AttackFeed Cybersecurity News

0

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign  – The Hacker News

Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface (API) from payment processor Stripe to validate stolen payment information prior to exfiltration. “This tactic ensures that only valid card data is sent to the attackers, making the operation more efficient and potentially harder to detect,” Jscrambler researchers Pedro  – Read More  –...

0

Multiple Vulnerabilities in IBM AIX could allow for arbitrary code execution.  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered in IBM AIX, the most severe of which could allow for arbitrary code execution. IBM AIX is a secure and reliable Unix operating system designed for IBM’s Power Systems. It supports modern applications and provides strong security features, making it ideal for mission-critical business environments. Successful exploitation of these vulnerabilities could allow for arbitrary code execution...

0

Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers  – Graham Cluley

Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don’t lose your life savings in a whisky scam… All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus! Don’t miss our featured interview with...

0

Don’t cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do  – CyberScoop

Leaders of a key House subcommittee criticized the Trump administration’s personnel cuts at the Cybersecurity and Infrastructure Security Agency on Wednesday, with its chairman saying he wants CISA to take on more responsibilities, not less — some of which figure into his legislative priorities. Rep. Andrew Garbarino, the New York Republican who chairs the House Homeland Security Subcommittee on Cybersecurity...

0

Cyber Command touts AI-driven gains in cybersecurity, network monitoring  – CyberScoop

A top Cyber Command official said the agency has been able to use generative AI tools to dramatically cut down the time spent analyzing network traffic for malicious activity. Executive Director Morgan Adamski said Wednesday that as Cybercom has worked to build AI capabilities across different missions, the agency is already seeing a return on investment for certain cybersecurity functions....

0

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse  – The Hacker News

Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access container images and even inject malicious code. “The vulnerability could have allowed such an identity to abuse its Google Cloud Run revision edit permissions in order to pull private Google Artifact  – Read...

0

Independent tests show why orgs should use third-party cloud security services  – CyberScoop

Businesses don’t always get what they pay for in cybersecurity. Some of the most expensive cloud network firewall vendors are among the worst performers against exploits and evasions, according to the most comprehensive, independent testing CyberRatings.org has conducted to date. Cisco, by far the most expensive cloud network firewall offering across the top 10 vendors on price per megabits per...

0

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers  – The Hacker News

Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials. “Outlaw is a Linux malware that relies on SSH brute-force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain control over systems,” Elastic Security Labs said in a new analysis  – Read More  – The...

0

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers  – The Hacker News

Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National Institute of Standards and Technology (NIST) offers a comprehensive set of frameworks that provide a clear path to achieving robust cybersecurity practices. For service providers, adhering to NIST  – Read More  – The Hacker News 

0

How SSL Misconfigurations Impact Your Attack Surface  – The Hacker News

When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity, and visibility to attackers as well as users make them more likely to be exploited.  This highlights how important your SSL configurations are in maintaining your web application security and  – Read More  – The Hacker News 

0

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites  – The Hacker News

The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name) that can grant them remote access to compromised Windows systems. “This malware allows attackers to execute remote shell commands and other system operations, giving them full control over an infected...

0

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth  – The Hacker News

Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems. “Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls),” Zscaler ThreatLabz researcher Muhammed Irfan V A said in  –...

0

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity  – CyberScoop

Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products used across the country, saying the status quo leaves many health system owners and operators in the dark about vulnerabilities, exploitation and patching updates. Testifying before the House Energy and Commerce Subcommittee on Oversight and Investigations, Dr. Christian Dameff at...

0

Apple issues fixes for vulnerabilities in both old and new OS versions  – CyberScoop

Apple released security updates Monday to address software defects in the latest version of the company’s Safari browser and other applications across iOS, iPadOS and macOS.  The security issues addressed across the latest versions of Apple’s most popular platforms include 62 vulnerabilities affecting iOS 18.4 and iPadOS 18.4, 131 vulnerabilities affecting macOS Sequoia 15.4 and 14 vulnerabilities affecting Safari 18.4....

0

Renew — but improve — billion-dollar cyber grant program to states and locals, House witnesses say  – CyberScoop

It’s vital that Congress renew the expiring $1 billion state and local cybersecurity grant program, witnesses testified before a House panel, but they added that it could benefit from some upgrades, too. New York Rep. Andrew Garbarino, chairman of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection that held the hearing Tuesday, said the four-year cyber grant program...

0

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign  – The Hacker News

Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners. Cloud security firm Wiz said the activity is a variant of an intrusion set that was first flagged by Aqua Security in August 2024 that involved the use of a malware strain dubbed PG_MEM. The campaign has been attributed to a...

0

Democratic groups sue to block Trump administration’s elections order  – CyberScoop

The Democratic Party has filed a lawsuit against the Trump administration over its elections executive order, arguing the president lacks the constitutional authority to regulate elections by fiat. The suit, filed Monday in the District of Columbia District Court, was brought by Senate Minority Leader Chuck Schumer, D-N.Y., House Minority Leader Hakeem Jeffries, D-N.Y., the Democratic National Committee, Democratic Governors...

0

Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform  – The Hacker News

On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a few clicks. The feature is rolling out starting today in beta, allowing users to send E2EE emails to Gmail users within an organization, with plans to send E2EE emails to...

0

The AI Fix #44: AI-generated malware, and a stunning AI breakthrough  – Graham Cluley

In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art, some students manage to screw in a lightbulb, Google releases Gemini 2.5 Pro Experimental and nobody notices, and Mark invents a clock for measuring AI time. Graham explains how ChatGPT’s love for Young Adult fiction can be used to turn...

0

ReliaQuest secures $500 Million in funding, boosting AI-driven cybersecurity operations  – CyberScoop

U.S.-based cybersecurity firm ReliaQuest has secured a significant funding boost with a new investment round totaling over $500 million, elevating the company’s valuation to $3.4 billion. The funding round was led by global investors EQT Partners, KKR, and FTV Capital, alongside existing investors Ten Eleven Ventures and Finback Investment Partners. This fresh capital injection underscores ReliaQuest’s ambition to enhance and...

0

Identity lapses ensnared organizations at scale in 2024  – CyberScoop

Cybercriminals predominantly relied on weaknesses in identity controls to afflict organizations in 2024, with valid accounts being the main way they gained access for the second year in a row, Cisco Talos said in an annual report released Monday. Across the incident response cases Cisco Talos responded to last year, 60% involved an identity attack component, researchers said. Attackers used...

0

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing  – The Hacker News

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android. Lucid’s unique selling point lies in its weaponizing of legitimate communication platforms to sidestep traditional SMS-based detection mechanisms. “Its scalable,  – Read More  – The Hacker News 

0

New Case Study: Global Retailer Overshares CSRF Tokens with Facebook  – The Hacker News

Are your security tokens truly secure? Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here.  By implementing Reflectiz’s recommendations, the  – Read More  –...

AttackFeed by Joe Wagner
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.