AttackFeed Cybersecurity News

0

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits  – The Hacker News

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft’s “Microsoft Corporation UEFI CA 2011” third-party UEFI certificate, according to a new  – Read More  – The...

0

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024  – The Hacker News

You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester).  Stolen credentials on criminal forums cost as ...

0

Scammers Exploit California Wildfires, Posing as Fire Relief Services  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News

Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains and deceptive tactics, and how to protect yourself from these cyber threats.  – Read More  – Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News 

0

Smashing Security podcast #400: Hacker games, AI travel surveillance, and 25 years of IoT  – Graham Cluley

The video game Path of Exile 2 suffers a security breach, we explore the issues of using predictive algorithms in travel surveillance systems, and the very worst IoT devices are put on show in Las Vegas. Oh, and has Elon Musk accidentally revealed he cheats at video games? All this and much more is discussed in the latest edition of...

0

Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered in Rsync, the most severe of which could allow for remote code execution. Rsync is an open-source file synchronization and data transferring tool valued for its ability to perform incremental transfers, reducing data transfer times and bandwidth usage. The tool is utilized extensively by backup systems like Rclone, DeltaCopy, ChronoSync, public file distribution repositories, and cloud...

0

Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager  – The Hacker News

Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern absolute path traversal flaws that allow a remote unauthenticated ...

0

Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws  – The Hacker News

Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named  – Read More  –...

0

CISA director says threat hunters spotted Salt Typhoon on federal networks before telco compromises   – CyberScoop

A top federal cybersecurity official said Wednesday that threat hunters from the Cybersecurity and Infrastructure Security Agency first discovered activity from Salt Typhoon on federal networks, allowing public and private sector defenders to more quickly “connect the dots” and respond to Chinese attacks on the U.S. telecommunications industry.   Speaking at an event hosted by the Foundation for Defending Democracies, CISA...

0

CIA nominee tells Senate he, too, wants to go on cyber offense  – CyberScoop

CIA director nominee John Ratcliffe said during testimony on Capitol Hill that if confirmed, he hopes to develop offensive cyber tools and supports the creation of a cyber-specific deterrence strategy. Ratcliffe, who served as director of national intelligence and in the House of Representatives for Texas, drew a comparison to the concerns over physical, territorial borders. “It’s invasion through our...

0

CISA’s AI cyber collaboration playbook aims to spur information-sharing  – CyberScoop

The Cybersecurity and Infrastructure Security Agency is making one last push before the change in administration for increased information sharing between the public and private sectors, releasing an artificial intelligence-focused playbook Tuesday that aims to foster “a unified approach” to handling AI-related cyber threats. The agency’s AI Cybersecurity Collaboration Playbook was developed with the FBI, the NSA’s Artificial Intelligence Security...

0

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99  – The Hacker News

The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. “The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews,” Ryan Sherstobitoff, senior vice president of Threat  – Read More ...

0

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes  – The Hacker News

Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. “The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages,” Jérôme Segura, senior director of  – Read More ...

0

Reviewing the Attack Surface of the Autel MaxiCharger: Part One  – Zero Day Initiative – Blog

For the upcoming Pwn2Own Automotive contest a total of 7 electric vehicle chargers have been selected. One of these is the Autel MaxiCharger AC Wallbox Commercial (MAXI US AC W12-L-4G) which also made an appearance at the inaugural Pwn2Own Automotive last January.  We have previously posted internal photos of the MaxiCharger in 2023 so the goal of this blog post...

0

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains  – The Hacker News

Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based threamoret groups may have pulled off illicit money-making scams that predate the use of IT workers, SecureWorks Counter Threat Unit (CTU) said in a report shared with The Hacker  – Read...

0

The High-Stakes Disconnect For ICS/OT Security  – The Hacker News

Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn’t just ineffective—it’s high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems (ICS) and Operational Technology (OT) security distinctly stand out from traditional IT security. ICS/OT  – Read More  –...

0

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool  – The Hacker News

As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. “Attackers can take control of a malicious server and read/write arbitrary files of any connected client,” the CERT Coordination Center (CERT/CC) said in an advisory. “Sensitive data, such as...

0

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation  – The Hacker News

The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a “multi-month law enforcement operation.” PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with the People’s Republic of China...

0

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks  – The Hacker News

Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the “vulnerabilities are trivial to reverse and exploit.” The list of identified flaws is as follows –  – Read More  – The Hacker News 

0

3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update  – The Hacker News

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks. Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a non-Microsoft CVE related to a Windows Secure Boot bypass (CVE-2024-7344),...

0

Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Authentication Bypass  – Cyber Security Advisories – MS-ISAC

Multiple Vulnerabilities have been discovered in Ivanti Avalanche, the most severe of which could allow for authentication bypass. Ivanti Avalanche is a mobile device management system. Network security features allow one to manage wireless settings (including encryption and authentication) and apply those settings on a schedule throughout the network. Successful exploitation could allow for a remote unauthenticated attacker to bypass...

0

Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution. FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console. FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines. FortiProxy is a secure web gateway that attempts to...

0

Microsoft: Happy 2025. Here’s 161 Security Updates  – Krebs on Security

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day” weaknesses that are already under active attack. Redmond’s inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017. Rapid7‘s Adam Barnett says January marks the fourth consecutive month where Microsoft has published zero-day...

0

Microsoft fixes 159 vulnerabilities in first Patch Tuesday of 2025  – CyberScoop

In its latest security update, Microsoft has addressed a total of 159 vulnerabilities, covering a broad spectrum of the tech giant’s products, including .NET, Visual Studio, Microsoft Excel, Windows components, and Azure services.  The update covers several critical and high-severity flaws across various systems, impacting Windows Telephony Services, Active Directory Domain Services, Microsoft Excel and other key Microsoft services. There...

0

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete...

0

Critical Patches Issued for Microsoft Products, January 14, 2025  – Cyber Security Advisories – MS-ISAC

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to...

0

The January 2025 Security Update Review  – Zero Day Initiative – Blog

Welcome to the first Patch Tuesday of the new year. Even while preparing for Pwn2Own Automotive, the second Tuesday still brings with it a bevy of security updates from Adobe and Microsoft. Take a break from avoiding your New Year’s resolutions and join us as we review the details of their latest security alerts. If you’d rather watch the full...

0

Law enforcement action deletes PlugX malware from thousands of machines  – CyberScoop

U.S. and international law enforcement agencies have removed the PlugX malware from thousands of computers worldwide in a coordinated campaign to blunt the effectiveness of one of the most infamous pieces of malware used by malicious cyber actors. According to recently unsealed court documents from the Eastern District of Pennsylvania, the U.S. Department of Justice worked alongside international partners, including...

0

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains  – The Hacker News

New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. “Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security co-founder and CEO Dylan Ayrey...