGPT does a surprisingly good job of telling Mark how to defend himself from a flame thrower-wielding robot dog in his living room, Graham loses 30,000 robots on the head of a pin, our hosts meet a human washing machine from the fifties, and Dr Who finds a...

0

3AM ransomware: what you need to know – Graham Cluley

– [[{“value”:”The 3AM ransomware first emerged in late 2023. Like other ransomware, 3AM exfiltrates victims’ data (demanding a ransom is paid) and encrypts the copies left behind. Here’s what you need to know. Read more in my article on the Tripwire State of Security blog.”}]]  – Read More  – Graham Cluley 

0

Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack – mbracken

– [[{“value”:” A Chinese cybersecurity company and one of its employees were sanctioned Tuesday by the Treasury Department for their roles in an April 2020 cyberattack that unleashed malware on tens of thousands of firewalls around the globe, including a huge chunk belonging to U.S. critical infrastructure operators. Treasury’s Office of Foreign Assets Control said Guan Tianfeng, who worked as...

0

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged – [email protected] (The Hacker News)

– [[{“value”:”Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat actors exploiting the issue en masse on December 3, 2024. The vulnerability, which impacts Cleo’s LexiCom,”}]]  – Read...

0

Steady leadership prepares TSA to face evolving cyber threats – Greg Otto

– [[{“value”:” New presidents bring new policies. But amid rapidly expanding cyber threats, steady leadership at the federal agencies charged with securing critical infrastructure is, well, critical. David Pekoske, a retired U.S. Coast Guard vice admiral and administrator of the Transportation Security Administration, is uniquely positioned to provide that leadership. Congress showed foresight in 2018 by creating five-year terms for...

0

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as recruiters, luring unsuspecting victims with job offers,” Zimperium zLabs Vishnu Pratapagiri researcher said in a new report. “As part of their fraudulent hiring process, the”}]]  – Read More  –...

0

What Is a Brute Force Attack? – [email protected]

– [[{“value”:” In the ever-evolving landscape of cybersecurity, threats continue to become more sophisticated and pervasive. Among various cyber threats, brute force attacks stand out due to their simplicity and effectiveness. Despite being a basic form of attack, they remain a significant threat to businesses. This blog aims to demystify brute force attacks, explore their various forms, and offer actionable...

0

The Future of Network Security: Automated Internal and External Pentesting – [email protected] (The Hacker News)

– In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs, resource requirements, and infrequent implementation. Automated internal and external network pentesting is a game-changing solution, empowering organizations to stay  – Read More  – The Hacker News 

0

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage – [email protected] (The Hacker News)

– [[{“value”:”A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service providers in Southern Europe as part of a campaign codenamed Operation Digital Eye. The intrusions took place from late June to mid-July 2024, cybersecurity companies SentinelOne SentinelLabs and Tinexta Cyber said in a joint report shared with The Hacker News, adding”}]]  –...

0

Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands – [email protected] (The Hacker News)

– [[{“value”:”Belgian and Dutch authorities have arrested eight suspects in connection with a “phone phishing” gang that primarily operated out of the Netherlands with an aim to steal victims’ financial data and funds. As part of the international operation, law enforcement agencies carried out 17 searches in different locations in Belgium and the Netherlands, Europol said. In addition, large amounts...

0

CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force – [email protected] (The Hacker News)

– [[{“value”:”The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new set of cyber attacks that it said were aimed at defense companies in the country as well as its security and defense forces. The phishing attacks have been attributed to a Russia-linked threat actor called UAC-0185 (aka UNC4221), which has been active since at least 2022....

0

Ongoing Phishing and Malware Campaigns in December 2024 – [email protected] (The Hacker News)

– [[{“value”:”Cyber attackers never stop inventing new ways to compromise their targets. That’s why organizations must stay updated on the latest threats.  Here’s a quick rundown of the current malware and phishing attacks you need to know about to safeguard your infrastructure before they reach you. Zero-day Attack: Corrupted Malicious Files Evade Detection by Most Security Systems  The analyst”}]]  –...

0

New ‘Termite’ ransomware group claims responsibility for Blue Yonder cyberattack – Greg Otto

– [[{“value”:” A newly formed ransomware group known as Termite has claimed responsibility for a ransomware attack on Blue Yonder, which disrupted operations at several major companies, including Starbucks and leading U.K. grocery chains Morrisons and Sainsbury’s. Blue Yonder, headquartered in Arizona, disclosed on Nov. 21 that it was experiencing disruptions within its managed services-hosted environment due to the attack....

0

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering – [email protected] (The Hacker News)

– [[{“value”:”The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering tactics, distributing a different set of payloads such as Zbot and DarkGate since early October 2024. “Users within the target environment will be email bombed by the threat actor, which is often achieved by signing up the user’s email to numerous mailing...

0

Patch or Perish: The Forgotten Virtue of Diligence in Digital Security – [email protected]

– [[{“value”:” In the ever-evolving landscape of digital security, the adage “patch or perish” encapsulates a stark reality. The timely application of software patches is not just a best practice—it is a necessity. The vulnerabilities that lurk in unpatched software can serve as gateways for cybercriminals, leading to severe breaches, operational disruptions, and substantial financial losses. The imperative to keep...

0

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8) – [email protected] (The Hacker News)

– [[{“value”:”This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are busting secret online markets and kicking out shady chat rooms, while big companies rush to fix new...

0

Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices – [email protected] (The Hacker News)

– [[{“value”:”A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. “Proxy malware and services enable other types of criminal activity adding uncontrolled layers of anonymity to the threat actors, so they can perform all kinds of malicious activity using chains of victim systems,” the company’s security research team said in an...

0

Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions – [email protected] (The Hacker News)

– [[{“value”:”Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model. But IDs have their limits, and there are many use cases when a business should add other layers of security to a strong identity. And this is what we at SSH Communications Security want to talk...

0

Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI – [email protected] (The Hacker News)

– [[{“value”:”Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack. Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that providing the input...

0

Public and private sectors must partner to address generative AI’s interdependent energy and security requirements – mbracken

– [[{“value”:” Unlocking what pundits tout as the visionary potential of generative AI may require unprecedented amounts of electrical power, but it is unclear if our current energy infrastructure is up to the task. That question is especially important now given the rise of gen AI and the competing demands the country faces with other high-priority goals, such as developing...

0

84 Arrested as Russian Ransomware Laundering Networks Disrupted – Waqas

– Operation Destabilise was a major international operation led by the UK’s National Crime Agency (NCA) to dismantle two Russian-speaking criminal networks: Smart and TGR. These networks were backbone in laundering billions of dollars for various criminal activities.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions – [email protected] (The Hacker News)

– [[{“value”:”In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a security fix that “ensures”}]] ...

0

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. “The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy,” Cado Security researcher Tara Gould said. “The...

0

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar – [email protected] (The Hacker News)

– [[{“value”:”Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes.”}]]  – Read More  – The Hacker...

0

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok – [email protected] (The Hacker News)

– [[{“value”:”In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take place. Călin Georgescu, who won the first round, denounced the verdict as an “officialized coup”...

0

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine – [email protected] (The Hacker News)

– [[{“value”:”A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab. “The spyware placed on his device allows the operator to...