H  January(270)  February(364) March(400) April(276) May(343) June(373) July(296) August(388) September(287) October(0) November(0) December(0) 


DATE

NAME

Info

CATEG.

WEB

27.9.24

Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to AttackersA critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors toVulnerebilityThe Hacker News

26.9.24

Hackers Could Have Remotely Controlled Kia Cars Using Only License PlatesCybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, couldHackThe Hacker News

26.9.24

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted AttacksThreat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE and FPSpy. The activityAPTThe Hacker News

26.9.24

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and SpywareAs many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvestVirusThe Hacker News

26.9.24

U.S. govt agency CMS says data breach impacted 3.1 million peopleThe Centers for Medicare & Medicaid Services (CMS) federal agency announced earlier this month that health and personal information of more than three million health plan beneficiaries was exposed in the MOVEit attacks Cl0p ransomware conducted last year.Incindent

BleepingComputer

26.9.24

Infostealer malware bypasses Chrome’s new cookie-theft defensesInfostealer malware developers released updates claiming to bypass Google Chrome's recently introduced feature App-Bound Encryption to protect sensitive data such as cookies.Virus

BleepingComputer

26.9.24

Critical Ivanti vTM auth bypass bug now exploited in attacksCISA has tagged another critical Ivanti security vulnerability, which can let threat actors create rogue admin users on vulnerable Virtual Traffic Manager (vTM) appliances, as actively exploited in attacks.Vulnerebility

BleepingComputer

26.9.24

Hackers deploy AI-written malware in targeted attacksWhile cybercriminals have used generative AI technology to create convincing emails, government agencies have warned about the potential abuse of AI tools to creating malicious software, despite the safeguards and restrictions that vendors implemented.AI

BleepingComputer

26.9.24

Generative AI Security: Getting ready for Salesforce Einstein CopilotSalesforce's Einstein Copilot can provide insights and perform tasks help streamline daily processes. However, it also comes with risks that you should takes steps to mitigate. Learn more from Varonis on how to prepare for Salesforce Einstein Copilot,AI

BleepingComputer

26.9.24

MoneyGram confirms a cyberattack is behind dayslong outageMoney transfer giant MoneyGram has confirmed it suffered a cyberattack after dealing with system outages and customer complaints about lack of service since Friday.Hack

BleepingComputer

26.9.24

From 12 to 21: how we discovered connections between the Twelve and BlackJack groupsAn investigation of BlackJack’s software, TTPs, and motivations led Kaspersky experts to identify a possible connection with the Twelve group.APTSecurelist

26.9.24

Web tracking report: who monitored users’ online activities in 2023–2024 the mostWeb tracking has become a pervasive aspect of our online experience. Whether we’re browsing social media, playing video games, shopping for products, or simply reading news articles, trackers are silently monitoring our online behavior, fueling the ceaseless hum of countless data centers worldwide. In this article,SafetySecurelist

26.9.24

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian EntitiesAn advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credentialAPTThe Hacker News

26.9.24

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage CampaignNation-state threat actors backed by Beijing broke into a "handful" of U.S. internet service providers (ISPs) as part of a cyber espionageAPTThe Hacker News

25.9.24

Google's Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to theVulnerebilityThe Hacker News

25.9.24

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User ConsentVienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protectionSecurityThe Hacker News

25.9.24

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation ToolCybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo AltoExploitThe Hacker News

25.9.24

ChatGPT macOS Flaw Could've Enabled Long-Term Spyware via Memory FunctionA now-patched security vulnerability in OpenAI's ChatGPT app for macOS could have made it possible for attackers to plant long-termAIThe Hacker News

25.9.24

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport MalwareTransportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety ofVirusThe Hacker News

25.9.24

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation ConcernsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual TrafficVulnerebilityThe Hacker News

25.9.24

Necro Android Malware Found in Popular Camera and Browser Apps on Play StoreAltered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version ofVirusThe Hacker News

24.9.24

U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian TechThe U.S. Department of Commerce (DoC) said it's proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that of theBigBrothersThe Hacker News

24.9.24

Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising ConcernsAntivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effectiveSecurityThe Hacker News

24.9.24

New Octo Android malware version impersonates NordVPN, Google ChromeA new version of the Octo Android malware, named "Octo2," has been seen spreading across Europe under the guise of NordVPN, Google Chrome, and an app called Europe Enterprise.Virus

BleepingComputer

24.9.24

US proposes ban on connected vehicle tech from China, RussiaToday, the Biden administration announced new proposed measures to defend the United States' national security from potential threats linked to connected vehicle technologies originating from China and Russia.APT

BleepingComputer

24.9.24

Telegram now shares users’ IP and phone number on legal requestsTelegram will now share users' phone numbers and IP addresses with law enforcement if they are found to be violating the platform's rules following a valid legal request.Social

BleepingComputer

24.9.24

New Mallox ransomware Linux variant based on leaked Kryptina codeAn affiliate of the Mallox ransomware operation, also known as TargetCompany, was spotted using a slightly modified version of the Kryptina ransomware to attack Linux systems.Ransom

BleepingComputer

24.9.24

Kaspersky deletes itself, installs UltraAV antivirus without warningStarting Thursday, Kaspersky deleted its anti-malware software from computers across the United States and replaced it with UltraAV's antivirus solution without warning.Security

BleepingComputer

24.9.24

Android malware 'Necro' infects 11 million devices via Google PlayA new version of the Necro malware loader for Android was installed on 11 million devices through Google Play in malicious SDK supply chain attacks.Virus

BleepingComputer

24.9.24

New Google Chrome feature will translate complex pages in real timeGoogle is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages.CyberBleepingComputer

24.9.24

New Octo2 Android Banking Trojan Emerges with Device Takeover CapabilitiesCybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improvedVirusThe Hacker News

24.9.24

Telegram Agrees to Share User Data With Authorities for Criminal InvestigationsIn a major policy reversal, the popular messaging app Telegram has announced it will give users' IP addresses and phone numbers toSocialThe Hacker News

23.9.24

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution RiskA critical security flaw has been disclosed in the Microchip Advanced Software Framework (ASF) that, if successfully exploited, could leadIoTThe Hacker News

23.9.24

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video CallsPopular social messaging platform Discord has announced that it's rolling out a new custom end-to-end encrypted (E2EE) protocol toSocialThe Hacker News

23.9.24

New PondRAT Malware Hidden in Python Packages Targets Software DevelopersThreat actors with ties to North Korea have been observed using poisoned Python packages as a way to deliver a new malware calledVirusThe Hacker News

23.9.24

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR MalwareA suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly otherVirusThe Hacker News

22.9.24

Global infostealer malware operation targets crypto users, gamersA massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named "Marko Polo."Virus

BleepingComputer

22.9.24

Microsoft ends development of Windows Server Update Services (WSUS)Microsoft has officially announced that Windows Server Update Services (WSUS) is now deprecated, but plans to maintain current functionality and continue publishing updates through the channel.OS

BleepingComputer

22.9.24

Windows Server 2025 previews security updates without restarts​Microsoft announced today that Hotpatching is now available in public preview for Windows Server 2025, allowing installation of security updates without restarting.OS

BleepingComputer

22.9.24

Disney ditching Slack after massive July data breachThe Walt Disney Company is reportedly ditching Slack after a July data breach exposed over 1TB of confidential messages and files posted to the company's internal communication channels.Incindent

BleepingComputer

22.9.24

Ukraine bans Telegram on military, govt devices over security risksUkraine's National Coordination Centre for Cybersecurity (NCCC) has restricted the use of the Telegram messaging app within government agencies, military units, and critical infrastructure, citing national security concerns.BigBrothers

BleepingComputer

22.9.24

Dell investigates data breach claims after hacker leaks employee infoDell has confirmed to BleepingComputer that they are investigating recent claims that it suffered a data breach after a threat actor leaked the data for over 10,000 employees.Incindent

BleepingComputer

21.9.24

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber AttacksA hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyberAPTThe Hacker News

21.9.24

Ukraine Bans Telegram Use for Government and Military PersonnelUkraine has restricted the use of the Telegram messaging app by government officials, military personnel, and other defense andBigBrothersThe Hacker News

21.9.24

macOS Sequoia change breaks networking for VPN, antivirus softwareUsers of macOS 15 'Sequoia' are reporting network connection errors when using certain endpoint detection and response (EDR) or virtual private network (VPN) solutions, and web browsers.OSBleepingComputer

21.9.24

Clickbaity or genius? 'BF cheated on you' QR codes pop up across UKA new wave of QR codes has popped up across UK claiming to share a video of a boyfriend who "cheated" on a girl named Emily last night. Clickbaity or genius?Security

BleepingComputer

21.9.24

Suspects behind $230 million cryptocurrency theft arrested in MiamiTwo suspects were arrested in Miami this week and charged with conspiracy to steal and launder over $230 million in cryptocurrency using crypto exchanges and mixing services.Cryptocurrency

BleepingComputer

21.9.24

CISA warns of actively exploited Apache HugeGraph-Server bugThe U.S. Cybersecurity and Infrastructure Agency (CISA) has added five flaws to its Known Exploited Vulnerabilities (KEV) catalog, among which is a remote code execution (RCE) flaw impacting Apache HugeGraph-Server.BigBrothers

BleepingComputer

21.9.24

Tor says it’s "still safe" amid reports of police deanonymizing usersThe Tor Project is attempting to assure users that the network is still safe after a recent investigative report warned that law enforcement from Germany and other countries are working together to deanonymize users through timing attacks.Security

BleepingComputer

21.9.24

Ivanti warns of another critical CSA flaw exploited in attacksToday, Ivanti warned that threat actors are exploiting another Cloud Services Appliance (CSA) security flaw in attacks targeting a limited number of customers.Exploit

BleepingComputer

21.9.24

Google Password Manager now automatically syncs your passkeysGoogle announced that starting today, passkeys added to Google Password Manager will automatically sync between Windows, macOS, Linux, Android, and ChromeOS devices for logged-in users.Safety

BleepingComputer

21.9.24

Police dismantles phone unlocking ring linked to 483,000 victimsA joint law enforcement operation has dismantled an international criminal network that used the iServer automated phishing-as-a-service platform to unlock the stolen or lost mobile phones of 483,000 victims worldwide. BigBrothers

BleepingComputer

21.9.24

Germany seizes 47 crypto exchanges used by ransomware gangsGerman law enforcement seized 47 cryptocurrency exchange services hosted in the country that facilitated illegal money laundering activities for cybercriminals, including ransomware gangs.BigBrothers

BleepingComputer

21.9.24

Unexplained ‘Noise Storms’ flood the Internet, puzzle expertsInternet intelligence firm GreyNoise reports that it has been tracking large waves of "Noise Storms" containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose.Cyber

BleepingComputer

21.9.24

Clever 'GitHub Scanner' campaign abusing repos to push malwareA clever threat campaign is abusing GitHub repositories to distribute the Lumma Stealer password-stealing malware targeting users who frequent an open source project repository or are subscribed to email notifications from it.Virus

BleepingComputer

21.9.24

Discord rolls out end-to-end encryption for audio, video callsDiscord has introduced the DAVE protocol, a custom end-to-end encryption (E2EE) protocol designed to protect audio and video calls on the platform from unauthorized interceptions.Safety

BleepingComputer

21.9.24

Europol takes down "Ghost" encrypted messaging platform used for crimeEuropol and law enforcement from nine countries successfully dismantled an encrypted communications platform called "Ghost," which was used by organized crime such as drug trafficking and money laundering.BigBrothers

BleepingComputer

21.9.24

X hacking spree fuels "$HACKED" crypto token pump-and-dump​Microsoft says a ransomware affiliate it tracks as Vanilla Tempest now targets U.S. healthcare organizations in INC ransomware attacks.RansomBleepingComputer

21.9.24

Cracked Software or Cyber Trap? The Rising Danger of AsyncRAT MalwareAuthored by Neil Tyagi In cybersecurity, threats constantly evolve, and new ways to exploit unsuspecting users are...Malware blog

McAfee

21.9.24

How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus ProtectionsTrend Micro tracked this group as Water Bakunawa, behind the RansomHub ransomware, employs various anti-EDR techniques to play a high-stakes game of hide and seek with security solutions.Ransom blog

Trend Micro

21.9.24

Identifying Rogue AIThis is the third blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insightsAI blog

Trend Micro

21.9.24

Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACWe observed Earth Baxia carrying out targeted attacks against APAC countries that involved advanced techniques like spear-phishing and customized malware, with data suggesting that the group operates from China.APT blog

Trend Micro

21.9.24

Vulnerabilities in Cellular Packet Cores Part IV: AuthenticationOur research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC), both of which have now been resolved and are discussed in this blog post.Vulnerebility blog

Trend Micro

21.9.24

Critical Exploit in MediaTek Wi-Fi Chipsets: Zero-Click Vulnerability (CVE-2024-20017) Threatens Routers and SmartphonesOverview The SonicWall Capture Labs threat research team became aware of the threat CVE-2024-20017, assessed its impact and developed mitigation measures for the vulnerability. CVE-2024-20017 is a critical zero-click vulnerability with a CVSS 3.0 scoreVulnerebility blogSonicWall

21.9.24

Discovering Splinter: A First Look at a New Post-Exploitation Red Team ToolThis article discusses the discovery of a new post-exploitation red team tool called Splinter that we found on customer systems using Advanced WildFire’s memory scanning tools. Penetration testing toolkits and adversary simulation frameworks are often useful for identifying potential security issues in a company's network.Exploit blogPalo Alto

21.9.24

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony AnscombeWith just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral processBigBrother blog

Eset

21.9.24

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)How do analyst relations professionals 'sort through the noise' and help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find outSocial blog

Eset

21.9.24

Understanding cyber-incident disclosureProper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to helpCyber blog

Eset

21.9.24

ESET Research Podcast: EvilVideoESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videosMalware blog

Eset

21.9.24

AI security bubble already springing leaksArtificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only oneAI blog

Eset

21.9.24

The Iranian Cyber CapabilityIn this blog, we will provide an overview of the Iranian threat landscape and discuss the tools, tactics and techniques used by these groups.APT blogTrelix

21.9.24

Microsoft: Vanilla Tempest hackers hit healthcare with INC ransomwareMicrosoft says a ransomware affiliate it tracks as Vanilla Tempest now targets U.S. healthcare organizations in INC ransomware attacks.RansomBleepingComputer

21.9.24

X hacking spree fuels "$HACKED" crypto token pump-and-dumpAn X account hacking spree has fueled a successful pump-and-dump scheme for the $HACKED Solana token, with people rushing to buy the coin.Social

BleepingComputer

21.9.24

Microsoft: Vanilla Tempest hackers hit healthcare with INC ransomware​Microsoft says a ransomware affiliate it tracks as Vanilla Tempest now targets U.S. healthcare organizations in INC ransomware attacks.Ransom

BleepingComputer

21.9.24

GitLab releases fix for critical SAML authentication bypass flawGitLab has released security updates to address a critical SAML authentication bypass vulnerability impacting self-managed installations of the GitLab Community Edition (CE) and Enterprise Edition (EE).Vulnerebility

BleepingComputer

21.9.24

Microsoft may have revealed Windows 11 24H2 is coming this monthMicrosoft may have accidentally confirmed that Windows 11 24H2 (Windows 11 2024 Update) is arriving on September 24 as part of the optional preview update, with it rolling out to more people as part of the mandatory October Patch Tuesday updates.OS

BleepingComputer

21.9.24

Apple pulls iPadOS 18 update bricking M4 iPad Pro devicesApple has paused the rollout of iPadOS 18 on iPad Pro tablets with the M4 chip after numerous owners reported the update is "bricking" their devices, with no way to turn them on after performing the update.OS

BleepingComputer

21.9.24

Chinese botnet infects 260,000 SOHO routers, IP cameras with malwareThe FBI and cybersecurity researchers have disrupted a massive Chinese botnet called "Raptor Train" that infected over 260,000 networking devices to target critical infrastructure in the US and in other countries.BotNet

BleepingComputer

21.9.24

Russian security firm Dr.Web disconnects all servers after breachOn Tuesday, Russian anti-malware company Doctor Web (Dr.Web) disclosed a security breach after its systems were targeted in a cyberattack over the weekend.Incindent

BleepingComputer

21.9.24

Temu denies breach after hacker claims theft of 87 million data recordsTemu denies it was hacked or suffered a data breach after a threat actor claimed to be selling a stolen database containing 87 million records of customer information.Incindent

BleepingComputer

21.9.24

Broadcom fixes critical RCE bug in VMware vCenter ServerBroadcom has fixed a critical VMware vCenter Server vulnerability that attackers can exploit to gain remote code execution on unpatched servers via a network packet.VulnerebilityBleepingComputer

21.9.24

Construction firms breached in brute force attacks on accounting softwareHackers are brute-forcing passwords for highly privileged accounts on exposed Foundation accounting servers, widely used in the construction industry, to breach corporate networks.Incindent

BleepingComputer

21.9.24

AT&T pays $13 million FCC settlement over 2023 data breachThe Federal Communications Commission (FCC) has reached a $13 million settlement with AT&T to resolve a probe into whether the telecom giant failed to protect customer data after a vendor's cloud environment was breached three years ago.Incindent

BleepingComputer

21.9.24

CISA urges software devs to weed out XSS vulnerabilitiesCISA and the FBI urged tech companies to review their software and eliminate cross-site scripting (XSS) vulnerabilities before shipping.BigBrothers

BleepingComputer

20.9.24

Ransomware gangs now abuse Microsoft Azure tool for data theftRansomware gangs like BianLian and Rhysida increasingly use Microsoft's Azure Storage Explorer and AzCopy to steal data from breached networks and store it in Azure Blob storage.Ransom

BleepingComputer

20.9.24

PKfail Secure Boot bypass remains a significant risk two months laterRoughly nine percent of tested firmware images use non-production cryptographic keys that are publicly known or leaked in data breaches, leaving many Secure Boot devices vulnerable to UEFI bootkit malware attacks.Incindent

BleepingComputer

20.9.24

Over 1,000 ServiceNow instances found leaking corporate KB dataOver 1,000 misconfigured ServiceNow enterprise instances were found exposing Knowledge Base (KB) articles that contained sensitive corporate information to external users and potential threat actors.Security

BleepingComputer

20.9.24

CISA warns of Windows flaw used in infostealer malware attacks​CISA has ordered U.S. federal agencies to secure their systems against a recently patched Windows MSHTML spoofing zero-day bug exploited by the Void Banshee APT hacking group.BigBrothers

BleepingComputer

20.9.24

Exploit code released for critical Ivanti RCE flaw, patch nowA proof-of-concept (PoC) exploit for CVE-2024-29847, a critical remote code execution (RCE) vulnerability in Ivanti Endpoint Manager, is now publicly released, making it crucial to update devices.Exploit

BleepingComputer

20.9.24

Microsoft rolls out Office LTSC 2024 for Windows and Mac​Microsoft has announced that Office LTSC (Long Term Servicing Channel) 2024, a volume-licensed and perpetual version of Office for Windows and macOS users, is now available for commercial and government customers.OS

BleepingComputer

20.9.24

US cracks down on spyware vendor Intellexa with more sanctionsToday, the U.S. Department of the Treasury has sanctioned five executives and one entity linked to the Intellexa Consortium for developing and distributing Predator commercial spyware.BigBrothersBleepingComputer

20.9.24

Chrome switching to NIST-approved ML-KEM quantum encryptionGoogle announced updates in the post-quantum cryptographic key encapsulation mechanism used in the Chrome browser, specifically, the swap of Kyber used in hybrid key exchanges with Module Lattice Key Encapsulation Mechanism (ML-KEM).Safety

BleepingComputer

20.9.24

D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routersD-Link has fixed critical vulnerabilities in three popular wireless router models that allow remote attackers to execute arbitrary code or access the devices using hardcoded credentials.Vulnerebility

BleepingComputer

20.9.24

Windows vulnerability abused braille “spaces” in zero-day attacksA recently fixed "Windows MSHTML spoofing vulnerability" tracked under CVE-2024-43461 is now marked as previously exploited after it was used in attacks by the Void Banshee APT hacking group.APTBleepingComputer

20.9.24

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone CredentialsLaw enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform toBigBrothersThe Hacker News

20.9.24

Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle EastAn Iranian advanced persistent threat (APT) threat actor likely affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an initial access facilitator that provides remote access toAPTThe Hacker News

20.9.24

Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN FeatureGoogle on Thursday unveiled a Password Manager PIN to let Chrome web users sync their passkeys across Windows, macOS, Linux,SafetyThe Hacker News

20.9.24

Critical Ivanti Cloud Appliance Vulnerability Exploited in Active CyberattacksIvanti has revealed that a critical security flaw impacting Cloud Service Appliance (CSA) has come under active exploitation in theVulnerebilityThe Hacker News

20.9.24

Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction FirmsThreat actors have been observed targeting the construction sector by infiltrating the FOUNDATION Accounting Software , according toHackThe Hacker News

19.9.24

New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing EmailsA previously undocumented malware called SambaSpy is exclusively targeting users in Italy via a phishing campaign orchestrated by aVirusThe Hacker News

19.9.24

New TeamTNT Cryptojacking Campaign Targets CentOS Servers with RootkitThe cryptojacking operation known as TeamTNT has likely resurfaced as part of a new campaign targeting Virtual Private ServerCryptocurrencyThe Hacker News

19.9.24

Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare SectorMicrosoft has revealed that a financially motivated threat actor has been observed using a ransomware strain called INC for the firstRansomThe Hacker News

19.9.24

GitLab Patches Critical SAML Authentication Bypass Flaw in CE and EE EditionsGitLab has released patches to address a critical flaw impacting Community Edition (CE) and Enterprise Edition (EE) that could resultVulnerebilityThe Hacker News

19.9.24

New "Raptor Train" IoT Botnet Compromises Over 200,000 Devices WorldwideCybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) andIoTThe Hacker News

19.9.24

Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and MilitaryA Chinese national has been indicted in the U.S. on charges of conducting a "multi-year" spear-phishing campaign to obtainAPTThe Hacker News

18.9.24

North Korean Hackers Target Energy and Aerospace Industries with New MISTPEN MalwareA North Korea-linked cyber-espionage group has been observed leveraging job-themed phishing lures to target prospective victims inAPTThe Hacker News

18.9.24

Chrome Introduces One-Time Permissions and Enhanced Safety Check for Safer BrowsingGoogle has announced that it's rolling out a new set of features to its Chrome browser that gives users more control over their data whenSafetyThe Hacker News

18.9.24

GSMA Plans End-to-End Encryption for Cross-Platform RCS MessagingThe GSM Association (GSMA), the governing body that oversees the development of the Rich Communications Services (RCS) protocol,BigBrothersThe Hacker News

18.9.24

Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code ExecutionBroadcom on Tuesday released updates to address a critical security flaw impacting VMware vCenter Server that could pave the way forVulnerebilityThe Hacker News

17.9.24

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography DefenseGoogle has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts toSafetyThe Hacker News

17.9.24

U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware OperationThe U.S. Department of Treasury has imposed fresh sanctions against five executives and one entity with ties to the IntellexaBigBrothersThe Hacker News

17.9.24

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency UsersCryptocurrency exchange Binance is warning of an "ongoing" global threat that's targeting cryptocurrency users with clipper malware withCryptocurrencyThe Hacker News

17.9.24

SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE AttacksSolarWinds has released fixes to address two security flaws in its Access Rights Manager (ARM) software, including a criticalVulnerebilityThe Hacker News

16.9.24

Google Fixes GCP Composer Flaw That Could've Led to Remote Code ExecutionA now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieveVulnerebilityThe Hacker News

16.9.24

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor MalwareCybersecurity researchers are continuing to warn about North Korean threat actors' attempts to target prospective victims onAPTThe Hacker News

16.9.24

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence ExposureApple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting riskOSThe Hacker News

16.9.24

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing AttacksCybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliverPhishingThe Hacker News

15.9.24

YARA 4.5.2 ReleaseYARA 4.5.2 was released with 3 small changes and 4 bugfixes.SANS

15.9.24

Finding Honeypot Data Clusters Using DBSCAN: Part 2In an earlier diary, I reviewed how using tools like DBSCAN can be useful to group similar data. I used DBSCAN to try and group similar commands submitted to Cowrie and URL paths submitted to the DShield web honeypot.SANS

15.9.24

Python Libraries Used for Malicious PurposesSince I’m interested in malicious Python scripts, I found multiple samples that rely on existing libraries. SANS

15.9.24

FBI tells public to ignore false claims of hacked voter dataThe Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are alerting the public of false claims that the U.S. voter registration data has been compromised in cyberattacks.BigBrothers

BleepingComputer

15.9.24

Malware locks browser in kiosk mode to steal Google credentialsA malware campaign uses the unusual method of locking users in their browser's kiosk mode to annoy them into entering their Google credentials, which are then stolen by information-stealing malware.Virus

BleepingComputer

15.9.24

Port of Seattle hit by Rhysida ransomware in August attackPort of Seattle, the United States government agency overseeing Seattle's seaport and airport, confirmed on Friday that the Rhysida ransomware operation was behind a cyberattack impacting its systems over the last three weeks.Ransom

BleepingComputer

15.9.24

TfL requires in-person password resets for 30,000 employees after hack​Transport for London (TfL) says that all staff (roughly 30,000 employees) must attend in-person appointments to verify their identities and reset passwords following a cybersecurity incident disclosed almost two weeks ago.CyberCrime

BleepingComputer

15.9.24

23andMe to pay $30 million in genetics data breach settlementDNA testing giant 23andMe has agreed to pay $30 million to settle a lawsuit over a data breach that exposed the personal information of 6.4 million customers in 2023.Incindent

BleepingComputer

15.9.24

Ivanti warns high severity CSA flaw is now exploited in attacksIvanti confirmed on Friday that a high severity vulnerability in its Cloud Services Appliance (CSA) solution is now actively exploited in attacks. Exploit

BleepingComputer

15.9.24

New Linux malware Hadooken targets Oracle WebLogic serversHackers are targeting Oracle WebLogic servers to infect them with a new Linux malware named "Hadooken," which launches a cryptominer and a tool for distributed denial-of-service (DDoS) attacksVirus

BleepingComputer

15.9.24

RansomHub claims Kawasaki cyberattack, threatens to leak stolen dataKawasaki Motors Europe has announced that it's recovering from a cyberattack that caused service disruptions as the RansomHub ransomware gang threatens to leak stolen data.Ransom

BleepingComputer

15.9.24

New Vo1d malware infects 1.3 million Android streaming boxesThreat actors have infected over 1.3 million TV streaming boxes running Android with a new Vo1d backdoor malware, allowing the attackers to take full control of the devices.Virus

BleepingComputer

15.9.24

FBI: Reported cryptocurrency losses reached $5.6 billion in 2023The FBI says that 2023 was a record year for cryptocurrency fraud, with total losses exceeding $5.6 billion, based on nearly 70,000 reports received through the Internet Crime Complaint Center (IC3).Cryptocurrency

BleepingComputer

15.9.24

Fortinet confirms data breach after hacker claims to steal 440GB of filesCybersecurity giant Fortinet has confirmed it suffered a data breach after a threat actor claimed to steal 440GB of files from the company's Microsoft Sharepoint server. Incindent

BleepingComputer

15.9.24

UK arrests teen linked to Transport for London cyber attackU.K.'s National Crime Agency says it arrested a 17-year-old teenager who is suspected of being connected to the cyberattack on Transport for London, the city's public transportation agency.CyberCrime

BleepingComputer

15.9.24

Hackers targeting WhatsUp Gold with public exploit since AugustHackers have been leveraging publicly available exploit code for two critical vulnerabilities in the WhatsUp Gold network availability and performance monitoring solution from Progress Software.Exploit

BleepingComputer

15.9.24

Transport for London confirms customer data stolen in cyberattackTransport for London (TfL) has determined that the cyberattack on September 1 impacts customer data, including names, contact details, email addresses, and home addresses.Incindent

BleepingComputer

15.9.24

GitLab warns of critical pipeline execution vulnerabilityGitLab has released critical updates to address multiple vulnerabilities, the most severe of them (CVE-2024-6678) allowing an attacker to trigger pipelines as arbitrary users under certain conditions. Vulnerebility

BleepingComputer

15.9.24

Fake password manager coding test used to hack Python developersMembers of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware.Hack

BleepingComputer

15.9.24

Adobe fixes Acrobat Reader zero-day with public PoC exploitA cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit.Exploit

BleepingComputer

14.9.24

Protecting Against RCE Attacks Abusing WhatsUp Gold VulnerabilitiesIn this blog entry, we provide an analysis of the recent remote code execution attacks related to Progress Software’s WhatsUp Gold that possibly abused the vulnerabilities CVE-2024-6670 and CVE-2024-6671. Vulnerebility blog

Trend Micro

14.9.24

Earth Preta Evolves its Attacks with New Malware and StrategiesIn this blog entry, we discuss our analysis of Earth Preta’s enhancements in their attacks by introducing new tools, malware variants and strategies to their worm-based attacks and their time-sensitive spear-phishing campaign. Malware blog

Trend Micro

14.9.24

CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR PerspectiveIn this report, Cybereason confirms the ties between Cuckoo Spear and APT10 Intrusion Set by tying multiple incidents together and disclosing new information about this group’s new arsenal and techniquesAPT blogCybereason

14.9.24

Chinese APT Abuses VSCode to Target Government in AsiaUnit 42 researchers recently found that Stately Taurus abused the popular Visual Studio Code software in espionage operations targeting government entities in Southeast Asia. Stately Taurus is a Chinese advanced persistent threat (APT) group that carries out cyberespionage attacks. APT blogPalo Alto

14.9.24

Key Group Russian Ransomware Gang Uses Extensive Multi-purpose Telegram ChannelThe SonicWall Capture Labs threat research team has been recently tracking ransomware known as Key Group. Key Group is a Russian-based malware threat group that was formed in early 2023. Ransom blog

SonicWall

14.9.24

Hold – Verify – Execute: Rise of Malicious POCs Targeting Security ResearchersWhile investigating CVE-2024-5932, a code injection vulnerability in the GiveWP WordPress plugin, our team encountered a malicious Proof of Concept (POC) targeting cybersecurity professionals. This has become a growing threat to cybersecurity professionals from threat actors to achieve their motives, such as crypto mining, data exfiltration and backdoor installationVulnerebility blog

SonicWall

14.9.24

Microsoft Security Bulletin Coverage For September 2024Microsoft’s September 2024 Patch Tuesday has 79 vulnerabilities, of which 30 are Elevation of Privilege. SonicWall Capture Labs threat research team has analyzed and addressed Microsoft’s security advisories for the month of September 2024 and has produced coverage for 9 of the reported vulnerabilities. OS BlogSonicWall

14.9.24

Targeted Iranian Attacks Against Iraqi Government InfrastructureCheck Point Research discovered a new set of malware called Veaty and Spearal that was used in attacks against different Iraqi entities including government networks.APT blogCheckpoint

14.9.24

DragonRank, a Chinese-speaking SEO manipulator service providerCisco Talos is disclosing a new threat called “DragonRank” that primarily targets countries in Asia and a few in Europe, operating PlugX and BadIIS for search engine optimization (SEO) rank manipulationAPT blog

Cisco Blog

14.9.24

The 2024 Threat Landscape State of PlayTalos' Nick Biasini discusses the biggest shifts and trends in the threat landscape so far. We also focus on one state sponsored actor that has been particularly active this year, and talk about why defenders need to be paying closer attention to infostealers.Security blog

Cisco Blog

14.9.24

Vulnerability in Tencent WeChat custom browser could lead to remote code executionWhile this issue was disclosed and patched in the V8 engine in June 2023, the WeChat Webview component was not updated, and still remained vulnerable when Talos reported it to the vendor.Vulnerebility blog

Cisco Blog

14.9.24

Watch our new documentary, "The Light We Keep: A Project PowerUp Story"The Light We Keep documentary tells the story of the consequences of electronic warfare in Ukraine and its effect on power grids across the country.Security blog

Cisco Blog

14.9.24

We can try to bridge the cybersecurity skills gap, but that doesn’t necessarily mean more jobs for defendersA June report from CyberSeek found that there are only enough skilled workers to fill 85 percent of cybersecurity jobs in America.Security blog

Cisco Blog

14.9.24

Vulnerability in Acrobat Reader could lead to remote code execution; Microsoft patches information disclosure issue in Windows APICVE-2024-38257 is considered “less likely” to be exploited, though it does not require any user interaction or user privileges.Vulnerebility blog

Cisco Blog

14.9.24

Four zero-days included in group of 79 vulnerabilities Microsoft discloses, including one with 9.8 severity scoreSeptember’s monthly round of patches from Microsoft included 79 vulnerabilities, seven of which are considered critical.Vulnerebility blog

Cisco Blog

14.9.24

The best and worst ways to get users to improve their account securityIn my opinion, mandatory enrollment is best enrollment.Security blog

Cisco Blog

14.9.24

Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloadsThe threat of VBA macros has diminished since Microsoft prevented the execution of macros in Microsoft Office documents downloaded from the internet, but not all users are using the latest up-to-date Office versions and can still be vulnerable.Malware blogCisco Blog

14.9.24

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony AnscombeESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own endsRansom blog

Eset

14.9.24

6 common Geek Squad scams and how to defend against themLearn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricksSpam blog

Eset

14.9.24

CosmicBeetle steps up: Probation period at RansomHubCosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliateRansom blog

Eset

14.9.24

WordPress.org to require 2FA for plugin developers by OctoberStarting October 1st, WordPress.org accounts that can push updates and changes to plugins and themes will be required to activate two-factor authentication (2FA) on their accounts.Safety

BleepingComputer

14.9.24

Chinese hackers linked to cybercrime syndicate arrested in SingaporeSix Chinese nationals and a Singaporean have been arrested on Monday in Singapore for their alleged role in malicious cyber activities committed in connection with a "global syndicate."CyberCrime

BleepingComputer

14.9.24

Microsoft fixes Windows Server performance issues from August updatesMicrosoft says this month's Patch Tuesday cumulative updates also fix a known issue causing Windows Server 2019 boot problems, freezes, and performance issues after installing the August 2024 security updates.OS

BleepingComputer

14.9.24

Ivanti fixes maximum severity RCE bug in Endpoint Management softwareIvanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote code execution on the core server.Vulnerebility

BleepingComputer

14.9.24

New PIXHELL acoustic attack leaks secrets from LCD screen noiseA novel acoustic attack named 'PIXHELL' can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.Attack

BleepingComputer

14.9.24

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR softwareThe RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to attempt disabling endpoint detection and response (EDR) services on target systems.Ransom

BleepingComputer

14.9.24

Windows 10 KB5043064 update released with 6 fixes, security updatesMicrosoft has released the KB5043064 cumulative update for Windows 10 22H2 and Windows 10 21H2, which includes 6 changes and fixes, including a fix for Bluetooth devices that stop working due to a memory leak.OS

BleepingComputer

14.9.24

Microsoft fixes Windows Smart App Control zero-day exploited since 2018Microsoft has fixed a Windows Smart App Control and SmartScreen flaw that has been exploited in attacks as a zero-day since at least 2018.OS

BleepingComputer

14.9.24

Windows 11 KB5043076 cumulative update released with 19 changesMicrosoft has released the mandatory Windows 11 23H2 KB5043076 cumulative update to fix security vulnerabilities and make 19 improvements.OS

BleepingComputer

14.9.24

Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flawsToday is Microsoft's September 2024 Patch Tuesday, which includes security updates for 79 flaws, including three actively exploited and one publicly disclosed zero-days.OS

BleepingComputer

14.9.24

Wix to block Russian users starting September 12Wix.com has announced it will stop providing services to Russian users on September 12, 2024, with all accounts from Russia, including free and premium, to be blocked and their websites taken downBigBrothers

BleepingComputer

14.9.24

Microsoft to start force-upgrading Windows 22H2 systems next monthMicrosoft announced that Windows 11 installs reaching the end of support next month, on October 8, will be force-upgraded to Windows 11 23H2.OS

BleepingComputer

14.9.24

Navigating Endpoint Privilege Management: Insights for CISOs and AdminsUnderstanding endpoint privilege management is key to defending organizations from advanced attacks. Learn more from ThreatLocker on using endpoint privilege management to better secure your org's systems.Security

BleepingComputer

14.9.24

Flipper Zero releases Firmware 1.0 after three years of developmentAfter three years of development, the Flipper Zero team has announced the release of the first major firmware version for the portable, customizable digital hacking device.Security

BleepingComputer

14.9.24

NoName ransomware gang deploying RansomHub malware in recent attacksThe NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses worldwide with its encryptors and may now be working as a RansomHub affiliate.RansomBleepingComputer

14.9.24

Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance VulnerabilityIvanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190VulnerebilityThe Hacker News

13.9.24

Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to AttackersDetails have emerged about a now-patched security flaw impacting Apple's Vision Pro mixed reality headset that, if successfullyExploitThe Hacker News

13.9.24

17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for LondonBritish authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport forCyberCrimeThe Hacker News

13.9.24

TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking FraudCybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with newVirusThe Hacker News

13.9.24

Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical FlawMalicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws inExploitThe Hacker News

13.9.24

New Linux Malware Campaign Exploits Oracle Weblogic to Mine CryptocurrencyCybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency miningCryptocurrencyThe Hacker News

12.9.24

New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via TelegramBank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since atVirusThe Hacker News

12.9.24

Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job ExecutionGitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows anVulnerebilityThe Hacker News

12.9.24

Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes WorldwideNearly 1.3 million Android-based TV boxes running outdated versions of the operating system and belonging to users spanning 197VirusThe Hacker News

12.9.24

Exposed Selenium Grid Servers Targeted for Crypto Mining and ProxyjackingInternet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and proxyjacking campaigns.CryptocurrencyThe Hacker News

12.9.24

Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware AttackIraqi government networks have emerged as the target of an "elaborate" cyber attack campaign orchestrated by an Iran state-APTThe Hacker News

12.9.24

Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in EuropeThe Irish Data Protection Commission (DPC) has announced that it has commenced a "Cross-Border statutory inquiry" into Google'sAIThe Hacker News

12.9.24

WordPress Mandates Two-Factor Authentication for Plugin and Theme DevelopersWordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themesSecurityThe Hacker News

12.9.24

Quad7 Botnet Expands to Target SOHO Routers and VPN AppliancesThe operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPNBotNetThe Hacker News

12.9.24

DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and EuropeA "simplified Chinese-speaking actor" has been linked to a new campaign that has targeted multiple countries in Asia and EuropeAPTThe Hacker News

11.9.24

Fake recruiter coding tests target devs with malicious Python packagesRL found the VMConnect campaign continuing with malicious actors posing as recruiters, using packages and the names of financial firms to lure developers.APTReversingLabs

11.9.24

Singapore Police Arrest Six Hackers Linked to Global Cybercrime SyndicateThe Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their allegedCyberCrimeThe Hacker News

11.9.24

Developers Beware: Lazarus Group Uses Fake Coding Tests to Spread MalwareCybersecurity researchers have uncovered a new set of malicious Python packages that target software developers under the guise ofAPTThe Hacker News

11.9.24

Microsoft Issues Patches for 79 Flaws, Including 3 Actively Exploited Windows FlawsMicrosoft on Tuesday disclosed that three new security flaws impacting the Windows platform have come under activeVulnerebilityThe Hacker News

11.9.24

Ivanti Releases Urgent Security Updates for Endpoint Manager VulnerabilitiesIvanti has released software updates to address multiple security flaws impacting Endpoint Manager (EPM), including 10 criticalVulnerebilityThe Hacker News

11.9.24

CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHubThe threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- andRansomThe Hacker News

11.9.24

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast AsiaA trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia asAPTThe Hacker News

11.9.24

New PIXHELL Attack Exploits LCD Screen Noise to Exfiltrate Data from Air-Gapped ComputersA new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the "audio gap" andAttackThe Hacker News

11.9.24

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific GovernmentsThe threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration andAPTThe Hacker News

11.9.24

New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped NetworksA novel side-channel attack has been found to leverage radio signals emanated by a device's random access memory (RAM) as a dataAttackThe Hacker News

10.9.24

Critical SonicWall SSLVPN bug exploited in ransomware attacksRansomware affiliates exploit a critical security vulnerability in SonicWall SonicOS firewall devices to breach victims' networks.Ransom

BleepingComputer

10.9.24

Quad7 botnet targets more SOHO and VPN routers, media serversThe Quad7 botnet is expanding its targeting scope with the addition of new clusters and custom implants that now also target Zyxel VPN appliances and Ruckus wireless routers.BotNet

BleepingComputer

10.9.24

Chinese hackers use new data theft malware in govt attacksNew attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and malware called FDMTP and PTSOCKET to download payloads and steal information from breached networks.APT

BleepingComputer

10.9.24

Highline Public Schools closes schools following cyberattackHighline Public Schools, a K-12 district in Washington state, has shut down all schools and canceled school activities after its technology systems were compromised in a cyberattack.Hack

BleepingComputer

10.9.24

Meta fixes easily bypassed WhatsApp ‘View Once’ privacy featureA privacy flaw in WhatsApp, an instant messenger with over 2 billion users worldwide, is being exploited by attackers to bypass the app's "View once" feature and view messages again.Social

BleepingComputer

10.9.24

Payment gateway data breach affects 1.7 million credit card ownersPayment gateway provider Slim CD has disclosed a data breach that compromised credit card and personal data belonging to almost 1.7 million individuals.Incindent

BleepingComputer

10.9.24

Progress LoadMaster vulnerable to 10/10 severity RCE flawProgress Software has issued an emergency fix for a maximum (10/10) severity vulnerability impacting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products that allows attackers to remotely execute commands on the device.Vulnerebility

BleepingComputer

9.9.24

Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RATThe Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customizedVirusThe Hacker News

9.9.24

Chinese Hackers Exploit Visual Studio Code in Southeast Asian CyberattacksThe China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio CodeAPTThe Hacker News

9.9.24

Progress Software Issues Patch for Vulnerability in LoadMaster and MT HypervisorProgress Software has released security updates for a maximum-severity flaw in LoadMaster and Multi-Tenant (MT) hypervisor thatVulnerebilityThe Hacker News

9.9.24

New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery KeysAndroid device users in South Korea have emerged as a target of a new mobile malware campaign that delivers a new type of threatVirusThe Hacker News

9.9.24

TIDRONE Espionage Group Targets Taiwan Drone Makers in Cyber CampaignA previously undocumented threat actor with likely ties to Chinese-speaking groups has predominantly singled out drone manufacturersBigBrothersThe Hacker News

9.9.24

U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major AttacksThe U.S. government and a coalition of international partners have officially attributed a Russian hacking group tracked as CadetBigBrothersThe Hacker News

8.9.24

Sextortion scam now use your "cheating" spouse’s name as a lureA new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is cheating on them, with links to the alleged proof.Spam

BleepingComputer

8.9.24

New RAMBO attack steals data using RAM in air-gapped computersA novel side-channel attack dubbed  "RAMBO" (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device's RAM to send data from air-gapped computers.Attack

BleepingComputer

8.9.24

Transport for London staff faces systems disruptions after cyberattack​Transport for London, the city's public transportation agency, revealed today that its staff has limited access to systems and email due to measures implemented in response to a Sunday cyberattack.Incindent

BleepingComputer

8.9.24

Car rental giant Avis discloses data breach impacting customersAmerican car rental giant Avis disclosed a data breach after attackers breached one of its business applications last month and stole customer personal information.Incindent

BleepingComputer

8.9.24

Microsoft Office 2024 to disable ActiveX controls by defaultAfter Office 2024 launches in October, Microsoft will disable ActiveX controls by default in Word, Excel, PowerPoint, and Visio client apps.Security

BleepingComputer

8.9.24

SpyAgent Android malware steals your crypto recovery phrases from imagesA new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots stored on the mobile device.OS

BleepingComputer

8.9.24

SonicWall SSLVPN access control flaw is now exploited in attacksSonicWall is warning that a recently fixed access control flaw tracked as CVE-2024-40766 in SonicOS is now "potentially" exploited in attacks, urging admins to apply patches as soon as possible.Vulnerebility

BleepingComputer

8.9.24

Apache fixes critical OFBiz remote code execution vulnerabilityApache has fixed a critical security vulnerability in its open-source OFBiz (Open For Business) software, which could allow attackers to execute arbitrary code on vulnerable Linux and Windows servers.Vulnerebility

BleepingComputer

8.9.24

Microsoft removes revenge porn from Bing search using new toolMicrosoft announced today that it has partnered with StopNCII to proactively remove harmful intimate images and videos from Bing using digital hashes people create from their sensitive media.Security

BleepingComputer

8.9.24

Russian military hackers linked to critical infrastructure attacksThe United States and its allies have linked a group of Russian hackers (tracked as Cadet Blizzard and Ember Bear) behind global critical infrastructure attacks to Unit 29155 of Russia's Main Directorate of the General Staff of the Armed Forces (also known as GRU).BigBrothers

BleepingComputer

8.9.24

LiteSpeed Cache bug exposes 6 million WordPress sites to takeover attacksYet, another critical severity vulnerability has been discovered in LiteSpeed Cache, a caching plugin for speeding up user browsing in over 6 million WordPress sites.Hack

BleepingComputer

8.9.24

Musician charged with $10M streaming royalties fraud using AI and botsNorth Carolina musician Michael Smith was indicted for collecting over $10 million in royalty payments from Spotify, Amazon Music, Apple Music, and YouTube Music using AI-generated songs streamed by thousands of bots in a massive streaming fraud scheme.AI

BleepingComputer

8.9.24

Veeam warns of critical RCE flaw in Backup & Replication softwareVeeam has released security updates for several of its products as part of a single September 2024 security bulletin that addresses 18 high and critical severity flaws in Veeam Backup & Replication, Service Provider Console, and One.Vulnerebility

BleepingComputer

8.9.24

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwordsHackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma stealer information-stealing malware.CyberCrime

BleepingComputer

8.9.24

Planned Parenthood confirms cyberattack as RansomHub claims breachPlanned Parenthood has confirmed it suffered a cyberattack affecting its IT systems, forcing it to take parts of its infrastructure offline to contain the damage.Ransom

BleepingComputer

8.9.24

Microchip Technology confirms data was stolen in cyberattackAmerican semiconductor supplier Microchip Technology Incorporated has confirmed that employee information was stolen from systems compromised in an August cyberattack, which was later claimed by the Play ransomware gang.Incindent

BleepingComputer

8.9.24

Red team tool ‘MacroPack’ abused in attacks to deploy Brute RatelThe MacroPack framework, initially designed for Red Team exercises, is being abused by threat actors to deploy malicious payloads, including Havoc, Brute Ratel, and PhatomCore.Hack

BleepingComputer

8.9.24

US cracks down on Russian disinformation before 2024 electionThe FBI seized 32 web domains used by the Doppelgänger Russian-linked influence operation network in a disinformation campaign targeting the American public ahead of this year's presidential election.BigBrothers

BleepingComputer

8.9.24

Cisco fixes root escalation vulnerability with public exploit codeCisco has fixed a command injection vulnerability in the Identity Services Engine (ISE) with public exploit code that lets attackers escalate privileges to root on vulnerable systems.Exploit

BleepingComputer

8.9.24

New Eucleak attack lets threat actors clone YubiKey FIDO keysA new "EUCLEAK" flaw found in FIDO devices using the Infineon SLE78 security microcontroller, like Yubico's YubiKey 5 Series, allows attackers to extract Elliptic Curve Digital Signature Algorithm (ECDSA) secret keys and clone the FIDO device.Attack

BleepingComputer

8.9.24

Cisco warns of backdoor admin account in Smart Licensing UtilityCisco has removed a backdoor account in the Cisco Smart Licensing Utility (CSLU) that can be used to log into unpatched systems with administrative privileges.Virus

BleepingComputer

8.9.24

Hackers inject malicious JS in Cisco store to steal credit cards, credentialsCisco's site for selling company-themed merchandise is currently offline and under maintenance due to hackers compromising it with JavaScript code that steals sensitive customer details provided at checkout.CyberCrime

BleepingComputer

8.9.24

Google backports fix for Pixel EoP flaw to other Android devicesGoogle has released the September 2024 Android security updates to fix 34 vulnerabilities, including CVE-2024-32896, an actively exploited elevation of privilege flaw that was previously fixed on Pixel devices.OS

BleepingComputer

8.9.24

Criminal IP Earns PCI DSS v4.0 Certification for Top-Level SecurityAI Spera has achieved PCI DSS v4.0 certification for its threat intel search engine solution, Criminal IP. Learn more from the Criminal IP cyber threat intelligence search engine.Safety

BleepingComputer

8.9.24

Revival Hijack supply-chain attack threatens 22,000 PyPI packagesThreat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.Hack

BleepingComputer

8.9.24

FTC: Over $110 million lost to Bitcoin ATM scams in 2023The U.S. Federal Trade Commission (FTC) has reported a massive increase in losses to Bitcoin ATM scams, nearly ten times the amount from 2020 and reaching over $110 million in 2023.BigBrothers

BleepingComputer

8.9.24

Zyxel warns of critical OS command injection flaw in routersZyxel has released security updates to address a critical vulnerability impacting multiple models of its business routers, potentially allowing unauthenticated attackers to perform OS command injection.Vulnerebility

BleepingComputer

8.9.24

New Windows PowerToy launches, repositions apps to saved layoutsMicrosoft has released a new Workspaces PowerToy that helps launch sets of applications using custom desktop layouts and configurations with a mouse click.OS

BleepingComputer

8.9.24

North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job ScamsThreat actors affiliated with North Korea have been observed leveraging LinkedIn as a way to target developers as part of a fakeAPTThe Hacker News

8.9.24

FBI Cracks Down on Dark Web Marketplace Managed by Russian and Kazakh NationalsTwo men have been indicted in the U.S. for their alleged involvement in managing a dark web marketplace called WWH Club thatBigBrothersThe Hacker News

7.9.24

TIDRONE Targets Military and Satellite Industries in TaiwanOur research reveals that an unidentified threat cluster we named TIDRONE have shown significant interest in military-related industry chains, particularly in the manufacturers of drones.BigBrother blog

Trend Micro

7.9.24

Banking Trojans: Mekotio Looks to Expand Targets, BBTok Abuses Utility CommandNotorious Mekotio and BBTok are having a resurgence targeting Latin American users. Mekotio’s latest variant suggests the gang behind it is broadening their target, while BBTok is seen abusing MSBuild.exe to evade detection.Malware blog

Trend Micro

7.9.24

Earth Lusca Uses KTLVdoor Backdoor for Multiplatform IntrusionWhile monitoring Earth Lusca, we discovered the threat group’s use of KTLVdoor, a highly obfuscated multiplatform backdoor, as part of a large-scale attack campaign.Malware blog

Trend Micro

7.9.24

CVE-2024-23119: Critical SQL Injection Vulnerability in CentreonOverview The SonicWall Capture Labs threat research team became aware of the threat CVE-2024-23119, assessed its impact and developed mitigation measures for this vulnerability. CVE-2024-23119 is a high-severity SQL Injection vulnerability in Centreon, impacting CentreonVulnerebility blogSonicWall

7.9.24

Bitcoin ATM scams skyrocket – Week in security with Tony AnscombeThe schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scamsSpam blog

Eset

7.9.24

ESET Research Podcast: HotPageESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driverMalware blog

Eset

7.9.24

The key considerations for cyber insurance: A pragmatic approachWould a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance optionsCyber blog

Eset

7.9.24

In plain sight: Malicious ads hiding in search resultsSometimes there’s more than just an enticing product offer hiding behind an adMalware blog

Eset

7.9.24

FBI warns crypto firms of aggressive social engineering attacksThe FBI warns of North Korean hackers aggressively targeting cryptocurrency companies and their employees in sophisticated social engineering attacks, aiming to deploy malware that steals their crypto assets.Cryptocurrency

BleepingComputer

7.9.24

Clearview AI fined €30.5 million for unlawful data collectionThe Dutch Data Protection Authority (Dutch DPA) has imposed a fine of €30.5 million ($33.7 million) on Clearview AI for unlawful data collection using facial recognition, including photos of Dutch citizens.AI

BleepingComputer

7.9.24

D-Link says it is not fixing four RCE flaws in DIR-846W routersD-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router will not be fixed as the products are no longer supported.Vulnerebility

BleepingComputer

7.9.24

Halliburton confirms data stolen in recent cyberattackOil and gas giant Halliburton has confirmed in a filing today to the Securities and Exchange Commission (SEC) that data was stolen in the recent attack linked to the RansomHub ransomware gang.Incindent

BleepingComputer

7.9.24

Transport for London discloses ongoing “cyber security incident”Transport for London (TfL), the city's transport authority, is investigating an ongoing cyberattack that has yet to impact its services.Incindent

BleepingComputer

7.9.24

Admins of MFA bypass service plead guilty to fraudThree men have pleaded guilty to running OTP.Agency, an online platform that provided social engineering help to obtain one-time passcodes from customers of various banks and services in the U.K.Safety

BleepingComputer

7.9.24

Verkada to pay $2.95 million for alleged CAN-SPAM Act violationsThe Federal Trade Commission (FTC) requires security camera vendor Verkada to create a comprehensive information security program as part of a settlement after multiple security failures enabled hackers to access live video feeds from internet-connected cameras.BigBrothers

BleepingComputer

7.9.24

Business services giant CBIZ discloses customer data breachCBIZ Benefits & Insurance Services (CBIZ) has disclosed a data breach that involves unauthorized access of client information stored in specific databases.Incindent

BleepingComputer

7.9.24

Linux version of new Cicada ransomware targets VMware ESXi serversA new ransomware-as-a-service (RaaS) operation named Cicada3301 has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide.Ransom

BleepingComputer

7.9.24

GitHub comments abused to push password stealing malware masked as fixesGitHub is being abused to distribute the Lumma Stealer information-stealing malware as fake fixes posted in project comments.Virus

BleepingComputer

7.9.24

SonicWall Urges Users to Patch Critical Firewall Flaw Amid Possible ExploitationSonicWall has revealed that a recently patched critical security flaw impacting SonicOS may have come under active exploitation, making it essential that users apply the patches as soon as possible. TheVulnerebilityThe Hacker News

7.9.24

GeoServer Vulnerability Targeted by Hackers to Deliver Backdoors and Botnet MalwareA recently disclosed security flaw in OSGeo GeoServer GeoTools has been exploited as part of multiple campaigns to deliverBotNetThe Hacker News

7.9.24

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious CodeThreat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloadingVulnerebilityThe Hacker News

6.9.24

Critical Security Flaw Found in LiteSpeed Cache Plugin for WordPressCybersecurity researchers have discovered yet another critical security flaw in the LiteSpeed Cache plugin for WordPress that couldVulnerebilityThe Hacker News

6.9.24

Apache OFBiz Update Fixes High-Severity Flaw Leading to Remote Code ExecutionA new security flaw has been addressed in the Apache OFBiz open-source enterprise resource planning (ERP) system that, if successfully exploited, could lead to unauthenticated remote codeVulnerebilityThe Hacker News

6.9.24

Pavel Durov Criticizes Outdated Laws After Arrest Over Telegram Criminal ActivityTelegram CEO Pavel Durov has broken his silence nearly two weeks after his arrest in France, stating the charges are misguided. "If aBigBrothersThe Hacker News

6.9.24

Chinese-Speaking Hacker Group Targets Human Rights Studies in Middle EastUnnamed government entities in the Middle East and Malaysia are the target of a persistent cyber campaign orchestrated by a threatAPTThe Hacker News

6.9.24

Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical IssuesVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five criticalVulnerebilityThe Hacker News

5.9.24

U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation CrackdownThe U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian propagandaBigBrothersThe Hacker News

5.9.24

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCoreThreat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from CiscoVirusThe Hacker News

5.9.24

New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading FirmThe Chinese-speaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyberVirusThe Hacker News

5.9.24

Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote AttacksCisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allowVulnerebilityThe Hacker News

5.9.24

North Korean Hackers Targets Job Seekers with Fake FreeConference AppNorth Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com toAPTThe Hacker News

5.9.24

Android Users Urged to Install Latest Security Updates to Fix Actively Exploited FlawGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said hasVirusThe Hacker News

5.9.24

Researchers Find Over 22,000 Removed PyPI Packages at Risk of Revival HijackA new supply chain attack technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in an attempt toHackThe Hacker News

4.9.24

Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security PatchGoogle has released its monthly security updates for the Android operating system to address a known security flaw that it said hasExploitThe Hacker News

4.9.24

Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to DevelopersA new supply chain attack technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in an attempt toVirusThe Hacker News

4.9.24

Zyxel Patches Critical OS Command Injection Flaw in Access Points and RoutersZyxel has released software updates to address a critical security flaw impacting certain access point (AP) and security router versionsVulnerebilityThe Hacker News

4.9.24

Clearview AI Faces €30.5M Fine for Building Illegal Facial Recognition DatabaseThe Dutch Data Protection Authority (Dutch DPA) has imposed a fine of €30.5 million ($33.7 million) against facial recognition firmAIThe Hacker News

4.9.24

Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware AttackA new malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN software to deliver a variant of the WikiLoaderVirusThe Hacker News

4.9.24

Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and BelarusA hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia andExploitThe Hacker News

4.9.24

New Rust-Based Ransomware Cicada3301 Targets Windows and Linux SystemsCybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similaritiesRansomThe Hacker News

4.9.24

Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android UsersMobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. "ThisVirusThe Hacker News

4.9.24

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted AccessEight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privilegesExploitThe Hacker News

4.9.24

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion AttemptA 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted hisCyberCrimeThe Hacker News

4.9.24

RansomHub Ransomware Group Targets 210 Victims Across Critical SectorsThreat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception inRansomThe Hacker News

4.9.24

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' SystemsRoblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once againVirusThe Hacker News

1.9.24

GitHub comments abused to spread Lumma Stealer malware as fake fixesGitHub is being abused to distribute the Lumma Stealer information-stealing malware as fake fixes posted in project comments.Virus

BleepingComputer

1.9.24

Docker-OSX image used for security research hit by Apple DMCA takedownThe popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.Virus

BleepingComputer

1.9.24

Microsoft is trying to reduce Windows 11's desktop spotlight clutterWindows 11's Spotlight feature is a pretty nice way to jazz up your desktop background with different wallpapers and fun facts when you hover over the image icon, but it takes up a lot of space. Microsoft is working on a new change that reduces this clutter in the Windows 11 Spotlight feature.OS

BleepingComputer

1.9.24

Researchers find SQL injection to bypass airport TSA security checksSecurity researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass airport security screenings and gain access to aircraft cockpits.Incindent

BleepingComputer

1.9.24

New Voldemort malware abuses Google Sheets to store stolen dataA campaign that started on August 5, 2024, is spreading a previously undocumented malware named "Voldemort" to organizations worldwide, impersonating tax agencies from the U.S., Europe, and Asia.Virus

BleepingComputer

1.9.24

North Korean hackers exploit Chrome zero-day to deploy rootkitNorth Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.Exploit

BleepingComputer

1.9.24

Halliburton cyberattack linked to RansomHub ransomware gangThe RansomHub ransomware gang is behind the recent cyberattack on oil and gas services giant Halliburton, which disrupted the company's IT systems and business operations.Ransom

BleepingComputer

1.9.24

FBI: RansomHub ransomware breached 210 victims since FebruarySince surfacing in February 2024, RansomHub ransomware affiliates have breached over 200 victims from a wide range of critical U.S. infrastructure sectors.Ransom

BleepingComputer

1.9.24

Fake Palo Alto GlobalProtect used as lure to backdoor enterprisesThreat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and execute remote PowerShell commands to infiltrate internal networks further.Virus

BleepingComputer

1.9.24

Windows 10 KB5041582 update released with 5 changes and fixesMicrosoft has released the August 2024 preview update for Windows 10, version 22H2, with fixes for issues causing system freezes and memory leaks.OS

BleepingComputer

1.9.24

North Korean threat actor Citrine Sleet exploiting Chromium zero-dayMicrosoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium, now identified as CVE-2024-7971, to gain remote code execution (RCE).Exploit blogMicrosoft Blog

1.9.24

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day ExploitA recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by NorthExploitThe Hacker News