H  January(270)  February(364) March(400) April(276) May(335) June(373) July(0) August(0) September(0) October(0) November(0) December(0) 

DATE

NAME

Info

CATEG.

WEB

30.6.24

Google to Block Entrust Certificates in Chrome Starting November 2024 Google has announced that it's going to start blocking websites that use certificates from Entrust starting around November 1, 2024, in its Security The Hacker News

30.6.24

Microsoft resumes rollout of Windows 11 KB5039302 update for most users Microsoft has resumed the rollout of the June Windows 11 KB5039302 update, now blocking the update only for those using virtualization software. OS

BleepingComputer

30.6.24

Hackers exploit critical D-Link DIR-859 router flaw to steal passwords Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device, including passwords. Exploit

BleepingComputer

30.6.24

Meet Brain Cipher — The new ransomware behind Indonesia's data center attack The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia's temporary National Data Center. Ransom

BleepingComputer

30.6.24

Infosys McCamish says LockBit stole data of 6 million people Infosys McCamish Systems (IMS) disclosed that the LockBit ransomware attack it suffered earlier this year impacted sensitive information of more than six million individuals. Incindent

BleepingComputer

30.6.24

Dairy giant Agropur says data breach exposed customer info Agropur, one of the largest dairy cooperatives in North America, is notifying customers of a data breach after some of its shared online directories were exposed. Incindent

BleepingComputer

30.6.24

Ticketmaster sends notifications about recent massive data breach Ticketmaster has started to notify customers who were impacted by a data breach after hackers stole the company's Snowflake database, containing the data of millions of people. Incindent

BleepingComputer

30.6.24

TeamViewer links corporate cyberattack to Russian state hackers RMM software developer TeamViewer says a Russian state-sponsored hacking group known as Midnight Blizzard is believed to be behind a breach of their corporate network this week. BigBrothers

BleepingComputer

30.6.24

Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to tens of millions of websites has been traced to a common operator. Researchers discovered a public GitHub repository with leaked API keys helping them draw a conclusion. Hack

BleepingComputer

30.6.24

Former IT employee accessed data of over 1 million US patients Geisinger, a prominent healthcare system in Pennsylvania, has announced a data breach involving a former employee of Nuance, an IT services provider contracted by the organization. Incindent

BleepingComputer

30.6.24

BlackSuit ransomware gang claims attack on KADOKAWA corporation The BlackSuit ransomware gang claimed a recent cyberattack on KADOKAWA corporation and is now threatening to publish stolen data if a ransom is not paid. Ransom

BleepingComputer

30.6.24

New Unfurling Hemlock threat actor floods systems with malware A threat actor tracked as Unfurling Hemlock has been infecting target systems with up to ten pieces of malware at the same time in campaigns that distribute hundreds of thousands of malicious files. Virus

BleepingComputer

30.6.24

U.S. indicts Russian GRU hacker, offers $10 million reward The U.S. indicted Russian national Amin Timovich Stigal for his alleged role in cyberattacks targeting Ukrainian government computer networks in an operation from the Russian foreign military intelligence agency (GRU) prior to invading the country. APT

BleepingComputer

30.6.24

TeamViewer's corporate network was breached in alleged APT hack The remote access software company TeamViewer is warning that its corporate environment was breached in a cyberattack yesterday, with a cybersecurity firm claiming it was by an APT hacking group. Incindent

BleepingComputer

29.6.24

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data The North Korea-linked threat actor known as Kimsuky has been linked to the use of a new malicious Google Chrome extension that's APT

The Hacker News

29.6.24

GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others GitLab has released security updates to address 14 security flaws, including one critical vulnerability that could be exploited to run Vulnerebility

The Hacker News

29.6.24

Microsoft pulls Windows 11 KB5039302 update causing reboot loops Microsoft pulled the June Windows 11 KB5039302 update after finding that it causes some devices to restart repeatedly. OS

BleepingComputer

29.6.24

Critical GitLab bug lets attackers run pipelines as any user A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user. Vulnerebility

BleepingComputer

29.6.24

Polyfill claims it has been 'defamed', returns after domain shut down The owners of Polyfill.io have relaunched the JavaScript CDN service on a new domain after polyfill.io was shut down as researchers exposed it was delivering malicious code on upwards of 100,000 websites.. The Polyfill service claims that it has been "maliciously defamed" and been subject to "media messages slandering Polyfill." Security

BleepingComputer

29.6.24

Cloudflare: We never authorized polyfill.io to use our name Cloudflare, a lead provider of content delivery network (CDN) services, cloud security, and DDoS protection has warned that it has not authorized the use of its name or logo on the Polyfill.io website, which has recently been caught injecting malware on more than 100,000 websites in a significant supply chain attack. Security

BleepingComputer

29.6.24

Chinese Cyberspies Employ Ransomware in Attacks for Diversion Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft. Ransom

BleepingComputer

29.6.24

LockBit lied: Stolen data is from a bank, not US Federal Reserve Recently-disrupted LockBit ransomware group, in a desperate attempt to make a comeback, claimed this week that it had hit the Federal Reserve, the central bank of the United States. Except, the rumor has been quashed. Ransom

BleepingComputer

29.6.24

CISA: Most critical open source projects not using memory safe code The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published research looking into 172 key open-source projects and whether they are susceptible to memory flaws. BigBrothers

BleepingComputer

29.6.24

Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released The Fortra FileCatalyst Workflow is vulnerable to an SQL injection vulnerability that could allow remote unauthenticated attackers to create rogue admin users and manipulate data on the application database. Exploit

BleepingComputer

29.6.24

Hackers target new MOVEit Transfer critical auth bypass bug Threat actors are attempting to exploit a critical authentication bypass flaw impacting Progress MOVEit Transfer, which the vendor disclosed yesterday. Vulnerebility

BleepingComputer

29.6.24

Windows 11 KB5039302 update released with 9 changes or fixes Microsoft has released the Windows 11 KB5039302 preview update for Windows 11 version 22H2, bringing several new features and fixes. OS

BleepingComputer

29.6.24

Windows 10 KB5039299 update released with 10 changes or fixes Microsoft has released the KB5039299 update for Windows 10 version 22H2 with up to ten bug fixes or changes, including a fix for "Open With" dialog boxes being shown when using apps. OS

BleepingComputer

29.6.24

Snowblind malware abuses Android security feature to bypass security A novel Android attack vector from a piece of malware tracked as Snowblind is abusing a security feature to bypass existing anti-tampering protections in apps that handle sensitive user data. Virus

BleepingComputer

29.6.24 Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework We recently discovered a new threat actor group that we dubbed Void Arachne. This group targets Chinese-speaking users with malicious Windows Installer (MSI) files in a recent campaign. These MSI files contain legitimate software installer files for AI software and other popular software but are bundled with malicious Winos payloads. APT blog Trend Micro
29.6.24 Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. Cryptocurrency blog Trend Micro
29.6.24 ICO Scams Leverage 2024 Olympics to Lure Victims, Use AI for Fake Sites In this blog we uncover threat actors using the 2024 Olympics to lure victims into investing in an initial coin offering (ICO). Similar schemes have been found to use AI-generated images for their fake ICO websites. AI blog Trend Micro
29.6.24 AI Coding Companions 2024: AWS, GitHub, Tabnine + More AI coding companions are keeping pace with the high-speed evolution of generative AI overall, continually refining and augmenting their capabilities to make software development faster and easier than ever before. This blog looks at how the landscape is changing and key features of market-leading solutions from companies like AWS, GitHub, and Tabnine. AI blog Trend Micro
29.6.24 Attackers in Profile: menuPass and ALPHV/BlackCat To test the effectiveness of managed services like our Trend Micro managed detection and response offering, MITRE Engenuity™ combined the tools, techniques, and practices of two globally notorious bad actors: menuPass and ALPHV/BlackCat. Ransom blog Trend Micro
29.6.24 Omdia Report: Trend Disclosed 60% of Vulnerabilities The latest Omdia Vulnerability Report shows Trend Micro™ Zero Day Initiative™ (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention. Cyber blog Trend Micro
29.6.24 Worldwide 2023 Email Phishing Statistics and Examples Explore the need for going beyond built-in Microsoft 365 and Google Workspace™ security based on email threats detected in 2023. Phishing blog Trend Micro
29.6.24 Not Just Another 100% Score: MITRE ENGENUITY ATT&CK The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. Cyber blog Trend Micro
29.6.24 StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe The SonicWall Capture Labs threat research team has been tracking StrelaStealer for a long time. Recently, in the third week of June, we observed a huge spike in JavaScript spreading StrelaStealer. StrelaStealer specifically steals Outlook and Thunderbird email credentials. The infection chain looks like previous versions of StrelaStealer except major checks have been added to avoid infecting systems in Russia. We are continuing to observe its target regions limited to Poland, Spain, Italy and Germany. Malware blog SonicWall
29.6.24 New Orcinius Trojan Uses VBA Stomping to Mask Infection This week, the SonicWall Capture Labs threat research team investigated a sample of Orcinius malware. This is a multi-stage trojan that is using Dropbox and Google Docs to download second-stage payloads and stay updated. It contains an obfuscated VBA macro that hooks into Windows to monitor running windows and keystrokes and creates persistence using registry keys. Malware blog SonicWall
29.6.24 Attack Paths Into VMs in the Cloud This post reviews strategies for identifying and mitigating potential attack vectors against virtual machine (VM) services in the cloud. Organizations can use this information to understand the potential risks associated with their VM services and strengthen their defense mechanisms. This research focuses on VM services offered by three major cloud service providers (CSPs): Amazon Web Services (AWS), Azure and Google Cloud Platform (GCP). Attack blog Palo Alto
29.6.24 Attackers Exploiting Public Cobalt Strike Profiles In this article, Unit 42 researchers detail recent findings of malicious Cobalt Strike infrastructure. We also share examples of malicious Cobalt Strike samples that use Malleable C2 configuration profiles derived from the same profile hosted on a public code repository. Malware blog Palo Alto
29.6.24 RAFEL RAT, ANDROID MALWARE FROM ESPIONAGE TO RANSOMWARE OPERATIONS Android, Google’s most popular mobile operating system, powers billions of smartphones and tablets globally. Known for its open-source nature and flexibility, Android offers users a wide array of features, customization options, and access to a vast ecosystem of applications through the Google Play Store and other sources. Malware blog Checkpoint
29.6.24 SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques Cisco Talos recently discovered an ongoing campaign from SneakyChef, a newly discovered threat actor using SugarGh0st malware, as early as August 2023. Malware blog Cisco Blog
29.6.24 Snowflake isn’t an outlier, it’s the canary in the coal mine By Nick Biasini with contributions from Kendall McKay and Guilherme Venere Headlines continue to roll in about the many implications and follow-on attacks originating from leaked and/or stolen credentials for the Snowflake cloud data platform. Adversaries obtained stolen login Incident blog Cisco Blog
29.6.24 Multiple vulnerabilities in TP-Link Omada system could lead to root access Affected devices could include wireless access points, routers, switches and VPNs. Vulnerebility blog Cisco Blog
29.6.24 Unveiling SpiceRAT: SneakyChef's latest tool targeting EMEA and Asia The new remote access trojan (RAT) dubbed SpiceRAT was used by the threat actor SneakyChef in a recent campaign targeting government agencies in EMEA and Asia. Malware blog Cisco Blog
29.6.24 We’re not talking about cryptocurrency as much as we used to, but there are still plenty of scammers out there A report in March found that 72% of cryptocurrency projects had died since 2020, with crypto trading platform FTX’s downfall taking out many of them in one fell swoop. Cryptocurrency blog Cisco Blog
29.6.24 Tabletop exercises are headed to the next frontier: Space More on the recent Snowflake breach, MFA bypass techniques and more. Cyber blog Cisco Blog
29.6.24 Exploring malicious Windows drivers (Part 2): the I/O system, IRPs, stack locations, IOCTLs and more As the second entry in our “Exploring malicious Windows drivers” series, we will continue where the first left off: Discussing the I/O system and IRPs. Malware blog Cisco Blog
29.6.24 How are attackers trying to bypass MFA? Exploring trends on how attackers are trying to manipulate and bypass MFA, as well as when/how attackers will try their 'push-spray' MFA attacks Security blog Cisco Blog
29.6.24 How we can separate botnets from the malware operations that rely on them A botnet is a network of computers or other internet-connected devices that are infected by malware and controlled by a single threat actor or group. BotNet blog Cisco Blog
29.6.24 Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models At Project Zero, we constantly seek to expand the scope and effectiveness of our vulnerability research. Though much of our work still relies on traditional methods like manual source code audits and reverse engineering, we're always looking for new approaches. Cyber blog Project Zero
29.6.24 The Windows Registry Adventure #3: Learning resources When tackling a new vulnerability research target, especially a closed-source one, I prioritize gathering as much information about it as possible. This gets especially interesting when it's a subsystem as old and fundamental as the Windows registry. Cyber blog Project Zero
29.6.24 ESET Threat Report H1 2024 A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Cyber blog Eset
29.6.24 Cyber insurance as part of the cyber threat mitigation strategy Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies Cyber blog Eset
29.6.24 Buying a VPN? Here’s what to know and look for VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes Cyber blog Eset
29.6.24 The long-tail costs of a data breach – Week in security with Tony Anscombe Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents Cyber blog Eset
29.6.24 My health information has been stolen. Now what? As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records Cyber blog Eset
29.6.24 Hacktivism is evolving – and that could be bad news for organizations everywhere Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat Cyber blog Eset
29.6.24 Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack

Cyber blog Eset
28.6.24 Plugins on WordPress.org backdoored in supply chain attack A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP scripts that create new accounts with administrative privileges on websites running them. Hack

BleepingComputer

28.6.24 Polyfill.io JavaScript supply chain attack impacts over 100K sites Over 100,000 sites have been impacted in a supply chain attack by the Polyfill.io service after a Chinese company acquired the domain and the script was modified to redirect users to malicious and scam sites. Hack

BleepingComputer

28.6.24 New Medusa malware variants target Android users in seven countries The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in campaigns targeting France, Italy, the United States, Canada, Spain, the United Kingdom, and Turkey. Virus

BleepingComputer

28.6.24 Neiman Marcus confirms data breach after Snowflake account hack Luxury retailer Neiman Marcus confirmed it suffered a data breach after hackers attempted to sell the company's database stolen in recent Snowflake data theft attacks. Incindent

BleepingComputer

28.6.24 FBI warns of fake law firms targeting crypto scam victims The FBI is warning of cybercriminals posing as law firms and lawyers that offer cryptocurrency recovery services to victims of investment scams and steal funds and personal information. Spam

BleepingComputer

28.6.24 P2PInfect botnet targets REdis servers with new ransomware module P2PInfect, originally a dormant peer-to-peer malware botnet with unclear motives, has finally come alive to deploy a ransomware module and a cryptominer in attacks on Redis servers. Ransom

BleepingComputer

28.6.24 Chemical facilities warned of possible data theft in CISA CSAT breach CISA is warning that its Chemical Security Assessment Tool (CSAT) environment was breached in January after hackers deployed a webshell on its Ivanti device, potentially exposing sensitive security assessments and plans. Incindent

BleepingComputer

28.6.24 New attack uses MSC files and Windows XSS flaw to breach networks A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform code execution via the Microsoft Management Console. Hack

BleepingComputer

28.6.24 Four FIN9 hackers indicted for cyberattacks causing $71M in losses Four Vietnamese nationals linked to the international cybercrime group FIN9 have been indicted for their involvement in a series of computer intrusions that caused over $71 million in losses to companies in the U.S. APT

BleepingComputer

28.6.24 CoinStats says North Korean hackers breached 1,590 crypto wallets CoinStats suffered a massive security breach that compromised 1,590 cryptocurrency wallets, with the attack suspected to have been carried out by North Korean threat actors. Incindent

BleepingComputer

28.6.24 CDK Global hacked again while recovering from first cyberattack Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore systems shut down in an previous cyberattack. Incindent

BleepingComputer

28.6.24 8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8220 Gang by exploiting known Exploit The Hacker News
28.6.24 New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities A group of security researchers from the Graz University of Technology have demonstrated a new side-channel attack known as Exploit The Hacker News
28.6.24 Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could be exploited by malicious actors to Vulnerebility The Hacker News
28.6.24 TeamViewer Detects Security Breach in Corporate IT Environment TeamViewer on Thursday disclosed it detected an "irregularity" in its internal corporate IT environment on June 26, 2024. "We immediately Incindent The Hacker News
28.6.24 Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and Ransom The Hacker News
28.6.24 Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks Cybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote Vulnerebility The Hacker News
28.6.24 Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application A critical security flaw has been disclosed in Fortra FileCatalyst Workflow that, if left unpatched, could allow an attacker to tamper Vulnerebility The Hacker News
27.6.24 Phoenix UEFI vulnerability impacts hundreds of Intel PC models A newly discovered vulnerability in Phoenix SecureCore UEFI firmware tracked as CVE-2024-0762 impacts devices running numerous Intel CPUs, with Lenovo already releasing new firmware updates to resolve the flaw. Vulnerebility

BleepingComputer

27.6.24 CosmicSting flaw impacts 75% of Adobe Commerce, Magento sites A vulnerability dubbed "CosmicSting" impacting Adobe Commerce and Magento websites remains largely unpatched nine days after the security update has been made available, leaving millions of sites open to catastrophic attacks. Vulnerebility

BleepingComputer

27.6.24 Linux version of RansomHub ransomware targets VMware ESXi VMs The RansomHub ransomware operation is using a Linux encryptor designed specifically to encrypt VMware ESXi environments in corporate attacks. Ransom

BleepingComputer

27.6.24 UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on VMware ESXi virtual machines, allowing them to conduct credential theft, command execution, and lateral movement. APT

BleepingComputer

27.6.24 SolarWinds Serv-U path traversal flaw actively exploited in attacks Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Exploit

BleepingComputer

27.6.24 CDK Global hacked again while recovering from first cyberattack Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore systems shut down in an previous cyberattack. Hack

BleepingComputer

27.6.24 T-Mobile denies it was hacked, links leaked data to vendor breach T-Mobile has denied it was breached or that source code was stolen after a threat actor claimed to be selling stolen data from the telecommunications company. Incindent

BleepingComputer

27.6.24 Crown Equipment confirms a cyberattack disrupted manufacturing Forklift manufacturer Crown Equipment confirmed today that it suffered a cyberattack earlier this month that disrupted manufacturing at its plants. CyberCrime

BleepingComputer

27.6.24 Advance Auto Parts confirms data breach exposed employee information Advance Auto Parts has confirmed it suffered a data breach after a threat actor attempted to sell stolen data on a hacking forum earlier this month. Incindent

BleepingComputer

27.6.24 CDK Global cyberattack impacts thousands of US car dealerships Car dealership software-as-a-service provider CDK Global was hit by a massive cyberattack, causing the company to shut down its systems and leaving clients unable to operate their business normally. CyberCrime

BleepingComputer

27.6.24 "Researchers" exploit Kraken exchange bug, steal $3 million in crypto The Kraken crypto exchange disclosed today that alleged security researchers exploited a zero-day website bug to steal $3 million in cryptocurrency and then refused to return the funds. Cryptocurrency

BleepingComputer

27.6.24 Microsoft says bug causes Windows 10 apps to display Open With dialogs Microsoft has confirmed that Windows 10 apps will mistakenly display an "How do you want to open this file?" dialog box when attempting to right-click on the program's icon and perform a registered task. OS

BleepingComputer

27.6.24 AMD investigates breach after data for sale on hacking forum AMD is investigating whether it suffered a cyberattack after a threat actor put allegedly stolen data up for sale on a hacking forum, claiming it contains AMD employee information, financial documents, and confidential information. Incindent

BleepingComputer

27.6.24 ONNX phishing service targets Microsoft 365 accounts at financial firms A new phishing-as-a-service (PhaaS) platform called ONNX Store is targeting Microsoft 365 accounts for employees at financial firms using QR codes in PDF attachments. Phishing

BleepingComputer

27.6.24 VMware fixes critical vCenter RCE vulnerability, patch now VMware has issued a security advisory addressing critical vulnerabilities in vCenter Server, including remote code execution and local privilege escalation flaws. Vulnerebility

BleepingComputer

27.6.24 Scathing report on Medibank cyberattack highlights unenforced MFA A scathing report by Australia's Information Commissioner details how misconfigurations and missed alerts allowed a hacker to breach Medibank and steal data from over 9 million people. CyberCrime

BleepingComputer

27.6.24 FTC files complaint against Adobe for deceptive cancellation practices The Federal Trade Commission has filed a complaint in US federal court against Adobe and two executives, Maninder Sawhney and David Wadhwani, for deceptive practices related to their subscription plans. BigBrothers BleepingComputer
27.6.24 Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability - Patch ASAP! A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the wild Exploit The Hacker News
27.6.24 Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting APT The Hacker News
27.6.24 Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones in an unauthorized OS The Hacker News
27.6.24 New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new CyberCrime The Hacker News
27.6.24 New Medusa Android Trojan Targets Banking Users Across 7 Countries Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used to target Virus The Hacker News
27.6.24 Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired the domain Hack The Hacker News
25.6.24 New Attack Technique Exploits Microsoft Management Console Files Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files Hack The Hacker News
25.6.24 New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a Virus The Hacker News
25.6.24 Wikileaks' Julian Assange Released from U.K. Prison, Heads to Australia WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five years in a BigBrothers The Hacker News
25.6.24 4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in a series of APT The Hacker News
25.6.24 Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with the aim of performing arbitrary actions. "The injected Virus The Hacker News
25.6.24 Google Introduces Project Naptime for AI-Powered Vulnerability Research Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry out AI The Hacker News
25.6.24 Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool Cybersecurity researchers have detailed a now-patched security flaw affecting the Ollama open-source artificial intelligence (AI) Vulnerebility The Hacker News
25.6.24 RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, APT The Hacker News
25.6.24 Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Virus The Hacker News
23.6.24 ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor Russian organizations have been targeted by a cybercrime gang called ExCobalt using a previously unknown Golang-based backdoor APT The Hacker News
23.6.24 Warning: New Adware Campaign Targets Meta Quest App Seekers A new campaign is tricking users searching for the Meta Quest (formerly Oculus) application for Windows into downloading a new Virus The Hacker News
23.6.24 U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) imposed sanctions against a dozen individuals BigBrothers The Hacker News
23.6.24 Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign APT The Hacker News
23.6.24 Military-themed Email Scam Spreads Malware to Infect Pakistani Users Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan BigBrothers The Hacker News
23.6.24 Oyster Backdoor Spreading via Trojanized Popular Software Downloads A malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and Microsoft Teams to Virus The Hacker News
23.6.24 SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately A recently patched high-severity flaw impacting SolarWinds Serv-U file transfer software is being actively exploited by malicious actors Vulnerebility The Hacker News
23.6.24 U.S. Bans Kaspersky Software, Citing National Security Risks The U.S. Department of Commerce's Bureau of Industry and Security (BIS) on Thursday announced a "first of its kind" ban that prohibits BigBrothers The Hacker News
20.6.24 Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects Vulnerebility The Hacker News
20.6.24 French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities, the BigBrothers The Hacker News
20.6.24 Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021 Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators BigBrothers The Hacker News
20.6.24 New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with Virus The Hacker News
20.6.24 Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns Virus The Hacker News
19.6.24 Two men guilty of breaching law enforcement portal in blackmail scheme Two men have pleaded guilty to hacking into a federal law enforcement database to steal personal information of those they were extorting. CyberCrime

BleepingComputer

19.6.24 Fake Google Chrome errors trick you into running malicious PowerShell scripts A new malware distribution campaign uses fake Google Chrome, Word, and OneDrive errors to trick users into running malicious PowerShell "fixes" that install malware. Virus

BleepingComputer

19.6.24 Panera Bread likely paid a ransom in March ransomware attack Panera Bread, an American chain of fast food restaurants, most likely paid a ransom after being hit by a ransomware attack, suggests language used an internal email sent to employees. Ransom

BleepingComputer

19.6.24 Empire Market owners charged for enabling $430M in dark web transactions Two men have been charged in a Chicago federal court for operating "Empire Market," a dark web marketplace that facilitated over $430 million in illegal transactions between February 2018 and August 2020. BigBrothers

BleepingComputer

19.6.24 Hackers use F5 BIG-IP malware to stealthily steal data for years A group of suspected Chinese cyberespionage actors named 'Velvet Ant' are deploying custom malware on F5 BIG-IP appliances to gain a persistent connection to the internal network and steal data. BigBrothers

BleepingComputer

19.6.24 Alleged Scattered Spider sim-swapper arrested in Spain A 22-year-old British national allegedly linked to the Scattered Spider hacking group and responsible for attacks on 45 U.S. companies has been arrested in Palma de Mallorca, Spain. CyberCrime

BleepingComputer

19.6.24 Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw Crypto exchange Kraken revealed that an unnamed security researcher exploited an "extremely critical" zero-day flaw in its Cryptocurrency The Hacker News
19.6.24 UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet , Ivanti , and VMware devices APT The Hacker News
19.6.24 New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious APT The Hacker News
19.6.24 Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital Cryptocurrency The Hacker News
19.6.24 Mailcow Mail Server Flaws Expose Servers to Remote Code Execution Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious Vulnerebility The Hacker News
19.6.24 Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM A controversial proposal put forth by the European Union to scan users' private messages for detection child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned BigBrothers The Hacker News
18.6.24 Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader called Virus The Hacker News
18.6.24 New Malware Targets Exposed Docker APIs for Cryptocurrency Mining Cybersecurity researchers have uncovered a new malware campaign that targets publicly exposed Docket API endpoints with the aim of Cryptocurrency The Hacker News
18.6.24 VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi VMware has released updates to address critical flaws impacting Cloud Foundation, vCenter Server, and vSphere ESXi that could be Vulnerebility The Hacker News
18.6.24 Singapore Police Extradites Malaysians Linked to Android Malware Fraud The Singapore Police Force (SPF) has announced the extradition of two men from Malaysia for their alleged involvement in a mobile CyberCrime The Hacker News
17.6.24 ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors Vulnerebility The Hacker News
17.6.24 China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization APT The Hacker News
17.6.24 New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension (MTE) to leak data with over a 95% chance of success, allowing hackers to bypass the security feature. Attack BleepingComputer
17.6.24 Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of Exploit The Hacker News
17.6.24 NiceRAT Malware Targets South Korean Users via Cracked Software Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet. The attacks, which Virus The Hacker News
16.6.24 U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain Law enforcement authorities have allegedly arrested a key member of the notorious cybercrime group called Scattered Spider. The CyberCrime The Hacker News
16.6.24 New Linux malware is controlled through emojis sent from Discord A newly discovered Linux malware dubbed 'DISGOMOJI' uses the novel approach of utilizing emojis to execute commands on infected devices in attacks on government agencies in India. Virus

BleepingComputer

16.6.24 ASUS warns of critical remote authentication bypass on 7 routers ASUS has released a new firmware update that addresses a vulnerability impacting seven router models that allow remote attackers to log in to devices. Vulnerebility

BleepingComputer

16.6.24 Microsoft: New Outlook security changes coming to personal accounts Microsoft has announced new cybersecurity enhancements for Outlook personal email accounts as part of its 'Secure Future Initiative,' including the deprecation of basic authentication (username + password) by September 16, 2024. Security

BleepingComputer

16.6.24 Keytronic confirms data breach after ransomware gang leaks stolen files PCBA manufacturing giant Keytronic is warning it suffered a data breach after the Black Basta ransomware gang leaked 530GB of the company's stolen data two weeks ago. Incindent

BleepingComputer

16.6.24 Mozilla Firefox can now secure access to passwords with device credentials Mozilla Firefox finally allows you to further protect local access to stored credentials in the browser's password manager using your device's login, including a password, fingerprint, pin, or other biometrics Security

BleepingComputer

16.6.24 London hospitals cancel over 800 operations after ransomware attack NHS England revealed today that multiple London hospitals impacted by last week's Synnovis ransomware attack were forced to cancel hundreds of planned operations and appointments. Ransom

BleepingComputer

16.6.24 CISA warns of Windows bug exploited in ransomware attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity Windows vulnerability abused in ransomware attacks as a zero-day to its catalog of actively exploited security bugs. Ransom

BleepingComputer

16.6.24 Former IT employee gets 2.5 years for wiping 180 virtual servers A former quality assurance employee of National Computer Systems (NCS) was sentenced to two years and eight months in prison for reportedly deleting 180 virtual servers after being fired. CyberCrime

BleepingComputer

16.6.24 Microsoft removes Copilot app ‘incorrectly’ added on Windows PCs Microsoft says it removed a Copilot app that was "incorrectly" added to Windows 10 and Windows 11 systems in April due to buggy Microsoft Edge updates. AI

BleepingComputer

16.6.24 Scattered Spider hackers switch focus to cloud apps for data theft The Scattered Spider gang has started to steal data from software-as-a-service (SaaS) applications and establish persistence through creating new virtual machines. Incindent

BleepingComputer

16.6.24 Insurance giant Globe Life investigating web portal breach American financial services holding company Globe Life says attackers may have accessed consumer and policyholder data after breaching one of its web portals. Incindent

BleepingComputer

16.6.24 Microsoft delays Windows Recall amid privacy and security concerns Microsoft is delaying the release of its AI-powered Windows Recall feature to test and secure it further before releasing it in a public preview on Copilot+ PCs. AI

BleepingComputer

15.6.24 Truist Bank confirms breach after stolen data shows up on hacking forum Truist Bank, a leading U.S. commercial bank, confirmed this week that its systems were breached in an October 2023 cyberattack after a threat actor posted some of the company's data for sale on a hacking forum. Incindent

BleepingComputer

15.6.24 Ascension hacked after employee downloaded malicious file Ascension, one of the largest U.S. healthcare systems, revealed that a May 2024 ransomware attack was caused by an employee who downloaded a malicious file onto a company device. Ransom

BleepingComputer

15.6.24 New York Times warns freelancers of GitHub repo data breach The New York Times notified an undisclosed number of contributors that some of their sensitive personal information was stolen and leaked after its GitHub repositories were breached in January 2024. Incindent

BleepingComputer

15.6.24 Toronto District School Board hit by a ransomware attack The Toronto District School Board (TDSB) is warning that it suffered a ransomware attack on its software testing environment and is now investigating whether any personal information was exposed. Ransom

BleepingComputer

15.6.24 Panera warns of employee data breach after March ransomware attack U.S. food chain giant Panera Bread is notifying employees of a data breach after unknown threat actors stole their sensitive personal information in a March ransomware attack. Ransom

BleepingComputer

15.6.24 Exploit for Veeam Recovery Orchestrator auth bypass available, patch now A proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability tracked as CVE-2024-29855 has been released, elevating the risk of being exploited in attacks. Vulnerebility

BleepingComputer

15.6.24 Phishing emails abuse Windows search protocol to push malicious scripts A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on remote servers that deliver malware. Virus

BleepingComputer

15.6.24 AWS adds passkeys support, warns root users must enable MFA Amazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security and usability. Security

BleepingComputer

15.6.24 Google patches exploited Android zero-day on Pixel devices Google has released patches for 50 security vulnerabilities impacting its Pixel devices and warned that one of them had already been exploited in targeted attacks as a zero-day. Exploit

BleepingComputer

15.6.24 Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan Pakistan has become the latest target of a threat actor called the Smishing Triad, marking the first expansion of its footprint beyond Virus

The Hacker News

15.6.24 Microsoft Incident Response tips for managing a mass password reset When an active incident leaves systems vulnerable, a mass password reset may be the right tool to restore security. This post explores the necessity and risk associated with mass password resets. Security blog Microsoft Blog
15.6.24 How to achieve cloud-native endpoint management with Microsoft Intune  In this post, we’re focusing on what it really takes for organizations to become fully cloud-native in endpoint management—from the strategic leadership to the tactical execution. Security blog Microsoft Blog
15.6.24 The four stages of creating a trust fabric with identity and network security  The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. Security blog Microsoft Blog
15.6.24 Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices  Since late 2023, Microsoft has observed an increase in reports of attacks focusing on internet-exposed, poorly secured operational technology (OT) devices. Internet-exposed OT equipment in water and wastewater systems (WWS) in the US were targeted in multiple attacks over the past months by different nation-backed actors, including attacks by IRGC-affiliated “CyberAv3ngers” in November 2023, as […] Hacking blog Microsoft Blog
15.6.24 Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime. Malware blog Trend Micro
15.6.24 Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project. Exploit blog Trend Micro
15.6.24 TargetCompany’s Linux Variant Targets ESXi Environments In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution. Ransom blog Trend Micro
15.6.24 SANS's 2024 Threat-Hunting Survey Review In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. Security blog Trend Micro
15.6.24 It's Time to Up-Level Your EDR Solution You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more. Security blog Trend Micro
15.6.24 Explore AI-Driven Cybersecurity with Trend Micro, Using NVIDIA NIM Discover Trend Micro's integration of NVIDIA NIM to deliver an AI-driven cybersecurity solution for next-generation data centers. Engage with experts, explore demos, and learn strategies for securing AI data centers and optimizing cloud performance. AI blog Trend Micro
15.6.24 The Lifecycle of a Threat: The Inner Workings of the Security Operations Center See how SonicWall’s SOC handles a threat from discovery all the way to resolution in this detailed blog. Security blog SonicWall
15.6.24 Microsoft Security Bulletin Coverage for June 2024 Microsoft’s June 2024 Patch Tuesday has 49 vulnerabilities, 24 of which are Elevation of Privilege. The SonicWall Capture Labs threat research team has analyzed and addressed Microsoft’s security advisories for the month of June 2024 and has produced coverage for seven of the reported vulnerabilities. Vulnerebility blog SonicWall
15.6.24 Decoding Router Vulnerabilities Exploited by Mirai: Insights from SonicWall’s Honeypot Data SonicWall recently identified a significant increase in Mirai honeypot activity. In this deep dive, we explore the evolution of Mirai, who is most at risk and the best ways to mitigate attacks. Exploit blog SonicWall
15.6.24 Critical Path Traversal Vulnerability in Check Point Security Gateways (CVE-2024-24919) The SonicWall Capture Labs threat research team became aware of an exploited-in-the-wild information disclosure vulnerability affecting the Check Point Security Gateways. Identified as CVE-2024-24919 and given a CVSSv3 score of 8.6, the vulnerability is more severe than it initially appears. Vulnerebility blog SonicWall
15.6.24 Driving forward in Android drivers Android's open-source ecosystem has led to an incredible diversity of manufacturers and vendors developing software that runs on a broad variety of hardware. This hardware requires supporting drivers, meaning that many different codebases carry the potential to compromise a significant segment of Android phones OS Blog Project Zero
15.6.24 DarkGate again but... Improved? DarkGate is back, if it ever left, with the latest version, the number 6, which includes new distribution methods, anti-analysis techniques and features. Malware blog Trelix
15.6.24 Operation Celestial Force employs mobile and desktop malware to target Indian entities Cisco Talos is disclosing a new malware campaign called “Operation Celestial Force” running since at least 2018. It is still active today, employing the use of GravityRAT, an Android-based malware, along with a Windows-based malware loader we track as “HeavyLift.” Malware blog Cisco Blog
15.6.24 Only one critical issue disclosed as part of Microsoft Patch Tuesday The lone critical security issue is a remote code execution vulnerability due to a use-after-free issue in the HTTP handling function of Microsoft Message Queuing. Vulnerebility blog Cisco Blog
15.6.24 How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app Malware blog Eset
15.6.24 ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024 The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 APT blog Eset
15.6.24 Arid Viper poisons Android apps with AridSpy ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine OS Blog Eset
15.6.24 560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data Incident blog Eset
15.6.24 Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting Indian government entities in 2024. APT The Hacker News
15.6.24 Meta Pauses AI Training on EU User Data Amid Privacy Concerns Meta on Friday said it's delaying its efforts to train the company's large language models ( LLMs ) using public content shared by adult Social The Hacker News
14.6.24 CISA warns of criminals impersonating its employees in phone calls Today, the Cybersecurity and Infrastructure Security Agency (CISA) warned that criminals are impersonating its employees in phone calls and attempting to deceive potential victims into transferring money. BigBrothers

BleepingComputer

14.6.24 New phishing toolkit uses PWAs to steal login credentials A new phishing kit has been released that allows red teamers and cybercriminals to create progressive web Apps (PWAs) that display convincing corporate login forms to steal credentials. Phishing

BleepingComputer

14.6.24 Life360 says hacker tried to extort them after Tile data breach Safety and location services company Life360 says it was the target of an extortion attempt after a threat actor breached and stole sensitive information from a Tile customer support platform. Incindent

BleepingComputer

14.6.24 Microsoft deprecates Windows DirectAccess, recommends Always On VPN Microsoft has announced that the DirectAccess remote access solution is now deprecated and will be removed in a future release of Windows, recommending companies migrate to the 'Always On VPN' for enhanced security and continued support. OS

BleepingComputer

14.6.24 Police arrest Conti and LockBit ransomware crypter specialist The Ukraine cyber police have arrested a 28-year-old Russian man in Kyiv for working with Conti and LockBit ransomware operations to make their malware undetectable by antivirus software and conducting at least one attack himself. Ransom

BleepingComputer

14.6.24 Black Basta ransomware gang linked to Windows zero-day attacks The Cardinal cybercrime group (Storm-1811, UNC4394), who are the main operators of the Black Basta ransomware, is suspected of exploiting a Windows privilege escalation vulnerability, CVE-2024-26169, before a fix was made available. Ransom

BleepingComputer

14.6.24 New Windows Server KB5039227 and KB5039217 updates fix LSASS crashes Microsoft has released the Windows Server 2022 KB5039227 and Windows Server 2019 KB5039217 cumulative updates with security fixes and fixes for a variety of bugs. OS

BleepingComputer

14.6.24 JetBrains warns of IntelliJ IDE bug exposing GitHub access tokens JetBrains warned customers to patch a critical vulnerability that impacts users of its IntelliJ integrated development environment (IDE) apps and exposes GitHub access tokens. Vulnerebility

BleepingComputer

14.6.24 Windows 11 KB5039212 update released with 37 changes, fixes Microsoft is rolling out the KB5039212 cumulative update for Windows 11 version 23H3 with thirty-seven improvements and changes, including better drag-and-drop support in the File Explorer address bar. OS

BleepingComputer

14.6.24 Windows 10 KB5039211 update released with new feature, 12 fixes Microsoft has released the KB5039211 cumulative update for Windows 10 21H2 and Windows 10 22H2 with 12 changes, including a Snipping Tool feature that allows you to edit Android photos in Windows. OS

BleepingComputer

14.6.24 Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs Today is Microsoft's June 2024 Patch Tuesday, which includes security updates for 51 flaws, eighteen remote code execution flaws, and one publicly disclosed zero-day vulnerability. OS

BleepingComputer

14.6.24 City of Cleveland shuts down IT systems after cyberattack The City of Cleveland, Ohio, is currently dealing with a cyberattack that has forced it to take citizen-facing services offline, including the public offices and facilities at Erieview and the City Hall. Incindent

BleepingComputer

14.6.24 Chinese hackers breached 20,000 FortiGate systems worldwide The Dutch Military Intelligence and Security Service (MIVD) warned today that the impact of a Chinese cyber-espionage campaign unveiled earlier this year is "much larger than previously known." BigBrothers

BleepingComputer

14.6.24 Warmcookie Windows backdoor pushed via fake job offers A Windows malware named 'Warmcookie' is distributed through fake job offer phishing campaigns to breach corporate networks. Virus

BleepingComputer

14.6.24 Google's Privacy Sandbox Accused of User Tracking by Austrian Non-Profit Google's plans to deprecate third-party tracking cookies in its Chrome web browser with Privacy Sandbox has run into fresh trouble Security The Hacker News
14.6.24 ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered two dozen security flaws that Vulnerebility The Hacker News
14.6.24 North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics Threat actors linked to North Korea have accounted for one-third of all the phishing activity targeting Brazil since 2020, as the country's APT The Hacker News
14.6.24 Microsoft Delays AI-Powered Recall Feature for Copilot+ PCs Amid Security Concerns Microsoft on Thursday revealed that it's delaying the rollout of the controversial artificial intelligence (AI)-powered Recall feature for AI The Hacker News
13.6.24 New Attack Technique 'Sleepy Pickle' Targets Machine Learning Models The security risks posed by the Pickle format have once again come to the fore with the discovery of a new "hybrid machine learning (ML) model exploitation technique" dubbed Sleepy Pickle. The attack AI The Hacker News
13.6.24 Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to Virus The Hacker News
13.6.24 Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least Virus The Hacker News
13.6.24 Cybercriminals Employ PhantomLoader to Distribute SSLoad Malware The nascent malware known as SSLoad is being delivered by means of a previously undocumented loader called PhantomLoader, Virus The Hacker News
13.6.24 Ukraine Police Arrest Suspect Linked to LockBit and Conti Ransomware Groups The Cyber Police of Ukraine has announced the arrest of a local man who is suspected to have offered their services to LockBit and Conti Ransom The Hacker News
13.6.24 Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day Google has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a zero-day. The high-severity Exploit The Hacker News
13.6.24 TellYouThePass ransomware exploits recent PHP RCE flaw to breach servers The TellYouThePass ransomware gang has been exploiting the recently patched CVE-2024-4577 remote code execution vulnerability in PHP to deliver webshells and execute the encryptor payload on target systems. Ransom

BleepingComputer

13.6.24 Pure Storage confirms data breach after Snowflake account hack Pure Storage, a leading provider of cloud storage systems and services, confirmed on Monday that attackers breached its Snowflake workspace and gained access to what the company describes as telemetry information Incindent

BleepingComputer

13.6.24 Arm warns of actively exploited flaw in Mali GPU kernel drivers Arm has issued a security bulletin warning of a memory-related vulnerability in Bifrost and Valhall GPU kernel drivers that is being exploited in the wild. Exploit

BleepingComputer

13.6.24 Gitloker attacks abuse GitHub notifications to push malicious OAuth apps Threat actors impersonate GitHub's security and recruitment teams in phishing attacks to hijack repositories using malicious OAuth apps in an ongoing extortion campaign wiping compromised repos. Virus

BleepingComputer

13.6.24 Apple enters AI arms race with new Apple Intelligence feature Apple unveiled its new 'Apple Intelligence' feature today at its 2024 Worldwide Developer Conference, finally unveiling its generative AI strategy that will power new personalized experiences on Apple devices. AI

BleepingComputer

13.6.24 Netgear WNR614 flaws allow device takeover, no fix available Researchers found half a dozen vulnerabilities of varying severity impacting Netgear WNR614 N300, a budget-friendly router that proved popular among home users and small businesses. Vulnerebility

BleepingComputer

13.6.24 Cylance confirms data breach linked to 'third-party' platform Cybersecurity company Cylance confirmed the legitimacy of data being sold on a hacking forum, stating that it is old data stolen from a "third-party platform." Incindent

BleepingComputer

13.6.24 London hospitals face blood shortage after Synnovis ransomware attack England's NHS Blood and Transplant (NHSBT) has issued an urgent call to O Positive and O Negative blood donors to book appointments and donate after last week's cyberattack on pathology provider Synnovis impacted multiple hospitals in London. Ransom

BleepingComputer

13.6.24 Exploit for critical Veeam auth bypass available, patch now A proof-of-concept (PoC) exploit for a Veeam Backup Enterprise Manager authentication bypass flaw tracked as CVE-2024-29849 is now publicly available, making it urgent that admins apply the latest security updates. Vulnerebility

BleepingComputer

13.6.24 23andMe data breach under investigation in UK and Canada Privacy authorities in Canada and the United Kingdom have launched a joint investigation to assess the scope of sensitive customer information exposed in last year's 23andMe data breach. Incindent

BleepingComputer

13.6.24 Malicious VSCode extensions with millions of installs discovered A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to "infect" over 100 organizations by trojanizing a copy of the popular 'Dracula Official theme to include risky code. Further research into the VSCode Marketplace found thousands of extensions with millions of installs. Virus BleepingComputer
13.6.24 New Cross-Platform Malware 'Noodle RAT' Targets Windows and Linux Systems A previously undocumented cross-platform malware codenamed Noodle RAT has been put to use by Chinese-speaking threat actors Virus The Hacker News
13.6.24 Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero Cryptocurrency The Hacker News
13.6.24 Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed privilege escalation flaw in the Ransom The Hacker News
13.6.24 New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers Cybersecurity researchers have disclosed details of an ongoing phishing campaign that leverages recruiting- and job-themed lures to Phishing The Hacker News
13.6.24 China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally State-sponsored threat actors backed by China gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known APT The Hacker News
12.6.24 Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability Microsoft has released security updates to address 51 flaws as part of its Patch Tuesday updates for June 2024. Of the 51 vulnerabilities, Vulnerebility The Hacker News
12.6.24 Chinese Actor SecShow Conducts Massive DNS Probing on Global Scale Cybersecurity researchers have shed more light on a Chinese actor codenamed SecShow that has been observed conducting Domain APT The Hacker News
12.6.24 Apple Launches Private Cloud Compute for Privacy-Centric AI Processing Apple has announced the launch of a "groundbreaking cloud intelligence system" called Private Cloud Compute (PCC) that's AI The Hacker News
12.6.24 China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics Cybersecurity researchers have uncovered an updated version of malware called ValleyRAT that's being distributed as part of a new Virus The Hacker News
11.6.24 Snowflake Breach Exposes 165 Customers' Data in Ongoing Extortion Campaign As many as 165 customers of Snowflake are said to have had their information potentially exposed as part of an ongoing campaign Incindent The Hacker News
11.6.24 Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild. Tracked as Exploit The Hacker News
11.6.24 More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, Phishing The Hacker News
11.6.24 Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia Google has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation BigBrothers The Hacker News
10.6.24 Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to cyber attacks Virus The Hacker News
9.6.24 New PHP Vulnerability Exposes Windows Servers to Remote Code Execution Details have emerged about a new critical security flaw impacting PHP that could be exploited to achieve remote code execution under Exploit The Hacker News
9.6.24 New York Times source code stolen using exposed GitHub token Internal source code and data belonging to The New York Times was leaked on the 4chan message board after being stolen from the company's GitHub repositories in January 2024, The Times confirmed to BleepingComputer. Incindent

BleepingComputer

9.6.24 DDoS attacks target EU political parties as elections begin Hacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according to a report by Cloudflare. BigBrothers

BleepingComputer

9.6.24 LastPass says 12-hour outage caused by bad Chrome extension update LastPass says its almost 12-hour outage yesterday was caused by a bad update to its Google Chrome extension. Security

BleepingComputer

9.6.24 Apple to unveil new 'Passwords' password manager app for iPhones, Macs Apple will reportedly unveil a standalone password manager named 'Passwords' as part of iOS 18, iPadOS 18, and macOS 15 during the upcoming Apple Worldwide Developers Conference. OS

BleepingComputer

9.6.24 Christie's starts notifying clients of RansomHub data breach British auction house Christie's is notifying individuals whose data was stolen by the RansomHub ransomware gang in a recent network breach. Ransom

BleepingComputer

9.6.24 Frontier warns 750,000 of a data breach after extortion threats Frontier Communications is warning 750,000 customers that their information was exposed in a data breach after an April cyberattack claimed by the RansomHub ransomware operation. Incindent

BleepingComputer

9.6.24 Microsoft makes Windows Recall opt-in, secures data with Windows Hello Following massive customer pushback after it announced the new AI-powered Recall for Copilot+ PCs last month, Microsoft says it will update the feature to be more secure and require customers to opt in to enable it. OS

BleepingComputer

9.6.24 PHP fixes critical RCE flaw impacting all versions for Windows A new PHP for Windows remote code execution (RCE) vulnerability has been disclosed, impacting all releases since version 5.x, potentially impacting a massive number of servers worldwide. Vulnerebility

BleepingComputer

9.6.24 Los Angeles Unified School District investigates data theft claims Los Angeles Unified School District (LAUSD) officials are investigating a threat actor's claims that they're selling stolen databases containing records belonging to millions of students and thousands of teachers. CyberCrime

BleepingComputer

9.6.24 Hackers exploit 2018 ThinkPHP flaws to install ‘Dama’ web shells Chinese threat actors are targeting ThinkPHP applications vulnerable to CVE-2018-20062 and CVE-2019-9082 to install a persistent web shell named Dama. Vulnerebility

BleepingComputer

9.6.24 Ukraine says hackers abuse SyncThing tool to steal data The Computer Emergency Response Team of Ukraine (CERT-UA) reports about a new campaign dubbed "SickSync," launched by the UAC-0020 (Vermin) hacking group in attacks on the Ukrainian defense forces. BigBrothers

BleepingComputer

9.6.24 New Fog ransomware targets US education sector via breached VPNs A new ransomware operation named 'Fog' launched in early May 2024, is using compromised VPN credentials to breach the networks of educational organizations in the U.S. Ransom

BleepingComputer

9.6.24 New Gitloker attacks wipe GitHub repos in extortion scheme Attackers are targeting GitHub repositories, wiping their contents, and asking the victims to reach out on Telegram for more information. Hack

BleepingComputer

9.6.24 PandaBuy pays ransom to hacker only to get extorted again Chinese shopping platform Pandabuy told BleepingComputer it previously paid a a ransom demand to prevent stolen data from being leaked, only for the same threat actor to extort the company again this week. Ransom

BleepingComputer

9.6.24 Linux version of TargetCompany ransomware focuses on VMware ESXi Researchers observed a new Linux variant of the TargetCompany ransomware family that targets VMware ESXi environments using a custom shell script to deliver and execute payloads. Ransom BleepingComputer
8.6.24 Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks Cybercriminals and Advanced Persistent Threat (APT) actors share a common interest in proxy anonymization layers and Virtual Private Network (VPN) nodes to hide traces of their presence and make detection of malicious activities more difficult. This shared interest results in malicious internet traffic blending financial and espionage motives. APT blog Trend Micro
8.6.24 INC Ransomware Behind Linux Threat This week, the SonicWall Capture Labs Research team analyzed a sample of Linux ransomware. The group behind this ransomware, called INC Ransomware, has been active since it was first reported a year ago. Ransom blog SonicWall
8.6.24 Critical Path Traversal Vulnerability in Check Point Security Gateways (CVE-2024-24919) The SonicWall Capture Labs threat research team became aware of an exploited-in-the-wild information disclosure vulnerability affecting the Check Point Security Gateways. Identified as CVE-2024-24919 and given a CVSSv3 score of 8.6, the vulnerability is more severe than it initially appears Vulnerebility blog SonicWall
8.6.24 Decoding Router Vulnerabilities Exploited by Mirai: Insights from SonicWall’s Honeypot Data SonicWall recently identified a significant increase in Mirai honeypot activity. In this deep dive, we explore the evolution of Mirai, who is most at risk and the best ways to mitigate attacks. BotNet blog SonicWall
8.6.24 INSIDE THE BOX: MALWARE’S NEW PLAYGROUND Over the past few months, we have been monitoring the increasing abuse of BoxedApp products in the wild. BoxedApp products are commercial packers that provide advanced features such as Virtual Storage (Virtual File System, Virtual Registry), Virtual Processes, and a universal instrumentation system (WIN/NT API hooking). Hacking blog Checkpoint
8.6.24 The job hunter’s guide: Separating genuine offers from scams $90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into giving up their data. Spam blog Eset
8.6.24 The murky world of password leaks – and how to check if you’ve been hit Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look Incident blog Eset
8.6.24 What happens when facial recognition gets it wrong – Week in security with Tony Anscombe A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability Security blog Eset
8.6.24 FBI recovers 7,000 LockBit keys, urges ransomware victims to reach out The FBI urges past victims of LockBit ransomware attacks to come forward after revealing that it has obtained over 7,000 LockBit decryption keys that they can use to recover encrypted data for free. Ransom

BleepingComputer

8.6.24 Google Chrome reduced cookie requests to improve performance Google shared details on a recently introduced Chrome feature that changes how cookies are requested, with early tests showing increased performance across all platforms. Security

BleepingComputer

8.6.24 Advance Auto Parts stolen data for sale after Snowflake attack Threat actors claim to be selling 3TB of data from Advance Auto Parts, a leading automotive aftermarket parts provider, stolen after breaching the company's Snowflake account. Incindent

BleepingComputer

8.6.24 Check-in terminals used by thousands of hotels leak guest info Ariane Systems self check-in systems installed at thousands of hotels worldwide are vulnerable to a kiosk mode bypass flaw that could allow access to guests' personal information and the keys for other rooms. Incindent

BleepingComputer

8.6.24 Club Penguin fans breached Disney Confluence server, stole 2.5GB of data Club Penguin fans hacked a Disney Confluence server to steal information about their favorite game but wound up walking away with 2.5 GB of internal corporate data, BleepingComputer has learned. Incindent

BleepingComputer

8.6.24 Chinese hacking groups team up in cyber espionage campaign Chinese state-sponsored actors have been targeting a government agency since at least March 2023 in a cyberespionage campaign that researchers track as Crimson Palace APT

BleepingComputer

8.6.24 Qilin ransomware gang linked to attack on London hospitals A ransomware attack that hit pathology services provider Synnovis on Monday and impacted several major NHS hospitals in London has now been linked to the Qilin ransomware operation. Ransom

BleepingComputer

8.6.24 Kali Linux 2024.2 released with 18 new tools, Y2038 changes Kali Linux has released version 2024.2, the first version of 2024, with eighteen new tools and fixes for the Y2038 bug. OS

BleepingComputer

8.6.24 RansomHub extortion gang linked to now-defunct Knight ransomware Security researchers analyzing the relatively new RansomHub ransomware-as-a-service believe that it has evolved from the currently defunct Knight ransomware project. Ransom

BleepingComputer

8.6.24 Australian mining company discloses breach after BianLian leaks data Northern Minerals issued an announcement earlier today warning that it suffered a cybersecurity breach resulting in some of its stolen data being published on the dark web. Cryptocurrency

BleepingComputer

8.6.24 TikTok fixes zero-day bug used to hijack high-profile accounts Over the past week, attackers have hijacked high-profile TikTok accounts belonging to multiple companies and celebrities, exploiting a zero-day vulnerability in the social media's direct messages feature. Vulnerebility

BleepingComputer

8.6.24 FBI warns of fake remote work ads used for cryptocurrency fraud Today, the FBI issued a warning about scammers using fake remote job ads to steal cryptocurrency from job seekers across the United States while posing as recruiters for legitimate companies. Cryptocurrency

BleepingComputer

8.6.24 ARRL says it was hacked by an "international cyber group" American Radio Relay League (ARRL) has shared more information about a May cyberattack that took its Logbook of the World offline and caused some members to become frustrated over the lack of information. Hack

BleepingComputer

8.6.24 Microsoft announces first Windows 10 Beta build since 2021 Microsoft has reopened the Windows 10 beta channel and is asking Insiders to join or switch to receive a new beta build in the coming weeks. OS

BleepingComputer

8.6.24 New V3B phishing kit targets customers of 54 European banks Cybercriminals are promoting a new phishing kit named 'V3B' on Telegram, which currently targets customers of 54 major financial institutes in Ireland, the Netherlands, Finland, Austria, Germany, France, Belgium, Greece, Luxembourg, and Italy. Phishing

BleepingComputer

8.6.24 Zyxel issues emergency RCE patch for end-of-life NAS devices Zyxel Networks has released an emergency security update to address three critical vulnerabilities impacting older NAS devices that have reached end-of-life. Vulnerebility

BleepingComputer

8.6.24 Major London hospitals disrupted by Synnovis ransomware attack A ransomware attack affecting pathology and diagnostic services provider Synnovis has impacted healthcare services at multiple major NHS hospitals in London. Ransom

BleepingComputer

8.6.24 Microsoft deprecates Windows NTLM authentication protocol Microsoft has officially deprecated NTLM authentication on Windows and Windows servers, stating that developers should transition to Kerberos or Negotiation authentication to prevent problems in the future. Security

BleepingComputer

8.6.24 Collection agency FBCS ups data breach tally to 3.2 million people Debt collection agency Financial Business and Consumer Solutions (FBCS) now says over 3.2 million people have been impacted by a data breach that occurred in February. Incindent

BleepingComputer

8.6.24 Data firm execs convicted for helping fraudsters target the elderly A former senior executive and former sales manager of Epsilon Data Management LLC (Epsilon) were convicted of selling data of millions of Americans to perpetrators of mail fraud schemes. Incindent

BleepingComputer

8.6.24 Microsoft India’s X account hijacked in Roaring Kitty crypto scam The official Microsoft India account on Twitter, with over 211,000 followers, was hijacked by cryptocurrency scammers to impersonate Roaring Kitty, the handle used by notorious meme stock trader Keith Gill. Social

BleepingComputer

8.6.24 Cox fixed an API auth bypass exposing millions of modems to attacks ​Cox Communications has fixed an authorization bypass vulnerability that enabled remote attackers to abuse exposed backend APIs to reset millions of modems' settings and steal customers' sensitive personal information. Vulnerebility

BleepingComputer

8.6.24 361 million stolen accounts leaked on Telegram added to HIBP A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check if their accounts have been compromised. Incindent

BleepingComputer

8.6.24 Azure Service Tags tagged as security risk, Microsoft disagrees ​Security researchers at Tenable discovered what they describe as a high-severity vulnerability in Azure Service Tags that could allow attackers to access customers' private data. Vulnerebility

BleepingComputer

8.6.24 Exploit for critical Progress Telerik auth bypass released, patch now Researchers have published a proof-of-concept (PoC) exploit script demonstrating a chained remote code execution (RCE) vulnerability on Progress Telerik Report Servers. Vulnerebility

BleepingComputer

8.6.24 LightSpy Spyware's macOS Variant Found with Advanced Surveillance Capabilities Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a previously Virus The Hacker News

7.6.24

FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims The U.S. Federal Bureau of Investigation (FBI) has disclosed that it's in possession of more than 7,000 decryption keys associated with Ransom The Hacker News

7.6.24

SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with Virus

The Hacker News

7.6.24

Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly Cryptocurrency

The Hacker News

7.6.24

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting BotNet

The Hacker News

6.6.24

Hackers Exploit Legitimate Packer Software to Spread Malware Undetected Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection and Exploit

The Hacker News

6.6.24

Google Maps Timeline Data to be Stored Locally on Your Device for Privacy Google has announced plans to store Maps Timeline data locally on users' devices instead of their Google account effective December 1, Security

The Hacker News

6.6.24

Hackers Target Python Developers with Fake "Crytic-Compilers" Package on PyPI Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository Hack

The Hacker News

5.6.24

Chinese State-Backed Cyber Espionage Targets Southeast Asian Government

An unnamed high-profile government organization in Southeast Asia emerged as the target of a "complex, long-running" Chinese state-

BigBrothers

The Hacker News

5.6.24

Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight

Ransom

The Hacker News

5.6.24

Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models

Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices that

Vulnerebility

The Hacker News

5.6.24

Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs

Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-

Social

The Hacker News

5.6.24

Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan

Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called

BigBrothers

The Hacker News

5.6.24

Telerik Report Server Flaw Could Let Attackers Create Rogue Admin Accounts

Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server that could be

Vulnerebility

The Hacker News

5.6.24

Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine

A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy Cobalt Strike

Virus

The Hacker News

5.6.24

Snowflake Warns: Targeted Credential Theft Campaign Hits Cloud Customers

Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out as part of a targeted

Hack

The Hacker News

5.6.24

DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey

Virus

The Hacker News

5.6.24

Oracle WebLogic Server OS Command Injection Flaw Under Active Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Oracle WebLogic

BigBrothers

The Hacker News

5.6.24

4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets

You're probably familiar with the term "critical assets". These are the technology assets within your company's IT infrastructure that are

Security

The Hacker News

5.6.24

Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users

Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to

Virus

The Hacker News

3.6.24

IT threat evolution in Q1 2024. Mobile statistics

Mobile malware statistics for Q1 2024: most common threats for Android, mobile banking Trojans, and ransomware Trojans.

Virus

Securelist

3.6.24

IT threat evolution Q1 2024

Last June, we published a series of reports on Operation Triangulation, a previously unknown iOS malware platform distributed via zero-click iMessage exploits that allowed an attacker to browse and modify device files, get passwords and credentials stored in the keychain..

Virus

Securelist

3.6.24

IT threat evolution in Q1 2024. Non-mobile statistics

Kaspersky solutions blocked more than 658 million attacks from various online resources.

Virus

Securelist

3.6.24

AI platform Hugging Face says hackers stole auth tokens from Spaces

AI platform Hugging Face says that its Spaces platform was breached, allowing hackers to access authentication secrets for its members.

AI

BleepingComputer

3.6.24

Police dismantle pirated TV streaming network that made $5.7 million

Spanish police have dismantled a network of illegal media content distribution that, since the start of its operations in 2015, has made over $5,700,000.

BigBrothers

BleepingComputer

3.6.24

Kaspersky releases free tool that scans Linux for known threats

Kaspersky has released a new virus removal tool named KVRT for the Linux platform, allowing users to scan their systems and remove malware and other known threats for free.

Security

BleepingComputer

3.6.24

Google Chrome change that weakens ad blockers begins June 3rd

Google is continuing with its plan to phase out Manifest V2 extensions in Chrome starting in early June 2024, weakening the abilities of ad blockers.

Security

BleepingComputer

3.6.24

Ticketmaster confirms massive breach after stolen data for sale online

Live Nation has confirmed that Ticketmaster suffered a data breach after its data was stolen from a third-party cloud database provider, which is believed to be Snowflake.

Incindent

BleepingComputer

3.6.24

DMM Bitcoin warns that hackers stole $300 million in Bitcoin

Japanese bitcoin exchange DMM Bitcoin is warning that 4,502.9 Bitcoin (BTC), or approximately $308 million (48.2 billion yen), has been stolen from one of its wallets today, making it the most significant cryptocurrency heist of 2024.

Cryptocurrency

BleepingComputer

3.6.24

CISA warns of actively exploited Linux privilege elevation flaw

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added two vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, including a Linux kernel privilege elevation flaw.

BigBrothers

BleepingComputer

3.6.24

Snowflake account hacks linked to Santander, Ticketmaster breaches

A threat actor claiming recent Santander and Ticketmaster breaches says they stole data after hacking into an employee's account at cloud storage company Snowflake. However, Snowflake disputes these claims, saying recent breaches were caused by poorly secured customer accounts.

Incindent

BleepingComputer

3.6.24

Snowflake account hacks linked to Santander, Ticketmaster breaches

Europol and German law enforcement have revealed the identities of eight cybercriminals linked to the various malware droppers and loaders disrupted as part of the Operation Endgame law enforcement operation.

BigBrothers

BleepingComputer

3.6.24

Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions

Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain unauthorized

Vulnerebility

The Hacker News

3.6.24

Andariel Hackers Target South Korean Institutes with New Dora RAT Malware

The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora RAT in its

Virus

The Hacker News

3.6.24

Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware

Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and

Virus

The Hacker News

3.6.24

AI Company Hugging Face Detects Unauthorized Access to Its Spaces Platform

Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier

AI

The Hacker News

1.6.24

STATIC UNPACKING FOR THE WIDESPREAD NSIS-BASED MALICIOUS PACKER FAMILY

Packers or crypters are widely used to protect malicious software from detection and static analysis.

Malware blog

Checkpoint

1.6.24

LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader

Cisco Talos is disclosing a new suspected data theft campaign, active since at least 2021, we attribute to an advanced persistent threat actor (APT) we’re calling “LilacSquid.” Multiple TTPs utilized in this campaign bear some overlap with North Korean APT groups.

APT blog

Cisco Blog

1.6.24

Out-of-bounds reads in Adobe Acrobat; Foxit PDF Reader contains vulnerability that could lead to SYSTEM-level privileges

Acrobat, one of the most popular PDF readers currently available, contains two out-of-bounds read vulnerabilities that could lead to the exposure of sensitive contents of arbitrary memory in the application.

Vulnerebility blog

Cisco Blog

1.6.24

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?

AI blog

Eset

1.6.24

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

AI blog

Eset

1.6.24

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

Cyber blog

Eset

1.6.24

Europol identifies 8 cybercriminals tied to malware loader botnets Europol and German law enforcement have revealed the identities of eight cybercriminals linked to the various malware droppers and loaders disrupted as part of the Operation Endgame law enforcement operation. BigBrothers

BleepingComputer

1.6.24

ShinyHunters claims Santander breach, selling data for 30M customers A threat actor known as ShinyHunters is claiming to be selling a massive trove of Santander Bank data, including information for 30 million customers, employees, and bank account data, two weeks after the bank reported a data breach. Incindent

BleepingComputer

1.6.24

Microsoft: Windows 11 preview update causes taskbar crashes Microsoft warned customers on Thursday that the May 2024 non-security preview update for Windows 11 is causing taskbar crashes and glitches. OS

BleepingComputer

1.6.24

Pirated Microsoft Office delivers malware cocktail on systems Cybercriminals are distributing a malware cocktail through cracked versions of Microsoft Office promoted on torrent sites. Virus

BleepingComputer

1.6.24

Data of 560 million Ticketmaster customers for sale after alleged breach A threat actor known as ShinyHunters is selling what they claim is the personal and financial information of 560 million Ticketmaster customers on the recently revived BreachForums hacking forum for $500,000. Incindent

BleepingComputer

1.6.24

Malware botnet bricked 600,000 routers in mysterious 2023 attack A malware botnet named 'Pumpkin Eclipse' performed a mysterious destructive event in 2023 that took 600,000 office/home office (SOHO) internet routers offline, according to a new report by researchers at Lumen's Black Lotus Labs. BotNet

BleepingComputer

1.6.24

Everbridge warns of corporate systems breach exposing business data Everbridge, an American software company focused on crisis management and public warning solutions, notified customers that unknown attackers had accessed files containing business and user data in a recent corporate systems breach. Incindent

BleepingComputer

1.6.24

Cooler Master confirms customer info stolen in data breach Computer hardware manufacturer Cooler Master has confirmed that it suffered a data breach on May 19, allowing a threat actor to steal customer data. Incindent

BleepingComputer

1.6.24

BBC suffers data breach impacting current, former employees The BBC has disclosed a data security incident that occurred on May 21, involving unauthorized access to files hosted on a cloud-based service, compromising the personal information of BBC Pension Scheme members. Incindent

BleepingComputer

1.6.24

macOS version of elusive 'LightSpy' spyware tool discovered A macOS version of the LightSpy surveillance framework has been discovered, confirming the extensive reach of a tool only previously known for targeting Android and iOS devices. OS

BleepingComputer

1.6.24

Police seize over 100 malware loader servers, arrest four cybercriminals An international law enforcement operation codenamed 'Operation Endgame' has seized over 100 servers worldwide used by multiple major malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. BigBrothers

BleepingComputer

1.6.24

Cybercriminals pose as "helpful" Stack Overflow users to push malware Cybercriminals are abusing Stack Overflow in an interesting approach to spreading malware—answering users' questions by promoting a malicious PyPi package that installs Windows information-stealing malware. Hack

BleepingComputer

1.6.24

Windows 11 KB5037853 update fixes File Explorer issues, 20 bugs Microsoft has released the May 2024 non-security preview update for Windows 11 versions 22H2 and 23H2, which includes 32 fixes and changes. OS

BleepingComputer

1.6.24

Windows 10 KB5037849 update released with 9 changes or fixes Microsoft has released the optional KB5037849 Preview cumulative update for Windows 10 22H2 with nine fixes or changes. OS

BleepingComputer

1.6.24

Cooler Master hit by data breach exposing customer information Computer hardware manufacturer Cooler Master has suffered a data breach after a threat actor breached the company's website and claimed to steal the Fanzone member information of 500,000 customers. Incindent

BleepingComputer

1.6.24

Check Point VPN zero-day exploited in attacks since April 30 Threat actors have been exploiting a high-severity Check Point Remote Access VPN zero-day since at least April 30, stealing Active Directory data needed to move laterally through the victims' networks in successful attacks. Exploit

BleepingComputer

1.6.24

Free Piano phish targets American university students, staff A large-scale phishing campaign is using an unusual lure to earn at least $900,000 by tricking email recipients into believing they're about to receive a baby grand piano for free. Phishing

BleepingComputer

1.6.24

US dismantles 911 S5 botnet used for cyberattacks, arrests admin The U.S. Justice Department and international partners dismantled the 911 S5 proxy botnet and arrested 35-year-old Chinese national YunHe Wang, its administrator, in Singapore. BotNet

BleepingComputer

1.6.24

Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S. More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a Hack The Hacker News

1.6.24

Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late 2023. "These Hack The Hacker News