Today's cybersecurity headlines are brought to you by ThreatPerspective


Biz & IT Ars Technica

Law enforcement operation takes down 22,000 malicious IP addresses worldwide

Operation Synergia II took aim at phishing, ransomware, and information stealing. An international coalition of police agencies has taken a major whack at criminals accused of running a host of online scams, inc

Published: 2024-11-07T23:12:23



Biz & IT Ars Technica

Thousands of hacked TP-Link routers used in yearslong account takeover attacks

The botnet is being skillfully used to launch "highly evasive" password-spraying attacks. Hackers working on behalf of the Chinese government are using a botnet of thousands of routers, cameras, and other Intern

Published: 2024-11-02T00:13:20



The Register - Software

Thanks, Linus. Torvalds patch improves Linux performance by 2.6%

21 lines that show the big man still has what it takes A relatively tiny code change by penguin premier Linus Torvalds is making a measurable improvement to Linux's multithreaded performance.

Published: 2024-11-06T17:32:07



The Register - Software

Google claims Big Sleep 'first' AI to spot freshly committed security bug that fuzzing missed

You snooze, you lose, er, win Google claims one of its AI models is the first of its kind to spot a memory safety vulnerability in the wild specifically an exploitable stack buffer underflow in SQLite which was then fixed before the buggy code's

Published: 2024-11-05T06:38:13



The Register - Software

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw There's a Windows Themes spoofing zero-day bug on the loose that allows attackers to steal people's NTLM credentials.

Published: 2024-10-30T21:30:06



The Register - Software

Cast a hex on ChatGPT to trick the AI into writing exploit code

'It was like watching a robot going rogue' says researcher OpenAI's language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an attacker to jump the model's built-in security g

Published: 2024-10-29T22:30:07



The Verge - Securities

A new iOS 18 security feature makes it harder for police to unlock iPhones

Photo collage of a phone with a combination lock and keyhole over the screen. There is an apparently new iOS 18 security feature that reboots iPhones that haven’t been unlocked in a few days, frustrating police by making it harder to break into suspects’ iPhones, according to 404 Media. 404 Media, which first report...

Published: 2024-11-09T11:49:47



The Verge - Securities

The FBI says Russian emails are sending fake bomb threats to polling stations

The FBI symbol atop a red, black and white background made of seven pointed stars. The Federal Bureau of Investigation has issued a warning that fake bomb threats are being emailed to US polling locations in multiple states that “appear to originate from Russian email domains.” “None of the threats have been determined to...

Published: 2024-11-05T15:14:02



The Verge - Securities

Hacker suspected in massive Ticketmaster, AT&T breaches arrested in Canada

Authorities in Canada have arrested a man suspected of stealing information from around 165 companies using Snowflake’s cloud storage services, as reported earlier by Bloomberg and 404 Media. In a statement to The Verge, Canada Department o...

Published: 2024-11-05T09:15:28



The Verge - Securities

Valorant is winning the war against PC gaming cheaters

 Riot has also developed methods to detect this new form of hardware-level DMA cheating thanks to Peterson. His invention essentially blocks reads to internal memory by suspicious devices. I recently ran into an issue with this DMA protection...

Published: 2024-11-04T10:00:00



The Verge - Securities

An Okta login bug bypassed checking passwords on some long usernames

Illustration of a password above an open combination lock, implying a data breach. On Friday evening, Okta posted an odd update to its list of security advisories. The latest entry reveals that under specific circumstances, someone could’ve logged in by entering anything for a password, but only if the account’s username ...

Published: 2024-11-01T22:00:13



BleepingComputer

Malicious PyPI package with 37,000 downloads steals AWS keys

A malicious Python package named 'fabrice' has been present in the Python Package Index (PyPI) since 2021, stealing Amazon Web Services credentials from unsuspecting developers. [...]

Published: 2024-11-09T10:17:27



BleepingComputer

Critical Veeam RCE bug now used in Frag ransomware attacks

After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also recently exploited to deploy Frag ransomware. [...]

Published: 2024-11-08T15:23:10



BleepingComputer

Unpatched Mazda Connect bugs let hackers install persistent malware

Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission. [...]

Published: 2024-11-08T12:48:19



BleepingComputer

Palo Alto Networks warns of potential PAN-OS RCE vulnerability

Palo Alto Networks warned customers to restrict access to their next-generation firewalls because of a potential remote code execution vulnerability in the PAN-OS management interface. [...]

Published: 2024-11-08T12:42:24



BleepingComputer

North Korean hackers use new macOS malware against crypto firms

North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. [...]

Published: 2024-11-07T17:15:24



BleepingComputer

CISA warns of critical Palo Alto Networks bug exploited in attacks

Today, CISA warned that attackers are exploiting a critical missing authentication vulnerability in Palo Alto Networks Expedition, a migration tool that can help convert firewall configuration from Checkpoint, Cisco, and other vendors to PAN-OS. [..

Published: 2024-11-07T14:03:26



Threat Intelligence

Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives

Error message displayed if the user doesn’t grant REQUEST_INSTALL_PACKAGES permission In September 2024, Google Threat Intelligence Group (consisting of Google’s Threat Analysis Group (TAG) and Mandiant) discovered UNC5812, a suspected Russian hybrid espionage and influence operation, delivering Windows and Android malware using a Tel...

Published: 2024-10-28T13:00:00



ProPublica

Exploiting Meta’s Weaknesses, Deceptive Political Ads Thrived on Facebook and Instagram in Run-Up to Election

by Craig Silverman, ProPublica, and Priyanjana Bengani, Tow Center for Digital Journalism

Published: 2024-10-31T05:00:00



Krebs on Security

FBI: Spike in Hacked Police Emails, Fake Subpoenas

The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthor...

Published: 2024-11-09T19:20:26



Krebs on Security

Canadian Man Arrested in Snowflake Data Extortions

A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake. On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of Kitchener, Ontario, on a provisional arrest warrant from the United States. Bloomberg first reported Moucka's alleged ties to the Snowflake hacks on Monday. At the end of 2023, malicious hackers learned that many large companies had uploaded huge volumes of sensitive customer data to Snowflake accounts that were protected with little more than a username and password (no multi-factor authentication required). After scouring darknet markets for stolen Snowflake account credentials, the hackers began raiding the data storage repositories used by some of the world’s largest corporations. A 25-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake. Image: https://www.pomerium.com/blog/the-real-lessons-from-the-snowflake-breach ...

Published: 2024-11-05T17:10:04



Krebs on Security

Booking.com Phishers May Leave You With Reservations

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We̵...

Published: 2024-11-01T21:12:38



Krebs on Security

Change Healthcare Breach Hits 100M Americans

Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected hea...

Published: 2024-10-30T13:34:08



The Register - Security

Scattered Spider, BlackCat claw their way back from criminal underground

We all know by now that monsters never die, right? Two high-profile criminal gangs, Scattered Spider and BlackCat/ALPHV, seemed to disappear into the darkness like their namesakes following a series of splashy digital heists last year, after which there were arrests and website seizures.

Published: 2024-11-08T14:57:14



The Register - Security

Winos4.0 abuses gaming apps to infect, control Windows machines

'Multiple' malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.

Published: 2024-11-08T02:30:07



The Register - Security

Don't open that 'copyright infringement' email attachment it's an infostealer

Curiosity gives crims access to wallets and passwords Organizations should be on the lookout for bogus copyright infringement emails as they might be the latest ploy by cybercriminals to steal their data.

Published: 2024-11-07T22:18:15



The Register - Security

Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

Ultra-Reliable Wireless Backhaul doesn't live up to its name Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert.

Published: 2024-11-07T11:48:53



The Register - Security

Officials warn of Russia's tech-for-troops deal with North Korea amid Ukraine conflict

10,000 of Kim Jong Un's soldiers believed to be headed for front line The EU has joined US and South Korean officials in expressing concern over a Russian transfer of technology to North Korea in return for military assistance against Ukraine.

Published: 2024-11-07T02:30:14



The Register - Security

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

In case today's news cycle wasn't shocking enough, here's a gem from Sophos Fresh from a series of serious reports detailing its five-year battle with Chinese cyberattackers, Sophos has dropped a curious story about users of a popular infostealer-cum-RAT targeting a niche group of victims.

Published: 2024-11-06T21:47:06



The Register - Security

Operation Synergia II sees Interpol swoop on global cyber crims

22,000 IP addresses taken down, 59 servers seized, 41 arrests in 95 countries Interpol is reporting a big win after a massive combined operation against online criminals made 41 arrests and seized hardware thought to be used for nefarious purposes.

Published: 2024-11-06T15:25:10



The Register - Security

Cyberattackers stole Microlise staff data following DHL, Serco disruption

Experts say incident has 'all the hallmarks of ransomware' Telematics tech biz Microlise says an attack that hit its network likely did not expose customer data, although staff aren't so lucky.

Published: 2024-11-06T12:06:28



The Register - Security

China's Volt Typhoon reportedly breached Singtel in 'test-run' for US telecom attacks

Alleged intrusion spotted in June updated Chinese government cyberspies Volt Typhoon reportedly breached Singapore Telecommunications over the summer as part of their ongoing attacks against critical infrastructure operators.

Published: 2024-11-06T02:30:06



The Register - Security

Scumbag puts 'stolen' Nokia source code, SSH and RSA keys, more up for sale

Data pinched from pwned outside supplier, thief claims IntelBroker, a notorious peddler of stolen data, claims to have pilfered source code, private keys, and other sensitive materials belonging to Nokia.

Published: 2024-11-06T00:01:45



The Register - Security

Schneider Electric ransomware crew demands $125k paid in baguettes

Hellcat crew claimed to have gained access via the company's Atlassian Jira system Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data and demanded the French multinational energy management company pay $125,000 in baguettes or else see its sensitive customer and operational information leaked.

Published: 2024-11-05T21:51:00



The Register - Security

A Kansas pig butchering: CEO who defrauded bank, church, friends gets 24 years

FBI recovers just $8M after scam crashes Heartland Tri-State Bank The FBI has recovered $8 million in funds from a cryptocurrency scam that netted $47 million and devastated the Kansas city of Elkhart.

Published: 2024-11-05T20:30:10



The Register - Security

Criminals open DocuSign's Envelope API to make BEC special delivery

Why? Because that's where the money is Business email compromise scammers are trying to up their success rate by using a DocuSign API.

Published: 2024-11-05T18:34:13



The Register - Security

Ongoing typosquatting campaign impersonates hundreds of popular npm packages

Puppeteer or Pupeter? One of them will snoop around on your machine and steal your credentials An ongoing typosquatting campaign is targeting developers via hundreds of popular JavaScript libraries, whose weekly downloads number in the tens of millions, to infect systems with info-stealing and snooping malware.

Published: 2024-11-05T16:28:06



The Register - Security

Washington courts grapple with statewide outage after 'unauthorized activity'

Justice still being served, but many systems are down A statewide IT outage attributed to "unauthorized activity" is affecting the availability of services provided by all courts in Washington.

Published: 2024-11-05T14:29:06



The Register - Security

Google claims Big Sleep 'first' AI to spot freshly committed security bug that fuzzing missed

You snooze, you lose, er, win Google claims one of its AI models is the first of its kind to spot a memory safety vulnerability in the wild specifically an exploitable stack buffer underflow in SQLite which was then fixed before the buggy code's official release.

Published: 2024-11-05T06:38:13



The Register - Security

Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack

Victims were placed in serious danger following highly sensitive data dump The City of Columbus, Ohio, has confirmed half a million people's data was accessed and potentially stolen when Rhysida's ransomware raided its systems over the summer.

Published: 2024-11-04T17:01:07



The Register - Security

Why the long name? Okta discloses auth bypass bug affecting 52-character usernames

Mondays are for checking months of logs, apparently, if MFA's not enabled In potentially bad news for those with long names and/or employers with verbose domain names, Okta spotted a security hole that could have allowed crims to pass Okta AD/LDAP Delegated Authentication (DelAuth) using only a username.

Published: 2024-11-04T11:28:07



The Register - Security

Public sector cyber break-ins: Our money, our lives, our right to know

Is that a walrus in your server logs, or aren't you pleased to see me? Opinion At the start of September, Transport for London was hit by a major cyber attack. TfL is the public body that moves many of London's human bodies to and from work and play in the capital, and as the attack didn't hit power, signaling, or communications systems, most of the effects went unnoticed by commuters. The organization downplayed the damage done to back office ticketing, billing, and other systems. Everything was in hand.

Published: 2024-11-04T10:27:08



The Register - Security

Six IT contractors accused of swindling Uncle Sam out of millions

Also, ecommerce fraud ring disrupted, another Operation Power Off victory, Sino SOHO botnet spotted, and more Infosec in brief The US Department of Justice has charged six people with two separate schemes to defraud Uncle Sam out of millions of dollars connected to IT product and services contracts.

Published: 2024-11-03T18:30:06



The Register - Security

Financial institutions told to get their house in order before the next CrowdStrike strikes

Calls for improvements will soon turn into demands when new rules come into force The UK's finance regulator is urging all institutions under its remit to better prepare for IT meltdowns like that of CrowdStrike in July.

Published: 2024-11-02T09:30:08



The Register - Security

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine Multiple UK councils had their websites either knocked offline or were inaccessible to residents this week after pro-Russia cyber nuisances added them to a daily target list.

Published: 2024-11-01T10:58:07



The Register - Security

Hack Nintendo's alarm clock to show cat pics? Let's-a-go!

How 'Gary' defeated Bowser broke into the interactive alarm clock A hacker who uses the handle GaryOderNichts has found a way to break into Nintendo's recently launched Alarmo clock, and run code on the device.

Published: 2024-11-01T08:32:08



The Register - Security

Gang gobbles 15K credentials from cloud and email providers' garbage Git configs

Emeraldwhale looked sharp until it made a common S3 bucket mistake A criminal operation dubbed Emeraldwhale has been discovered after it dumped more than 15,000 credentials belonging to cloud service and email providers in an open AWS S3 bucket, according to security researchers.

Published: 2024-10-31T23:59:12



The Register - Security

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin LottieFiles is overcoming something of a Halloween fright after battling to regain control of a compromised developer account that was used to exploit users' crypto wallets.

Published: 2024-10-31T11:55:17



The Register - Security

Tower PC case used as 'creative cavity' by drug importer

Motherboard missing, leaving space for a million hits of meth Australian police have arrested a man after finding he imported what appear to be tower PC cases that were full of illicit drugs.

Published: 2024-10-31T08:25:05



The Register - Security

Chinese attackers accessed Canadian government networks for five years

India makes it onto list of likely threats for the first time A report by Canada's Communications Security Establishment (CSE) revealed that state-backed actors have collected valuable information from government networks for five years.

Published: 2024-10-31T05:34:23



The Register - Security

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw There's a Windows Themes spoofing zero-day bug on the loose that allows attackers to steal people's NTLM credentials.

Published: 2024-10-30T21:30:06



The Register - Security

Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info

If you're gonna come at the mouse, you need to be better at hiding your tracks A disgruntled ex-Disney employee has been arrested and charged with hacking his former employer's systems to alter restaurant menus with potentially deadly consequences.

Published: 2024-10-30T15:12:39



The Register - Security

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel Microsoft says a mass phishing campaign by Russia's foreign intelligence services (SVR) is now in its second week, and the spies are using a novel info-gathering technique.

Published: 2024-10-30T12:40:56



The Register - Security

Beijing claims it's found 'underwater lighthouses' that its foes use for espionage

Release the Kraken! China has accused unnamed foreign entities of using devices hidden in the seabed and bobbing on the waves to learn its maritime secrets.

Published: 2024-10-30T08:31:08



The Register - Security

Uncle Sam outs a Russian accused of developing Redline infostealing malware

Or: why using the same iCloud account for malware development and gaming is a bad idea The US government has named and charged a Russian national, Maxim Rudometov, with allegedly developing and administering the notorious Redline infostealer.

Published: 2024-10-29T23:30:07



The Register - Security

Cast a hex on ChatGPT to trick the AI into writing exploit code

'It was like watching a robot going rogue' says researcher OpenAI's language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an attacker to jump the model's built-in security guardrails and abuse the AI for evil purposes, according to 0Din researcher Marco Figueroa.

Published: 2024-10-29T22:30:07



The Register - Security

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest International law enforcement officials have arrested two individuals and charged another in connection with the use and distribution of the Redline and Meta infostealer malware strains.

Published: 2024-10-29T16:35:11



The Register - Security

The story behind the Health Infrastructure Security and Accountability Act

Health care breaches lead to legislation Partner Content Breaches breed regulation; which hopefully in turn breeds meaningful change.

Published: 2024-10-29T16:00:08



The Register - Security

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem If you're running an application built using the Spring development framework, now is a good time to check it's fully updated a new, critical-severity vulnerability has just been disclosed.

Published: 2024-10-29T14:33:08



The Register - Security

Merde! Macron's bodyguards reveal his location by sharing Strava data

It's not just the French president, Biden and Putin also reportedly trackable The French equivalent of the US Secret Service may have been letting their guard down, as an investigation showed they are easily trackable via the fitness app Strava.

Published: 2024-10-29T10:32:08



The Register - Security

Five Eyes nations tell tech startups to take infosec seriously. Again

Only took 'em a year to dish up some scary travel advice, and a Secure Innovation Placemat? Cyber security agencies from the Five Eyes nations have delivered on a promise to offer tech startups more guidance on how to stay secure.

Published: 2024-10-29T08:29:08



The Register - Security

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets While the wages paid by governments seldom match those available in the private sector, it appears that the UK's intelligence, security and cyber agency is a long way short of being competitive in its quest for talent.

Published: 2024-10-29T06:26:09



The Register - Security

JPMorgan Chase sues scammers following viral 'infinite money glitch'

ATMs paid customers thousands ... and now the bank wants its money back JPMorgan Chase has begun suing fraudsters who allegedly stole thousands of dollars from the bank's ATMs after a check fraud glitch went viral on social media.

Published: 2024-10-28T20:45:12



The Register - Security

Feds investigate China's Salt Typhoon amid campaign phone hacks

'They're taunting us,' investigator says and it looks like it's working The feds are investigating Chinese government-linked cyberspies breaking into the infrastructure of US telecom companies, as reports suggest Salt Typhoon - the same crew believed to be behind those hacks - has also been targeting phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, along with Republican candidate Donald Trump and his running mate, JD Vance.

Published: 2024-10-28T20:00:08



The Register - Security

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told Exclusive Brazen crooks are selling people's pilfered financial information on Meta's Threads, in some cases posting full credit card details, plus stolen credentials, alongside images of the cards themselves.

Published: 2024-10-28T15:45:06



The Register - Security

Delta officially launches lawyers at $500M CrowdStrike problem

Legal action comes months after alleging negligence by Falcon vendor Delta Air Lines is suing CrowdStrike in a bid to recover the circa $500 million in estimated lost revenue months after the cybersecurity company "caused" an infamous global IT outage.

Published: 2024-10-28T14:17:09



The Register - Security

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow Dutch police (Politie) say they've dismantled the servers powering the Redline and Meta infostealers two key tools in a modern cyber crook's arsenal.

Published: 2024-10-28T12:01:10



The Register - Security

WordPress forces user conf organizers to share social media credentials, arousing suspicions

One told to take down posts that said nice things about WP Engine Organisers of WordCamps, community-organized events for WordPress users, have been ordered to take down some social media posts and share their login credentials for social networks.

Published: 2024-10-28T06:27:07



The Register - Security

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more Infosec in brief Senate intelligence committee chair Mark Warner (D-VA) is demanding to know why, in the wake of the bust-up of a massive online Russian disinformation operation, the names of six US-based domain registrars seem to keep popping up as, at best, negligent facilitators of election meddling.

Published: 2024-10-27T15:44:06



The Register - Security

Worker surveillance must comply with credit reporting rules

US Consumer Financial Protection Bureau demands transparency, accountability from sellers of employee metrics The US Consumer Financial Protection Bureau on Thursday published guidance advising businesses that third-party reports about workers must comply with the consent and transparency requirements set forth in the Fair Credit Reporting Act.

Published: 2024-10-26T05:30:10



Security Latest

Auto-Rebooting iPhones Are Causing Chaos for Cops

Plus: Hot Topic confirms a customer data breach, Germany arrests a US citizen for allegedly passing military secrets to Chinese intelligence, and more.

Published: 2024-11-09T11:30:00



Security Latest

764 Terror Network Member Richard Densmore Sentenced to 30 Years in Prison

The 47-year-old Michigan man, who pleaded guilty to sexually exploiting a child, was highly active in the online criminal network called 764, which the FBI now considers a “tier one” terrorism threat.

Published: 2024-11-07T20:46:05



Security Latest

Russia Is Going All Out on Election Day Interference

Along with other foreign influence operations including from Iran Kremlin-backed campaigns to stoke division and fear have gone into overdrive.

Published: 2024-11-05T21:04:35



Security Latest

Man Arrested for Snowflake Hacking Spree Faces US Extradition

Alexander “Connor” Moucka was arrested this week by Canadian authorities for allegedly carrying out a series of hacks that targeted Snowflake’s cloud customers. His next stop may be a US jail.

Published: 2024-11-05T18:36:22



Security Latest

Flaw in Right-Wing ‘Election Integrity’ App Exposes Voter-Suppression Plan and User Data

A bug that WIRED discovered in True the Vote’s VoteAlert app revealed user information and an election worker who wrote about carrying out an illegal voter-suppression scheme.

Published: 2024-11-05T16:56:22



Security Latest

Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies

When you download a piece of pirated software, you might also be getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that’s fueling some of the biggest breaches on the planet.

Published: 2024-11-04T11:00:00



Security Latest

Florida Man Accused of Hacking Disney World Menus, Changing Font to Wingdings

Plus: Cops take down a notorious infostealer, Strava leaks world leaders’ locations, and a hacking scandal is causing chaos in Italy.

Published: 2024-11-02T10:30:00



Security Latest

Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

Published: 2024-11-01T10:00:00



Security Latest

Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices

Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.

Published: 2024-10-31T12:45:00



Security Latest

The Untold Story of Trump's Failed Attempt to Overthrow Venezuela's President

A successful CIA hack of Venezuela's military payroll system, insider fights for spy agency resources, and messy opposition politics: A WIRED investigation reveals a secret Trump-era attempt to oust autocratic ruler Nicol's Maduro.

Published: 2024-10-31T09:30:00



Security Latest

‘We’re a Fortress Now’: The Militarization of US Elections Is Here

From bulletproof glass, drones, and snipers to boulders blocking election offices, the US democratic system is bracing for violent attacks in 2024.

Published: 2024-10-30T15:31:35



Security Latest

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.

Published: 2024-10-28T13:00:00



Security Latest

Chinese Hackers Target Trump Campaign via Verizon Breach

Plus: Apple offers $1 million to hack its AI cloud infrastructure, Iranian hackers successfully peddle stolen Trump campaign docs, Russia hacks the nation of Georgia, and a “cyberattack” that wasn’t.

Published: 2024-10-26T10:30:00



The Hacker News

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the

Published: 2024-11-09T11:42:00



The Hacker News

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)

Published: 2024-11-09T11:12:00



The Hacker News

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

Let’s face it traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it's over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how "Hamilton" made history come alive, or how "The Office" taught us CPR (Staying Alive beat, anyone?)?

Published: 2024-11-08T22:53:00



The Hacker News

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a

Published: 2024-11-08T19:32:00



The Hacker News

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point

Published: 2024-11-08T17:53:00



The Hacker News

The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses

We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable. Globally small and medium-sized businesses (SMBs) are increasingly targeted by cyberattacks but often lack the resources for full-time Chief Information Security Officers (CISOs). This gap is driving the rise of the virtual CISO (vCISO) model, offering a cost-effective

Published: 2024-11-08T17:23:00



The Hacker News

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available

Published: 2024-11-08T17:23:00



The Hacker News

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON#

Published: 2024-11-08T12:45:00



The Hacker News

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that

Published: 2024-11-08T10:47:00



The Hacker News

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as

Published: 2024-11-07T18:10:00



The Hacker News

A Hacker's Guide to Password Cracking

Defending your organization’s security is like fortifying a castle you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their moves. Read on to learn more about hackers'

Published: 2024-11-07T17:30:00



The Hacker News

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging

Published: 2024-11-07T15:18:00



The Hacker News

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. "The campaign

Published: 2024-11-07T15:12:00



The Hacker News

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. "During this attack, the threat actor used as a lure the upcoming World Expo, which will be held in 2025 in Osaka, Japan," ESET said in its APT Activity Report for the period April to

Published: 2024-11-07T15:10:00



The Hacker News

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management

Published: 2024-11-07T14:38:00



The Hacker News

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers' Amazon Web Services (AWS) credentials. The package in question is "fabrice," which typosquats a popular Python library known as "fabric," which is designed to execute shell commands remotely over

Published: 2024-11-07T14:37:00



The Hacker News

Canada Orders TikTok to Shut Down Canadian Operations Over Security Concerns

The Canadian government on Wednesday ordered ByteDance-owned TikTok to dissolve its operations in the country, citing national security risks, but stopped short of instituting a ban on the popular video-sharing platform. "The decision was based on the information and evidence collected over the course of the review and on the advice of Canada's security and intelligence community and other

Published: 2024-11-07T10:09:00



The Hacker News

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services including Teams, SharePoint, Quick Assist, and OneDrive the attacker exploited the trusted infrastructures of previously compromised organizations to

Published: 2024-11-06T23:22:00



The Hacker News

Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that o ers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute

Published: 2024-11-06T19:29:00



The Hacker News

9 Steps to Get CTEM on Your 2025 Budgetary Radar

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity professionals, we understand that

Published: 2024-11-06T17:00:00



The Hacker News

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59

Published: 2024-11-06T15:43:00



The Hacker News

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as

Published: 2024-11-06T12:28:00



The Hacker News

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security. "We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025," Mayank Upadhyay, vice president of engineering and distinguished engineer at

Published: 2024-11-06T11:07:00



The Hacker News

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed

Published: 2024-11-05T22:45:00



The Hacker News

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino

Published: 2024-11-05T17:46:00



The Hacker News

Leveraging Wazuh for Zero Trust security

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are not automatically trusted upon gaining access. Zero Trust security encourages continuous monitoring of every device and user, which ensures sustained protection after

Published: 2024-11-05T16:30:00



The Hacker News

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices

Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an "

Published: 2024-11-05T15:04:00



The Hacker News

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few

Published: 2024-11-05T11:03:00



The Hacker News

Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the

Published: 2024-11-05T10:38:00



The Hacker News

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective

Published: 2024-11-05T09:00:00



The Hacker News

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including

Published: 2024-11-04T19:38:00



The Hacker News

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka

Published: 2024-11-04T17:32:00



The Hacker News

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! It's enough to make you want to chuck your phone in the ocean.

Published: 2024-11-04T16:58:00



The Hacker News

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s

Published: 2024-11-04T16:30:00



The Hacker News

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant described the development as the "first real-world vulnerability" uncovered using the artificial intelligence (AI) agent. "We believe this is the first public example of an AI agent finding

Published: 2024-11-04T15:34:00



The Hacker News

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming

Published: 2024-11-04T11:43:00



The Hacker News

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT

Published: 2024-11-02T11:02:00



The Hacker News

Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel's participation in the sporting event. The activity has been pinned on an entity that's known as Emennet Pasargad, which the agencies said has been operating

Published: 2024-11-01T19:39:00



The Hacker News

Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned

Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket belonging to a prior victim. The bucket,

Published: 2024-11-01T15:57:00



The Hacker News

5 SaaS Misconfigurations Leading to Major Fu*%@ Ups

With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams. Misconfigurations are silent killers, leading to major

Published: 2024-11-01T15:50:00



The Hacker News

Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft

Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork-1658, stating the password spray operations are used to steal credentials from multiple Microsoft customers. "Active since at least 2021, Storm-0940 obtains initial access

Published: 2024-11-01T15:18:00



The Hacker News

Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns

Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot+ PCs, stating it's taking the time to improve the experience. The development was first reported by The Verge. The artificial intelligence-powered tool was initially slated for a preview release starting in October. "We are committed to delivering a secure and trusted experience with Recall," the

Published: 2024-11-01T14:18:00



The Hacker News

New Phishing Kit Xi g u Targets Users Across Five Countries With 2,000 Fake Sites

Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain, the U.K., and the U.S. since at least September 2024. Netcraft said more than 2,000 phishing websites have been identified the kit, known as Xi g u, with the offering used in attacks aimed at a variety of verticals, such as public sectors, postal, digital services

Published: 2024-11-01T09:20:00



The Hacker News

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics

Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. "While the iOS implant delivery method closely mirrors that of the macOS version, the post-exploitation and privilege escalation stages differ

Published: 2024-10-31T20:30:00



The Hacker News

LottieFiles Issues Warning About Compromised "lottie-player" npm Package

LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack, prompting it to release an updated version of the library. "On October 30th ~6:20 PM UTC - LottieFiles were notified that our popular open source npm package for the web player @lottiefiles/lottie-player had unauthorized new versions pushed with malicious code," the company said in a

Published: 2024-10-31T19:46:00



The Hacker News

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as “the new perimeter”, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them vulnerable to data

Published: 2024-10-31T16:00:00



The Hacker News

LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites

A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE-2024-50550 (CVSS score: 8.1), has been addressed in version 6.5.2 of the plugin. "The plugin suffers from an unauthenticated privilege escalation vulnerability

Published: 2024-10-31T15:54:00



The Hacker News

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

Threat actors linked to North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation

Published: 2024-10-30T21:14:00



The Hacker News

Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information

A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said. To demonstrate the issue, the company said it managed to publish a

Published: 2024-10-30T18:35:00



The Hacker News

Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware

Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. "The hackers behind the campaign use trusted brands to expand their reach," Bitdefender Labs said in a report shared with The Hacker News. "The malvertising campaign leverages nearly a hundred malicious

Published: 2024-10-30T18:30:00



Security Affairs

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 19

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging   Typosquat Campaign Targeting npm Developers ToxicPanda: […]

Published: 2024-11-10T11:48:52



Security Affairs

Security Affairs newsletter Round 497 by Pierluigi Paganini INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Mazda Connect flaws allow to hack some Mazda vehicles Veeam Backup & Replication exploit reused in new Frag […]

Published: 2024-11-10T11:28:39



Security Affairs

U.S. agency cautions employees to limit phone use due to Salt Typhoon hack of telco providers

US CFPB warns employees to avoid work-related mobile calls and texts following China-linked Salt Typhoon hack over security concerns. The US government’s Consumer Financial Protection Bureau (CFPB) advises employees to avoid using cellphones for work after China-linked APT group Salt Typhoon hackers breached major telecom providers. The Consumer Financial Protection Bureau (CFPB) is a U.S. […]

Published: 2024-11-10T09:12:54



Security Affairs

Mazda Connect flaws allow to hack some Mazda vehicles

Multiple vulnerabilities in the infotainment unit Mazda Connect could allow attackers to execute arbitrary code with root access. Trend Micro’s Zero Day Initiative warned of multiple vulnerabilities in the Mazda Connect infotainment system that could allow attackers to execute code with root privileges. This occurs due to improper input sanitization in the Mazda Connect CMU, […]

Published: 2024-11-09T22:20:06



Security Affairs

Veeam Backup & Replication exploit reused in new Frag ransomware attack

A critical flaw, tracked as CVE-2024-40711, in Veeam Backup & Replication (VBR) was also recently exploited to deploy Frag ransomware. In mid-October, Sophos researchers warned that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting […]

Published: 2024-11-09T17:50:11



Security Affairs

Texas oilfield supplier Newpark Resources suffered a ransomware attack

Texas oilfield supplier Newpark Resources suffered a ransomware attack that disrupted its information systems and business applications. Texas oilfield supplier Newpark Resources revealed that a ransomware attack on October 29 disrupted access to some of its information systems and business applications. The company immediately activated its cybersecurity response plan and launched an investigation into the […]

Published: 2024-11-08T23:05:31



Security Affairs

Palo Alto Networks warns of potential RCE in PAN-OS management interface

Palo Alto Networks warns customers to restrict access to their next-generation firewalls because of a potential RCE flaw in the PAN-OS management interface. Palo Alto Networks warns customers to limit access to their next-gen firewall management interface due to a potential remote code execution vulnerability in PAN-OS. The cybersecurity company has no further details on […]

Published: 2024-11-08T19:01:00



Security Affairs

iPhones in a law enforcement forensics lab mysteriously rebooted losing their After First Unlock (AFU) state

Law enforcement warns that securely stored iPhones awaiting forensic examination are mysteriously rebooting, making them harder to unlock, reported 404 Media. Law enforcement warns that securely stored iPhones awaiting forensic examination are mysteriously rebooting, making them much harder to unlock, per a document obtained by 404 Media. 404 Media obtained the document from a mobile […]

Published: 2024-11-08T11:29:21



Security Affairs

U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2024-43093 – this week, Google warned that the vulnerability CVE-2024-43093 in the Android OS is […]

Published: 2024-11-07T22:49:32



Security Affairs

DPRK-linked BlueNoroff used macOS malware with novel persistence

SentinelLabs observed North Korea-linked threat actor BlueNoroff targeting businesses in the crypto industry with a new multi-stage malware. SentinelLabs researchers identified a North Korea-linked threat actor targeting crypto businesses with new macOS malware as part of a campaign tracked as “Hidden Risk.” The attackers, linked to BlueNoroff and past RustBucket campaigns, used fake cryptocurrency news emails […]

Published: 2024-11-07T16:16:42



News Packet Storm

No One Knows Who Moved UK's Oldest Satellite

Hackers Are Stealing Tickets From Ticketmaster Accounts

US Gov Agency Urges Employees To Limit Phone Use After China Salt Typhoon Hack

Palo Alto Networks Expedition Vulnerability Exploited In Attacks

Legal Protections For Securty Researchers Sought In New German Draft Law

Scattered Spider, BlackCat Claw Their Way Back From The Undergound

North Korean Hackers Target macOS Users

Unpatched Vulnerabilities Allow Hacking Of Mazda Cars

Cisco Patches Critical Vuln In Industrial Networking Solution

Facebook Asks U.S. Supreme Court To Dismiss Fraud Suit Over Cambridge Analytica Scandal

Trump Plans To Dismantle AI Safeguards After Victory

Cybercrooks Are Targeting Bengal Cat Lovers In Australia

China's Volt Typhoon Reportedly Breached Singtel In Test Run For US Attack

Attackers Stole Microlise Staff Data Following DHL, Serco Disruption

Operation Synergia II Sees Interpol Swoop On Global Cyber Crims

Google Cloud Rolling Out Mandatory MFA for All Users

Rhysida Ransomware Attack On Columbus Claimed 500k Victims

South Korea Fines Meta About $15 Million Over Collection Of User Data

Google Patches Two Android Vulnerabilities Exploited In Targeted Attacks

Suspected Snowflake Hacker Arrested In Canada

Google's Big Sleep LLM Agent Discovers Exploitable Bug In SQLite

DocuSign Abused To Deliver Fake Invoices

CISA Director Easterly Seeks To Quell Concerns About Election Security

Thousands Of Hacked TP-Link Routers Used In Yearslong Account Takeovers

Why The Long Name? Okta Discloses Auth Bypass Bug Affecting 52-Character Usernames

SecurityWeek

US Gov Agency Urges Employees to Limit Phone Use After China ‘Salt Typhoon’ HackIndustry Moves for the week of November 4, 2024 - SecurityWeek

In Other News: China Hacked Singtel, GuLoader Attacks on Industrial Firms, LastPass Phishing Campaign

Malwarebytes Acquires VPN Provider AzireVPN

Unpatched Vulnerabilities Allow Hacking of Mazda Cars: ZDI

Nokia Says Impact of Recent Source Code Leak Is Very Limited

US Prison Sentences for Nigerian Cybercriminals Surge in Recent Months

Texas Oilfield Supplier Newpark Hit by Ransomware

HPE Patches Critical Vulnerabilities in Aruba Access Points

Palo Alto Networks Expedition Vulnerability Exploited in Attacks, CISA Warns

North Korean Hackers Target macOS Users

CISA News

CISA Kicks Off Critical Infrastructure Security and Resilience Month 2024

Statement from CISA Director Easterly on the Security of the 2024 Elections

Joint ODNI, FBI, and CISA Statement

Joint Statement from CISA and EAC in Support of State and Local Election Officials

Joint ODNI, FBI, and CISA Statement on Russian Election Influence Efforts

CISA Releases Its First Ever International Strategic Plan

CISA Launches #PROTECT2024 Election Threat Updates Webpage

Joint ODNI, FBI, and CISA Statement

Joint Statement by FBI and CISA on PRC Activity Targeting Telecommunications

CISA and USPIS Release Two Election Mail Security Resources

CISA Blog

Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture

A Message to Election Officials from CISA Director Jen Easterly

Region 8 Invites You to Secure Our World

CISA Director Jen Easterly Remarks at the Election Center 39th Annual National Conference in Detroit

Learn with Region 8’s Webinar Program

Shaping the legacy of partnership between government and private sector globally: JCDC

SAFECOM and NCSWIC Develop Global Positioning System (GPS) for Public Safety Location Services: Use Cases and Best Practices

Region 10 Team Provides Vital Election Security Training for Idaho

SAFECOM Membership Spotlight ft. Red Grasso, North Carolina Department of Information Technology

SAFECOM Releases New Resource for Cloud Adoption

All CISA Advisories

Bosch Rexroth IndraDrive

CISA Releases Three Industrial Control Systems Advisories

Beckhoff Automation TwinCAT Package Manager

Delta Electronics DIAScreen

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA Adds Two Known Exploited Vulnerabilities to Catalog

Rockwell Automation FactoryTalk ThinManager

CISA Releases Four Industrial Control Systems Advisories

Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments

Fortinet Updates Guidance and Indicators of Compromise following FortiManager Vulnerability Exploitation

Solar-Log Base 15

Siemens InterMesh Subscriber Devices

CISA Releases Three Industrial Control Systems Advisories

Delta Electronics InfraSuite Device Master

Apple Releases Security Updates for Multiple Products

JCDC’s Industry-Government Collaboration Speeds Mitigation of CrowdStrike IT Outage

iniNet Solutions SpiderControl SCADA PC HMI Editor

Cisco Releases Security Bundle for Cisco ASA, FMC, and FTD Software

CISA Releases Four Industrial Control Systems Advisories

Deep Sea Electronics DSE855

VIMESA VHF/FM Transmitter Blue Plus

CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Adds One Known Exploited Vulnerability to Catalog

ICONICS and Mitsubishi Electric Products

CISA Releases One Industrial Control Systems Advisory

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Adds One Known Exploited Vulnerability to Catalog

Kieback&Peter DDC4000 Series

CISA Releases Seven Industrial Control Systems Advisories

Exploit-DB.com RSS Feed

[webapps] reNgine 2.2.0 - Command Injection (Authenticated)

[webapps] openSIS 9.1 - SQLi (Authenticated)

[webapps] dizqueTV 1.5.3 - Remote Code Execution (RCE)

[webapps] NoteMark < 0.13.0 - Stored XSS

[webapps] Gitea 1.22.0 - Stored XSS

[webapps] Invesalius3 - Remote Code Execution

[dos] Windows TCP/IP - RCE Checker and Denial of Service

[webapps] Aurba 501 - Authenticated RCE

[webapps] HughesNet HT2000W Satellite Modem - Password Reset

[webapps] Elber Wayber Analog/Digital Audio STL 4.00 - Device Config Disclosure

[webapps] Elber Wayber Analog/Digital Audio STL 4.00 - Authentication Bypass

[webapps] Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Device Config

[webapps] Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass

[webapps] Helpdeskz v2.0.2 - Stored XSS

[webapps] Calibre-web 0.6.21 - Stored XSS

[webapps] Devika v1 - Path Traversal via 'snapshot_path'

[local] Genexus Protection Server 9.7.2.10 - 'protsrvservice' Unquoted Service Path

[local] SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path

[local] Oracle Database 12c Release 1 - Unquoted Service Path

[webapps] Ivanti vADC 9.9 - Authentication Bypass

[local] Bonjour Service 'mDNSResponder.exe' - Unquoted Service Path Privilege Escalation

[webapps] Xhibiter NFT Marketplace 1.10.2 - SQL Injection

[webapps] Azon Dominator Affiliate Marketing Script - SQL Injection

[webapps] Microweber 2.0.15 - Stored XSS

[webapps] Customer Support System 1.0 - Stored XSS

[webapps] Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)

[webapps] SolarWinds Platform 2024.1 SR1 - Race Condition

[webapps] Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)

[webapps] Poultry Farm Management System v1.0 - Remote Code Execution (RCE)

[webapps] Boelter Blue System Management 1.3 - SQL Injection

[webapps] WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated)

[webapps] PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows)

[webapps] AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability.

[webapps] AEGON LIFE v1.0 Life Insurance Management System - Unauthenticated Remote Code Execution (RCE)

[webapps] XMB 1.9.12.06 - Stored XSS

[webapps] Carbon Forum 5.9.0 - Stored XSS

[webapps] AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS)

[webapps] appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated)

[webapps] CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)

[webapps] WBCE CMS v1.6.2 - Remote Code Execution (RCE)

[webapps] Monstra CMS 3.0.4 - Remote Code Execution (RCE)

[webapps] Dotclear 2.29 - Remote Code Execution (RCE)

[webapps] Serendipity 2.5.0 - Remote Code Execution (RCE)

[webapps] Sitefinity 15.0 - Cross-Site Scripting (XSS)

[webapps] FreePBX 16 - Remote Code Execution (RCE) (Authenticated)

[webapps] Akaunting 3.1.8 - Server-Side Template Injection (SSTI)

[webapps] Check Point Security Gateway - Information Disclosure (Unauthenticated)

[webapps] Aquatronica Control System 5.1.6 - Information Disclosure

[webapps] changedetection < 0.45.20 - Remote Code Execution (RCE)

[webapps] ElkArte Forum 1.1.9 - Remote Code Execution (RCE) (Authenticated)

Full Disclosure

SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater

Unsafe eval() in TestRail CLI

4 vulnerabilities in ibmsecurity

32 vulnerabilities in IBM Security Verify Access

xlibre Xnest security advisory & bugfix releases

APPLE-SA-10-29-2024-1 Safari 18.1

SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)

SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)

APPLE-SA-10-28-2024-8 visionOS 2.1

APPLE-SA-10-28-2024-7 tvOS 18.1

APPLE-SA-10-28-2024-6 watchOS 11.1

APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1

APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1

APPLE-SA-10-28-2024-3 macOS Sequoia 15.1

APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1

Open Source Security

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

4 recent security bugs in GNOME's libsoup

Re: shell wildcard expansion (un)safety

CVE-2024-50378: Apache Airflow: Secrets not masked in UI when sensitive variables are set via Airflow cli

Re: shell wildcard expansion (un)safety

Re: CVE-2024-35235 cups: Cupsd Listen arbitrary chmod 0140777

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Re: shell wildcard expansion (un)safety

Ethical Hacking News

Android 15 QPR1 Beta 2: A Revolution in Tablet Computing and a Triumphant Return of Lock Screen Widgets

Android 15 QPR1 Beta 2 brings significant updates to Android tablets, including desktop windowing and the return of lock screen widgets. Learn more about the new features and improvements in this latest iteration of the Android operating system.

Published: Wed Sep 25 22:10:10 2024



Ethical Hacking News

Malware 101: A Comprehensive Guide to Understanding the Most Common Types of Malware



The world of cybersecurity is constantly evolving, and with it comes a multitude of threats that can compromise your device, steal your personal information, or disrupt your online activities. At the heart of these threats are malicious software programs known as malware. In this comprehensive guide, we will delve into the world of malware, exploring its definition, types, delivery methods, and prevention strategies.



Published: Wed Sep 25 22:32:18 2024



Ethical Hacking News

Critical Ivanti vTM Auth Bypass Bug Now Exploited in Attacks: A Growing Concern for Organizations


A critical Ivanti vTM application delivery controller vulnerability is currently being actively exploited by threat actors, allowing remote unauthenticated attackers to bypass authentication on Internet-exposed vTM admin panels. This vulnerability could potentially lead to the creation of rogue administrator users, posing significant risks to organizations relying on this application delivery controller to manage their network traffic and applications.

Published: Wed Sep 25 23:48:06 2024



Ethical Hacking News

A Comprehensive Guide to Multi-Cloud Security: Best Practices and Challenges

Discover the best practices and challenges associated with multi-cloud security in this comprehensive guide. Learn how to develop a solid multi-cloud security strategy that protects your data and resources in a multi-cloud environment.

Published: Thu Sep 26 00:14:50 2024



Ethical Hacking News

New Era of Cybersecurity Challenges: The Exploitation of Microsoft's Windows Smart App Control Zero-Day Vulnerability



In a significant update, Microsoft has addressed a critical zero-day vulnerability in its Windows Smart App Control and SmartScreen security features. This vulnerability, identified as CVE-2024-38217, has been actively exploited by threat actors since 2018, posing a significant risk to users worldwide. Microsoft's September 2024 Patch Tuesday update includes fixes for four zero-day vulnerabilities, including this one, highlighting the need for prioritizing patching updates and staying vigilant in the face of evolving cybersecurity threats.

Published: Thu Sep 26 00:39:15 2024



Ethical Hacking News

WordPress.org Denies Service to WP Engine: A Conflict of Interest?

WordPress.org has blocked WP Engine's servers from accessing WordPress.org resources, potentially putting millions of websites at risk. The move is seen as a major blow to the web hosting provider and raises questions about corporate responsibility, intellectual property rights, and the future of open-source projects.

Published: Thu Sep 26 00:44:37 2024



Ethical Hacking News

Cyber Storm: The Salt Typhoon Saga Unfolds as Chinese Spies Breach US ISPs



China's Salt Typhoon cyber spies are deep inside US ISPs, a disturbing development that highlights the ongoing cat-and-mouse game between Chinese state-sponsored hackers and US authorities.



Published: Thu Sep 26 00:51:59 2024



Ethical Hacking News

The Cyber Conflict Escalation: China's Warning to Taiwan Over Network Security Precautions

China has issued a stern warning to Taiwan over network security precautions amid escalating tensions over the status of Taiwan. The Ministry of State Security claimed that a group linked to Taiwan's military was behind recent cyber attacks, but Taiwan's government denies the allegations. As tensions continue to escalate, it is essential to take steps to prevent cyber attacks and protect online systems from state-sponsored malware.

Published: Thu Sep 26 01:05:01 2024



Ethical Hacking News

10 Nasty Software Bugs Put Thousands of Fuel Storage Tanks at Risk of Cyberattacks



Tens of thousands of fuel storage tanks in critical infrastructure facilities remain vulnerable to zero-day attacks due to buggy Automatic Tank Gauge systems from multiple vendors, say infosec researchers. The recent discovery of ten critical security bugs in these devices has raised significant concerns about the potential for cyberattacks on fuel storage tanks, highlighting the need for better security measures in the energy sector.



Published: Thu Sep 26 02:02:04 2024



Ethical Hacking News

Mandiant Unveils Cheat Sheet to Help Organizations Identify Potential North Korean IT Operatives

Uncovering the Hidden Dangers: A Guide to Identifying North Korean IT Operatives

Published: Thu Sep 26 02:08:04 2024



Ethical Hacking News

The Unsettling Rise of UltraAV: A Low-Profile Antivirus Brand Replacing Kaspersky on US PCs



The US government's recent ban on Kaspersky selling its products stateside has led to the sudden appearance of UltraAV as a mandatory antivirus software for some Windows systems. The low-profile brand raises concerns about security implications and the role of government regulation in shaping the cybersecurity industry, prompting users to question whether this new brand can provide adequate protection.

Published: Thu Sep 26 02:25:35 2024



Ethical Hacking News

Ransomware: The Growing Threat to Global Financial Stability

As ransomware continues to make headlines due to its impact on global financial institutions, it's essential to understand the threat and take steps to protect yourself. From high-profile attacks on organizations like MoneyGram to individual users, ransomware is a growing concern that requires attention.

Published: Thu Sep 26 02:39:53 2024



Ethical Hacking News

Necro Malware Continues to Haunt Android Users: A Persistent Threat

Necro malware has been found on several popular Android apps, including Wuta Camera and Max Browser, leaving thousands of users vulnerable to cyber threats. With its ability to deliver intrusive ads and steal money through fake subscription payments, this malware campaign is a stark reminder of the need for vigilance when downloading mobile apps from unverified sources.

Published: Thu Sep 26 02:50:54 2024



Ethical Hacking News

Microsoft Unveils Comprehensive Secure Future Initiative: A Multifaceted Program for Enhanced Cybersecurity


Microsoft Unveils Comprehensive Secure Future Initiative to Enhance Cybersecurity and Protect Global Citizens

Published: Thu Sep 26 03:00:10 2024



Ethical Hacking News

The Dark Reality of Ransomware: Understanding the Risks and Prevention Strategies

Ransomware: The Hidden Threat Lurking in Your Digital Footprints

Published: Thu Sep 26 03:12:37 2024



Ethical Hacking News

Cybersecurity Threats Emerge: The Rise of Rust-Based Splinter Post-Exploitation Tool



A new post-exploitation red team tool called Splinter has emerged in the wild, prompting cybersecurity researchers to raise an alarm about its potential threat. The Splinter tool is built using the Rust programming language and boasts a range of features commonly found in penetration testing tools, making it a valuable target for threat actors seeking to compromise organizations. While there is no information available on who created the tool, its impact could be significant if misused.



Published: Thu Sep 26 04:42:40 2024



Ethical Hacking News

The Unfulfilled Promise of SOAR: How Agentic AI is Revolutionizing Security Operations Centers


The cybersecurity industry has long awaited a solution to Security Orchestration, Automation, and Response (SOAR)'s unfulfilled promises. A new technology called Agentic AI has emerged as a potential game-changer, promising to address the fundamental challenges of SOC automation that have hindered previous solutions. With its advanced generative capabilities, Agentic AI can automate complex tasks, providing real-time insights and enabling organizations to respond quickly and effectively to emerging threats.

Published: Thu Sep 26 05:03:51 2024



Ethical Hacking News

Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets: A Growing Concern for National Security


A joint cybersecurity advisory by the FBI and CISA reveals that a Russian state-sponsored advanced persistent threat actor has been targeting various U.S. state, local, territorial, and tribal (SLTT) government networks, as well as aviation networks, for over two years. The actor's sophisticated tactics and techniques have allowed it to successfully breach numerous networks, compromise sensitive information, and potentially disrupt critical infrastructure. Organizations are urged to take immediate action to secure their networks and systems in response to this threat.

Published: Thu Sep 26 05:36:13 2024



Ethical Hacking News

Ransomware: The Evolving Threat to Personal and Business Security

Learn how to protect yourself from ransomware attacks with our comprehensive guide, featuring expert advice on prevention, detection, and removal techniques. Discover the latest threats and trends in the world of cybersecurity.

Published: Thu Sep 26 05:40:38 2024



Ethical Hacking News

Kaspersky's Uncertain Exit: A Web of Trust and Concerns



Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising Concerns: A Devastating Blow to Trust and Transparency in the Cybersecurity Industry

In a move that has left many in the cybersecurity community on edge, Kaspersky, a renowned antivirus software provider, has begun the process of exiting the United States market. This development is a result of a formal ban imposed by the U.S. government due to national security concerns, which was implemented as part of a broader crackdown on Russian-owned companies and their alleged ties to the country's government.



Published: Thu Sep 26 05:46:54 2024



Ethical Hacking News

The Evolving Landscape of Password Security: A Comprehensive Analysis

While mandatory password expiration policies may have been sufficient in the past, they are no longer considered an effective solution to safeguard sensitive information. Instead, organizations must adopt robust authentication mechanisms, multifactor authentication, and effective password management policies to protect their users' online presence.

Published: Thu Sep 26 07:23:51 2024



Ethical Hacking News

Discord Introduces DAVE: A Game-Changing End-to-End Encryption Protocol for Secure Audio and Video Calls

Discord has unveiled a groundbreaking new protocol called DAVE, which promises to provide unparalleled protection for sensitive communications via audio and video calls. By utilizing this protocol, users can rest assured that their conversations will remain private and secure.

Published: Thu Sep 26 07:36:28 2024



Ethical Hacking News

The Lazarus Group: Unpacking the Complexities of North Korea's State-Sponsored Cyber Threat

Uncovering the complexities of North Korea's state-sponsored cyber threat, this article provides an in-depth examination of the Lazarus Group's activities and tactics.

Published: Thu Sep 26 08:12:47 2024



Ethical Hacking News

The GeoServer Vulnerability: Understanding the Risks and Implications


A critical vulnerability has been identified in the popular GeoServer software, allowing for Remote Code Execution (RCE) by unauthenticated users. Understanding the risks and implications of this vulnerability is essential for software developers and users to protect themselves against potential attacks.

Published: Thu Sep 26 08:23:39 2024



Ethical Hacking News

Noyb Takes on Mozilla: The Privacy-Preserving Attribution Feature Raises Concerns Over Data Tracking and User Consent



Noyb takes on Mozilla: a new complaint raises concerns over Firefox's tracking feature Privacy-Preserving Attribution (PPA), highlighting the ongoing debate over data tracking and user consent in the digital age. The incident underscores the importance of transparency, user agency, and clear policies regarding data collection practices.



Published: Thu Sep 26 08:40:22 2024



Ethical Hacking News

The Looming Shadow of Cyber Infiltration: 3,191 Congressional Staffer Personal Data Leaked on Dark Web

The Dark Web Breach: Uncovering the Alarming Consequences of Exposed Congressional Staffer Data

Published: Thu Sep 26 08:56:20 2024



Ethical Hacking News

Necro Trojan Resurfaces on Android, Infects 11 Million Devices via Popular Apps



The Necro Trojan malware has resurfaced on Android devices, infecting 11 million users across popular apps and game mods. With its advanced obfuscation techniques and steganography methods, this new variant poses a significant threat to mobile security. Read the full article to learn more about the resurgence of Necro Trojan and how to protect yourself against this malicious malware.

Published: Thu Sep 26 09:15:19 2024



Ethical Hacking News

Ransomware: The Growing Threat to Global Cybersecurity


Ransomware has become a growing threat to global cybersecurity, with various types of malware using social engineering tactics, malicious ads, and other methods to spread infections. By understanding the risks and taking proactive measures, individuals and businesses can protect themselves from these cyber threats and reduce their chances of falling victim to a ransomware attack.

Published: Thu Sep 26 09:52:13 2024



Ethical Hacking News

Israel's Shadow War: Unveiling the Mysterious Infiltration of Lebanese Telecoms Networks

Israel has been accused of infiltrating Lebanese telecom networks, allowing it to send targeted warnings to specific individuals and groups, sparking concerns about escalating conflict in the region.

Published: Thu Sep 26 11:20:05 2024



Ethical Hacking News

Telegram's Evolving Policy on User Data: A Shift Towards Transparency and Cooperation

Telegram's decision to provide user data to law enforcement in response to legal requests marks a significant shift in the platform's policy on user data. As the company navigates regulatory requirements and balances security with compliance, its users will be watching closely to see how this evolution unfolds.

Published: Thu Sep 26 11:37:03 2024



Ethical Hacking News

A Critical Container Toolkit Bug Exposes Cloud Environments to Host Takeover


In a recent security alert, Nvidia has revealed a critical vulnerability in its widely used Container Toolkit that could allow a rogue user or software to escape their containers and take complete control of the underlying host. The bug, tracked as CVE-2024-0132, earned a 9.0 out of 10 CVSS severity rating, making it one of the most critical security issues in recent times.

Published: Fri Sep 27 17:08:04 2024



Ethical Hacking News

A Closed Ecosystem is Not Anticompetitive: Google's Case Against DOJ's Ad Tech Antitrust Trial


In a high-stakes antitrust trial, Google has taken the defense that its closed ad ecosystem is not anticompetitive, but rather safer for users. The Department of Justice (DOJ) claims that Google's dominance in the ad tech market stifles competition, while Google argues that a more controlled environment protects both advertisers and publishers from malicious actors.



Published: Fri Sep 27 17:33:22 2024



Ethical Hacking News

Micrsoft's Recall Feature: A Double-Edged Sword for Security and Privacy



Microsoft's latest AI-powered feature, Recall, aims to enhance user productivity by providing a visual activity log of Windows desktop activities. However, concerns over privacy and security have been raised, prompting the company to revise its design and implementation.



Published: Fri Sep 27 20:33:53 2024



Ethical Hacking News

HPE Patches Critical Security Holes in Aruba PAPI, Raising Concerns Among Sysadmins


Hewlett Packard Enterprise (HPE) has released patches for three critical security vulnerabilities in its networking subsidiary's Proprietary Access Protocol Interface (PAPI), raising concerns among sysadmins. The patches aim to address flaws found in Aruba's AOS-8 and AOS-10 operating systems, which are rated 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS). This development underscores the importance of ongoing vigilance in addressing emerging vulnerabilities and staying abreast of the latest developments in network security.

Published: Fri Sep 27 21:13:13 2024



Ethical Hacking News

The World-First Mobile Crypto Drainer App: A Wake-Up Call for Web3 Users

Researchers have identified a world-first mobile crypto-draining attack on Google's Play Store, targeting web3 users exclusively with a dodgy app dubbed "WalletConnect." The attackers stole $70,000 from victims who downloaded the malicious app, which was masqueraded as an official WalletConnect protocol app. This incident highlights the need for advanced security solutions and cybersecurity awareness to protect web3 users from such malicious activities.

Published: Fri Sep 27 21:29:44 2024



Ethical Hacking News

Promptly Patching Critical Flaws: Progress Software Releases Latest Security Updates for WhatsUp Gold

Progress Software has released a patch for WhatsUp Gold addressing six critical security flaws, including two rated at CVSS 8.8 and one at CVSS 9.8, in an effort to mitigate the threat posed by malicious actors.

Published: Fri Sep 27 22:07:41 2024



Ethical Hacking News

Critical Linux CUPS Printing System Flaws Leave Systems Vulnerable to Remote Command Execution

Four critical vulnerabilities have been discovered in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. Learn more about the discovery and how you can protect your organization from these potential threats.

Published: Fri Sep 27 22:22:19 2024



Ethical Hacking News

The Dark Web's Dirty Dozen: US Sanctions Two Crypto Exchanges for Money Laundering and Cybercrime Facilitation



The U.S. government has taken a major step in its efforts to combat cybercrime and money laundering by imposing sanctions on two cryptocurrency exchanges, Cryptex and PM2BTC. The move is part of an ongoing law enforcement crackdown called Operation Endgame and is aimed at disrupting networks that facilitate illicit activities. Two Russian nationals have been charged with involvement in the operation of several money laundering services offered to cybercriminals.

Published: Fri Sep 27 23:06:11 2024



Ethical Hacking News

A Critical NVIDIA Container Toolkit Vulnerability: A Threat to Cloud Security

A critical vulnerability in NVIDIA's container toolkit has exposed hosts to complete takeover, highlighting the importance of prioritizing cloud security. With patches now available, organizations must take immediate action to safeguard their operations.

Published: Fri Sep 27 23:14:40 2024



Ethical Hacking News

Hacking the Highway: The Alarming Discovery of Remote Vehicle Control via License Plates


A recent discovery by cybersecurity researchers has revealed a set of critical vulnerabilities in Kia vehicles that could potentially allow hackers to remotely control key functions using only a license plate. The implications are alarming, highlighting the need for urgent attention and action from automotive manufacturers, governments, and consumers alike.

Published: Fri Sep 27 23:20:09 2024



Ethical Hacking News

New Malware Strains Uncovered: KLogEXE and FPSpy Used in Targeted Attacks by North Korean Hackers


North Korean hackers, attributed to group Kimsuky or APT43, have deployed two new malware strains dubbed KLogExe and FPSpy in targeted attacks. These malware strains represent enhancements to Sparkling Pisces' existing arsenal, highlighting the group's continuous evolution and increasing capabilities.

Published: Fri Sep 27 23:48:32 2024



Ethical Hacking News

Reclaiming Control: Mastering the Art of Effective SIEM Management



The Hacker News presents a comprehensive guide to reclaiming control from overwhelmed Security Information and Event Management (SIEM) systems, providing actionable insights for organizations seeking to transform their approach to security.



Published: Fri Sep 27 23:54:07 2024



Ethical Hacking News

The Tor Project and Tails Merge Operations: A New Era in Cybersecurity

The Tor Project and Tails OS have merged operations to enhance collaboration, expand training, outreach, and strengthen their efforts to protect users globally from digital surveillance and censorship.

Published: Sat Sep 28 00:22:57 2024



Ethical Hacking News

Cyber Vandalism on Public Wi-Fi Networks: A Threat to Global Security



UK train stations have been hit by a sophisticated cyberattack spreading an anti-Islam message on public Wi-Fi networks. The attack has raised concerns about the potential for hate speech and propaganda on public platforms. As the use of public Wi-Fi networks continues to grow, so too does the risk of attacks like this one. It is essential that we prioritize cybersecurity and take steps to protect ourselves from such threats.

Published: Sat Sep 28 00:40:12 2024



Ethical Hacking News

The Dark Side of Cryptocurrency: U.S. Sanctions Cryptex and PM2BTC for Facilitating Illicit Activities

The U.S. government has sanctioned two cryptocurrency exchanges, Cryptex and PM2BTC, for allegedly facilitating cybercrime and money laundering. The sanctions are part of a broader effort to combat Russian money laundering operations and hold accountable those who facilitate illicit activities in the cryptocurrency industry.

Published: Sat Sep 28 01:22:53 2024



Ethical Hacking News

Crypto Scam App Uncovered: A Sophisticated Deception in the WalletConnect Ecosystem

A recent discovery by cybersecurity researchers has uncovered a malicious Android app that masqueraded as the legitimate WalletConnect open-source protocol, leading to the theft of approximately $70,000 in cryptocurrency over a period of nearly five months. Learn more about this sophisticated deception and how you can protect yourself from similar threats.

Published: Sat Sep 28 07:50:40 2024



Ethical Hacking News

A Cyberattack on Kuwait's Health Ministry Sparks Concerns Over Patient Safety

A recent cyberattack on the Kuwait Health Ministry has left the country's hospitals reeling, with multiple systems disrupted and the Sahel healthcare app disabled. The attack highlights the growing threat posed by cyberattacks on healthcare organizations worldwide and underscores the importance of robust cybersecurity measures to prevent such threats.

Published: Sat Sep 28 08:27:54 2024



Ethical Hacking News

A Glitchy Disaster: Microsoft's Patch Tuesday Preview Leaves Windows 11 Users Reeling



Microsoft's latest attempt to bring stability and security updates to its Windows 11 operating system has ended up being a disaster. The company released an optional preview update, known as KB5043145, last week, which has been met with widespread criticism from users and IT professionals alike. According to reports from Microsoft's support article and the company's feedback forum, this latest update has caused a plethora of problems, including stability issues, blue or green screens, and glitches with USB and Wi-Fi connectivity.



Published: Mon Sep 30 09:27:12 2024



Ethical Hacking News

Global News Agence France-Presse Hit by Sophisticated Cyberattack: What We Know So Far



Agence France-Presse, one of the world's leading global news agencies, has fallen victim to a sophisticated cyberattack that has left its partners and clients grappling with the implications. The attack, which occurred on Friday, September 30th, 2024, at approximately 10:19 AM, sent shockwaves through the media industry as it impacted AFP's IT systems and content delivery services.



Published: Mon Sep 30 09:41:48 2024



Ethical Hacking News

The Unreliable Shield: Remote ID Verification Technology Falls Short on Equitability



The US government's efforts to implement remote identity verification (RiDV) technology have hit a snag due to the revelation of significant bias, inconsistency, and unreliability in five RiDV products tested across various demographic groups. The study's findings have sparked concerns about inequitable treatment of certain groups within the US government's online platforms.



Published: Mon Sep 30 09:54:24 2024



Ethical Hacking News

Cybersecurity Woes: Cloud Threats Loom Large as Executives Struggle to Stay Ahead

Cybersecurity experts are sounding the alarm about cloud threats, which have become a major concern for top executives. The latest PwC report reveals that cloud threats are the leading cause of security worry among business leaders, with 42% citing them as their most significant threat.

Published: Mon Sep 30 10:00:23 2024



Ethical Hacking News

AI Package Name Hallucinations: A Growing Threat to Software Security

The increasing reliance on large language models (LLMs) for code generation has raised concerns about the potential for AI-generated package names to be fabricated or inaccurate. A recent study conducted by researchers from the University of Texas at San Antonio, the University of Oklahoma, and Virginia Tech shed light on this pressing concern, highlighting the need for robust security measures and stringent quality control checks when deploying LLMs in public-facing applications.

Published: Mon Sep 30 10:07:22 2024



Ethical Hacking News

Cybersecurity Threats on the Rise: A Growing Concern for Individuals and Organizations

Cybersecurity threats are becoming increasingly prevalent, with new and sophisticated attacks emerging every day. From ransomware attacks to nation-state-backed cybercrime, individuals and organizations must take proactive measures to protect themselves against these growing threats.

Published: Mon Sep 30 10:14:13 2024



Ethical Hacking News

Binance's Crackdown on Cross-Border Cryptocurrency Scams: A Global Perspective

Binance has been praised for helping Indian authorities bust a Chinese scam app that was allegedly operating in the country. The exchange's cooperation highlights the growing importance of international cooperation in combating cross-border cryptocurrency scams.

Published: Mon Sep 30 10:20:10 2024



Ethical Hacking News

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

The recent revelation of critical vulnerabilities in automatic tank gauge (ATG) systems has exposed gas stations and other critical infrastructure facilities to remote attacks, posing significant real-world risks to physical damage, environmental hazards, and economic losses.

Published: Mon Sep 30 10:59:48 2024



Ethical Hacking News

Session Hijacking 2.0: The Latest Threat to MFA Adoption


Session hijacking has evolved into an identity-based attack that targets cloud-based apps and services. With 147,000 token replay attacks detected by Microsoft in 2023 alone, this new approach to session hijacking poses a significant threat to MFA adoption. Learn more about how Session Hijacking 2.0 is bypassing traditional security controls and what organizations can do to stay ahead of the evolving threat landscape.

Published: Mon Sep 30 11:06:53 2024



Ethical Hacking News

A Comprehensive Examination of Recent Cybersecurity Incidents: A Growing Concern for Global Security

Recent incidents highlighted by the Lockbit ransomware gang demonstrate its increasing sophistication and ruthlessness, emphasizing the need for robust cybersecurity measures and increased vigilance in addressing emerging threats.

Published: Mon Sep 30 11:40:23 2024



Ethical Hacking News

Israeli Cyber Command Launches Daring Strike on Beirut Airport Control Tower

Israeli intelligence officials have confirmed that their cyber command unit successfully breached the communication network of the Rafic Hariri International Airport in Beirut, Lebanon, prompting an Iranian civilian plane to change course and return to Tehran.

Published: Mon Sep 30 12:33:18 2024



Ethical Hacking News

Widespread Vulnerabilities Found in Court and Government Systems Across the US

Widespread Vulnerabilities Found in Court and Government Systems Across the US. A recent series of disclosures highlights critical vulnerabilities in commercial platforms used by hundreds of courts and government agencies, raising serious concerns about the security and integrity of these systems.

Published: Mon Sep 30 19:02:57 2024



Ethical Hacking News

Rackspace Systems Hit by Zero-Day Exploit in Third-Party Application


A recent zero-day exploit in a third-party application highlights the ongoing threat of sophisticated cyber attacks and the importance of robust security measures. The incident serves as a wake-up call for cloud hosting companies to prioritize their security measures and stay ahead of emerging threats.



Published: Mon Sep 30 19:49:11 2024



Ethical Hacking News

Ransomware Rattles Healthcare System: A Glimpse into the Devastating Consequences


The University Medical Center in Lubbock, Texas, has been forced to turn away ambulances after a devastating cyberattack by ransomware operators. The attack has severely limited the hospital's operations, putting its patients' lives at risk. As the situation continues to unfold, experts are warning of the potential for immense ripple effects from this type of attack.

Published: Mon Sep 30 19:56:14 2024



Ethical Hacking News

Patelco Credit Union Data Breach Exposes Sensitive Information of Over 1 Million Individuals

Patelco Credit Union has disclosed that its systems were compromised by a ransomware attack this summer, affecting over 1 million individuals. The incident highlights the importance of robust cybersecurity measures and ongoing vigilance. By staying informed and taking necessary steps to secure their personal information, individuals can minimize the risk of falling victim to similar attacks in the future.

Published: Mon Sep 30 20:28:52 2024



Ethical Hacking News

Rackspace Systems Compromised by Zero-Day Exploit of Third-Party ScienceLogic Application

Rackspace's internal monitoring web servers were compromised by an attacker who exploited a zero-day vulnerability in a third-party ScienceLogic application, highlighting the importance of proactive security measures and transparent communication in protecting against emerging cyber threats.

Published: Tue Oct 1 08:07:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malicious Swarm Botnet Exploits Docker API for Cryptojacking Campaign



A new cryptojacking attack has been discovered that exploits vulnerabilities in the Docker API to create a malicious swarm botnet, compromising multiple Docker hosts and expanding the threat actor's control over these compromised systems. The attackers used a combination of Internet scanning tools and the Docker Engine API to gain initial access and deploy cryptocurrency miners on compromised containers, ultimately turning the compromised systems into a botnet for further exploitation.

Published: Tue Oct 1 08:30:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cyber Landscape Shattered: The Ongoing Saga of Attacks, Exploits, and Intrusions

Recent cyberattacks have exposed vulnerabilities in various systems, highlighting the need for enhanced security measures and a proactive approach to protecting sensitive information.

Published: Tue Oct 1 08:51:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Uncovering the Web of Deceit: The Shocking Links between Evil Corp and Russian Intelligence



Published: Tue Oct 1 11:01:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Menace of Unpatched Routers: A Deluge of Vulnerabilities Exposed by U.S. CISA



Four new vulnerabilities have been added to CISA's Known Exploited Vulnerabilities catalog, highlighting the ongoing need for enhanced network security vigilance. The four newly added vulnerabilities include a Command Injection Vulnerability in D-Link DIR-820 Router, an OS Command Injection Vulnerability in DrayTek Multiple Vigor Routers, a Null Pointer Dereference Vulnerability in Motion Spell GPAC, and a Deserialization of Untrusted Data Vulnerability in SAP Commerce Cloud. Organizations must take immediate action to address these known exploited vulnerabilities by conducting vulnerability assessments, implementing patches and updates, configuring firewalls and intrusion detection systems, establishing incident response capabilities, and maintaining accurate records of remediation activities. By doing so, businesses can mitigate potential risks and ensure their networks remain secure in an ever-evolving threat landscape.

Published: Tue Oct 1 11:49:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attack Brings Healthcare System to Its Knees: UMC Health System Diverts Patients Amidst IT Outage


A recent ransomware attack on UMC Health System has forced the organization to divert patients due to an ongoing IT outage. The hospital has noted that the investigation into the security incident is still ongoing, and updates will be provided when more information becomes available. This cybersecurity incident highlights the need for healthcare organizations to have robust measures in place to protect against such threats.

Published: Tue Oct 1 13:28:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Evil Corp Hit with New Sanctions: BitPaymer Ransomware Charges Weigh Heavy

The sanctions imposed on Evil Corp members mark an escalation in the ongoing battle against this notorious group. The recent development highlights the importance of cooperation and education in mitigating the threat posed by these malicious actors, as well as the need for continued awareness and innovation in cybersecurity defenses.

Published: Tue Oct 1 13:55:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Paragon Puzzle: Unraveling the Complexities of US Government Spying Contracts

The United States Immigration and Customs Enforcement (ICE) agency has signed a lucrative contract worth $2 million with Israeli commercial spyware vendor Paragon Solutions, sparking concerns about the misuse of such technology. As part of a broader effort to reshape the commercial spyware market, the US government aims to prevent the misuse of spyware while promoting its responsible use.

Published: Tue Oct 1 14:18:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Evil Corp: The Notorious Russian Cybercrime Gang with Ties to NATO Allies

Evil Corp, a notorious Russian cybercrime gang with ties to NATO allies, has been making headlines in recent years. In a joint report released by the UK's National Crime Agency (NCA), FBI, and Australian Federal Police, new details have emerged about the group's activities, including its use of Lockbit ransomware platform and ties to Russian intelligence. The US Department of State is offering a $5 million reward for information leading to the arrest of Maksim Yakubets and other members of Evil Corp. Learn more about this evolving threat and how we can stay ahead of it.

Published: Tue Oct 1 14:38:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rackspace Monitoring Data Breach Exposes Sensitive Customer Information via ScienceLogic Zero-Day Attack


Rackspace monitoring data was stolen following a zero-day attack on its ScienceLogic SL1 platform, exposing sensitive customer information. The breach highlights the importance of staying vigilant against zero-day attacks and taking swift action to address them.

Published: Tue Oct 1 21:45:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Backlog of Unprocessed Vulnerability Reports: A Threat to Global Cybersecurity

The US government's National Institute of Standards and Technology (NIST) has been struggling to clear its backlog of unprocessed vulnerability reports, leaving many experts and organizations concerned about the impact this may have on global cybersecurity.

Published: Wed Oct 2 08:35:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unstable Foundation: How RPKI's Weaknesses Expose the Internet to Further Attacks



Published: Wed Oct 2 08:53:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CosmicSting: The Devastating Magento and Adobe Commerce Vulnerability Exploited by Malicious Actors



Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. This critical flaw, which allows arbitrary file reading on unpatched systems, has resulted in widespread attacks across the globe, with at least seven distinct groups identified as partaking in these exploitation efforts. In light of these findings, it is essential for Magento and Adobe Commerce store owners to take immediate action to protect their systems against this devastating vulnerability.

Published: Wed Oct 2 09:06:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of North Korea's Andariel Hacking Group: A Shift to Financial Attacks on U.S. Organizations

Andariel, a highly sophisticated state-sponsored threat actor, has recently shifted its focus from espionage operations to financially motivated attacks on U.S. organizations, marking a significant escalation of the threat landscape. To stay ahead of these threats, businesses must understand the tactics and techniques employed by Andariel and take proactive measures to protect themselves against state-sponsored attack.

Published: Wed Oct 2 09:39:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rhadamanthys Information Stealer: A Malicious AI-Driven Tool for Cryptocurrency Thieves


Rhadamanthys information stealer, a highly sophisticated AI-driven malware tool, has been upgraded to version 0.7.0 with advanced features including AI-powered Optical Character Recognition (OCR) for extracting cryptocurrency seed phrases from images. This malicious software is designed specifically for stealing sensitive information from infected systems and offers a subscription fee of $250 per month or $550 for 90 days. Stay informed about emerging threats like Rhadamanthys and learn how to protect yourself against sophisticated malware tools.

Published: Wed Oct 2 11:06:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mass Exploitation of Critical Zimbra Vulnerability



Published: Wed Oct 2 22:30:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unveiling of OpenStack Dalmatian: A New Era for Cloud Computing

OpenStack's 30th edition, Dalmatian, has been released, bringing a new dashboard, improved GPU support, and enhanced security features to the table. This latest iteration promises to further establish OpenStack as a viable alternative to established cloud players like VMware.

Published: Wed Oct 2 22:36:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FCC Launches $200 Million Pilot Program to Protect Schools and Libraries from Cyber Threats

The Federal Communications Commission (FCC) has unveiled a $200 million pilot program aimed at bolstering the cybersecurity defenses of schools and libraries across the United States, providing funding for advanced firewalls, identity protection services, malware protection, Virtual Private Networks (VPNs), and other measures to combat cyber attacks. The Schools and Libraries Cybersecurity Pilot Program seeks to equip these institutions with the necessary tools and resources to protect against growing threats.

Published: Wed Oct 2 22:44:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Zimbra RCE Vulnerability Exploited to Compromise Email Servers via Phishing Emails

Recently disclosed RCE vulnerability in Zimbra email servers has been actively exploited through phishing emails, allowing hackers to gain unauthorized access. Upgrading to newer versions or applying mitigating steps are recommended to prevent further exploitation.

Published: Thu Oct 3 00:04:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Incarnate: The Rise of Real-Time Facial Recognition with Meta Glasses

Meta glasses have become a tool for surveillance, raising concerns about data privacy and security. A Harvard student has demonstrated how to use facial recognition technology with $379 Meta Ray-Ban 2 smart sunglasses to extract personal information in real-time, sparking questions about consent, privacy, and the potential misuse of such technology.

Published: Thu Oct 3 00:14:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Draytek Debacle: 700,000 Routers Vulnerable to Exploitation by Malicious Actors

Breaking News: 700K+ Draytek Routers Exposed to Public Internet, Vulnerable to Remote Hijacking and Exploitation

Published: Thu Oct 3 00:20:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play: A Growing Concern for Cybersecurity


Fake trading apps have become a significant threat to global cybersecurity, with a growing number of victims falling prey to these malicious applications. These apps, often disguised as legitimate investment platforms, promise quick financial gains to lure unsuspecting users into making significant investments. As the global landscape continues to evolve, it is essential for users to remain vigilant and take proactive measures to protect themselves from falling victim to such scams.

Published: Thu Oct 3 00:32:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities


DrayTek router security: 14 new vulnerabilities discovered in millions of devices worldwide, with patches already released by the manufacturer to address these issues.


Published: Thu Oct 3 01:26:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Transparency: Telegram's U-Turn on User Data Sharing

Telegram has shared U.S. user data with law enforcement on over a dozen occasions, potentially revealing IP addresses or phone numbers of hundreds of users. The company's decision to comply with law enforcement requests raises concerns about online privacy and security.

Published: Thu Oct 3 01:43:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Facial Recognition Data Breach: The Rise of Real-Time Surveillance with Meta Glasses



Facial Recognition Data Breach: The Rise of Real-Time Surveillance with Meta Glasses

A Harvard student's experiment using facial recognition technology with Meta Ray-Ban 2 smart glasses raises questions about our increasing reliance on surveillance and data collection in everyday life.



Published: Thu Oct 3 03:21:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ivanti Endpoint Manager Flaw: A Critical Security Breach Exposed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of a security flaw in Ivanti Endpoint Manager (EPM). The identified vulnerability, tracked as CVE-2024-29824, carries an elevated CVSS score of 9.6 out of a maximum of 10.0, underscoring its critical severity.

Published: Thu Oct 3 03:46:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of License Plate Recognition: A Surveillance State on steroids

License plate recognition technology has become an increasingly ubiquitous tool in modern surveillance, raising significant concerns about individual privacy and civil liberties. As companies like DRN collect vast amounts of data on citizens' vehicles, it is essential that policymakers take steps to ensure that these tools are used responsibly and in accordance with human rights standards.

Published: Thu Oct 3 06:33:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Consequences of Cybercrime: British-Nigerian Men Sentenced for Multimillion-Dollar Business Email Scam



Two British-Nigerian men have been sentenced to prison for their involvement in a multimillion-dollar business email scam that targeted various organizations in the United States, including local government entities, colleges, and construction firms. The scammers, Oludayo Kolawole John Adeagbo and Donald Ikenna Echeazu, exploited tactics such as registering domain names similar to those of clients or customers of the victim organizations and preying on unwitting staff to order seemingly routine payments to their own accounts. This article will delve into the details of the scam, the methods used by the scammers, and the impact of the case on law enforcement efforts.



Published: Thu Oct 3 07:46:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cloud-Based Pandora's Box: The Rise of AI-Powered Sex Chat Services

In a disturbing trend, cybercriminals are exploiting cloud credentials to operate and resell AI-powered sex chat services, often veering into darker role-playing scenarios, including child sexual exploitation and rape. As researchers warn, the use of stolen cloud credentials can feed an army of AI sex bots, posing significant security risks for organizations.

Published: Thu Oct 3 08:54:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New VeilShell Backdoor Malware Reveals Sophistication of North Korean Hackers' Stealthy Attacks


North Korean hackers have been using a new backdoor malware called VeilShell as part of their stealthy cyber attacks, targeting Cambodia and likely other Southeast Asian countries. The malicious activity is believed to be the handiwork of APT37, also known as InkySquid, Reaper, RedEyes, Ricochet Chollima, Ruby Sleet, and ScarCruft. This article provides a detailed analysis of the VeilShell malware and its tactics, highlighting the sophistication of North Korean hackers' attacks and the need for organizations to stay vigilant against such threats.

Published: Thu Oct 3 09:21:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lurking in Plain Sight: The Years-Long Cryptomining Campaign Behind "perfctl" Linux Malware


A recent study by Aqua Nautilus has revealed that a Linux malware known as "perfctl" has been secretly mining cryptocurrency using infected servers for years. Dubbed a significant threat to system administrators, the malware remains evasive in its approach to evading detection and removal from compromised systems.

Published: Thu Oct 3 10:52:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Perilous Realm of Non-Human Identities: A Growing Concern for Enterprise Security



The cybersecurity landscape has undergone a significant transformation over the past decade, as traditional perimeter-based security measures have become increasingly obsolete. Non-human identities (NHIs) pose a unique challenge for enterprise security teams and require a comprehensive approach to secrets security to mitigate risks. Discover how organizations can adopt a robust secrets security strategy to bolster their overall security posture and reduce attack surfaces.

Published: Thu Oct 3 11:08:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Perfctl Malware Campaign Targets Linux Servers for Cryptocurrency Mining and Proxyjacking


A newly discovered malware campaign dubbed perfctl is targeting Linux servers for cryptocurrency mining and proxyjacking, leaving cybersecurity experts scrambling to address this emerging threat. To learn more about the perfctl malware campaign and how it can be mitigated, read on for an in-depth examination of the TTPs and countermeasures employed by the attackers.

Published: Thu Oct 3 11:13:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Over 4,000 Unpatched Adobe Commerce and Magento Stores Compromised by Exploiting Critical Vulnerability CVE-2024-34102: A Threat Assessment

A recent attack exploiting the CosmicSting vulnerability has compromised over 4,000 e-stores, including major organizations such as Ray-Ban and Cisco. The vulnerability is a critical bug that can result in arbitrary code execution, making it essential for store owners to patch their systems immediately.

Published: Thu Oct 3 11:33:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CosmicSting Attacks: A Looming Shadow Over E-commerce Security



A massive wave of sophisticated attacks dubbed "CosmicSting" has left an alarming number of Adobe Commerce and Magento online stores vulnerable to exploitation, with over 4,000 shops compromised in this unprecedented attack. This article delves into the details of the CosmicSting vulnerability, its impact on e-commerce businesses, and provides actionable advice for protecting against these attacks.



Published: Thu Oct 3 12:44:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dutch Police Data Breach: A State-Sponsored Attack or a Cybersecurity Miscalculation?

The Dutch police force has recently suffered a significant data breach, compromising the personal and professional details of numerous officers. The breach, which was detected last week, is believed to have been carried out by a state actor, according to the national police force, Politie.

Published: Thu Oct 3 15:12:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Unveils Enhanced Pixel Security Features to Mitigate 2G Exploits and Baseband Attacks

Google has unveiled a series of innovative security features designed to counter the growing threat posed by 2G exploits and baseband attacks in its latest Pixel devices. The company's efforts come as threat actors continue to employ sophisticated methods to exploit vulnerabilities in cellular basebands, which can potentially lead to remote code execution and other forms of malicious activity.

Published: Thu Oct 3 15:25:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in Zimbra Email Servers: A Cautionary Tale of Malicious Exploitation


A critical vulnerability has been identified in Zimbra email servers, which are being actively exploited by attackers to remotely execute malicious commands and install a backdoor. The vulnerability, tracked as CVE-2024-45519, resides in the postjournal service of Zimbra mail servers used by medium and large organizations. While the exploitation is considered relatively easy, its reliability remains uncertain, leaving defenders with a challenging task to mitigate the risk associated with this vulnerability.

Published: Fri Oct 4 09:38:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Perfctl: A Stealthy Malware Strain Infecting Thousands of Linux Systems

A sophisticated malware strain known as Perfctl has been infecting thousands of Linux systems since 2021, evading detection through over 20,000 common misconfigurations and advanced evasion techniques.

Published: Fri Oct 4 10:11:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Latest Experiment: Verified Checkmarks in Search Results

Google is conducting a limited experiment with verified checkmarks in search results, signaling genuine businesses to users as part of its ongoing efforts to protect users from potential scams. The blue ticks appear next to links from trusted companies like Meta and Apple, reassuring users about the authenticity of the linked business.

Published: Fri Oct 4 10:32:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Elusive Passcode: The FBI's Struggle to Access Eric Adams' Cellphone

The FBI's struggle to access New York City Mayor Eric Adams' cellphone has raised questions about the effectiveness of password protection and the limits of investigative power.

Published: Fri Oct 4 10:37:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FCC Announces $200 Million Initiative to Enhance Cybersecurity for Schools and Libraries

The Federal Communications Commission (FCC) has launched a $200 million pilot program aimed at protecting schools and libraries from cyber threats, with the ultimate goal of providing long-term protection and security measures for these critical infrastructure entities.

Published: Fri Oct 4 10:42:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Justice Department and Microsoft Disrupt Russian Hacking Operations Targeting US Officials and Civil Society

In a significant development, the U.S. Department of Justice has teamed up with Microsoft to disrupt a global computer intrusion campaign orchestrated by Russia's Federal Security Service, aimed at hacking current and former U.S. officials, civil-society groups, and Russians living in the U.S.

Published: Fri Oct 4 11:08:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Mischief: The Rise of AI-Generated Phishing Sites

AI-generated phishing sites are becoming increasingly sophisticated, with notorious Russian cybercrime group Fin7 using these platforms to spread malware and trick victims into divulging sensitive information. This article provides an in-depth look at the rise of AI-generated phishing sites and the measures organizations can take to protect themselves against these emerging threats.

Published: Fri Oct 4 11:48:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Average North American CISO Pay Skyrockets to $565,000: A Tale of Inflation, Incentives, and Industry Trends

Average North American CISO pay has skyrocketed to $565,000, driven by inflation, incentives, and industry trends. The tech industry is leading the way, while education and healthcare sectors trail behind. With bonuses and equity factored in, CISOs are among the highest-paid executives in the industry.

Published: Fri Oct 4 12:31:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crooks 'Like a Sysadmin' Use New MedusaLocker Variant to Infect 100+ Orgs Monthly

Exclusive: A new ransomware variant called BabyLockerKZ has been used by an extortionist dubbed "PaidMemes" to infect hundreds of organizations worldwide every month since at least 2022. The attacker's tactics appear to be opportunistic, targeting small and medium-sized businesses across multiple industries in various regions.

Published: Fri Oct 4 12:50:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Optigo Network Switch Vulnerabilities: A Call to Action for Critical Manufacturing

Two critical vulnerabilities have been found in Optigo's Spectra Aggregation Switch, which can be exploited by a remote attacker to inject malware into OT network management switches. Organizations are advised to take immediate action to secure their networks and ensure that all devices running version 1.3.7 and earlier are updated with the latest security patches.

Published: Fri Oct 4 13:11:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Crackdown on Russian State-Sponsored Cybercrime: A Major Step Forward for International Cooperation



A recent surge in spear-phishing campaigns carried out by Russian state-sponsored actors has left many experts on high alert. This article provides an in-depth analysis of the evasive tactics used by these groups, highlighting the need for organizations to stay ahead of the threats and adopt robust security measures to protect sensitive information.

Published: Fri Oct 4 13:47:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cybersecurity: Understanding Continuous Threat Exposure Management (CTEM)


The Evolution of Cybersecurity: Understanding Continuous Threat Exposure Management (CTEM) is a strategic framework designed to help organizations continuously assess and manage cyber risk. Learn how CTEM can strengthen your organization's security posture and reduce the overall risk to your business.

Published: Fri Oct 4 13:54:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A High-Severity Security Flaw in WordPress LiteSpeed Cache Plugin Exposes Sites to XSS Attacks

Millions of WordPress sites are exposed to cross-site scripting (XSS) attacks due to a recently discovered vulnerability in the LiteSpeed Cache plugin. To protect yourself, update your plugin immediately.

Published: Fri Oct 4 14:10:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ScarCruft APT Group: Uncovering the Threats and Tactics of a Suspected North Korean Actor



The ScarCruft APT group has been identified as a sophisticated threat actor linked to North Korea's Ministry of State Security. The group employs various tactics and techniques, including the use of malware tools such as "FadeStealer" and "AblyGo backdoor." SentinelOne researchers have observed an increase in activity from ScarCruft, indicating a continued focus on acquiring strategic intelligence and possibly gaining insights into non-public cyber threat intelligence and defense strategies. The group's tactics and techniques employed by the ScarCruft APT group are likely to evolve over time, making it essential for organizations to remain vigilant and implement robust cybersecurity measures to protect themselves against these threats.

Published: Fri Oct 4 14:47:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Complex Web of LockBit: Understanding the Sophisticated Ransomware Threat Actors



The LockBit ransomware threat actor has been identified as one of the most effective groups in recent history, known for its relentless pursuit of financial gain through the exploitation of vulnerabilities in computer systems. This article provides a comprehensive analysis of LockBit 3.0, including its tactics, techniques, and procedures (TTPs), as well as its indicators of compromise (IOCs). Organizations are advised to remain vigilant and take proactive steps to prevent infection from this sophisticated threat actor.

Published: Fri Oct 4 15:00:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NVD Vulnerability Alert: Ivanti EPM SQL Injection Vulnerability

The National Vulnerability Database (NVD) has issued a critical vulnerability alert for Ivanti Endpoint Manager (EPM), version 2022 SU5 and prior. The vulnerability, identified as CVE-2024-29824, is an unspecified SQL injection flaw that allows an unauthenticated attacker within the same network to execute arbitrary code. Learn more about this high-severity vulnerability and how to mitigate it.

Published: Fri Oct 4 15:07:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Hackers Exploit US ISPs for Cyber Espionage: A Growing Concern for National Security


Chinese hackers have been allegedly hacking into multiple US internet service providers (ISPs) to steal sensitive data and establish persistence. The Chinese APT group, known as Salt Typhoon, has been found to have infiltrated these services in recent months with the ultimate goal of pursuing sensitive information. This growing concern for national security highlights the need for vigilance and awareness among network administrators and cybersecurity professionals.

Published: Fri Oct 4 15:15:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

DrayTek Router Security Update: A Critical Flaw Exposed Over 700,000 Devices


DrayTek Router Security Update: A Critical Flaw Exposed Over 700,000 Devices
DrayTek has released security updates to address a critical flaw in over 700,000 of its routers, which exposes these devices to various security risks. The most critical vulnerability is a remote code execution flaw with the maximum CVSS score of 10.0. DrayTek users are advised to take immediate action to secure their devices.


Published: Fri Oct 4 16:26:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Zimbra Postjournal Flaw Exposed: A Security Nightmare for Enterprise Users



A newly disclosed security flaw in Synacor's Zimbra Collaboration has been found to enable unauthenticated attackers to execute arbitrary commands on affected installations, posing a significant threat to enterprise users. Researchers have identified active exploitation attempts targeting the CVE-2024-45519 vulnerability, which must be patched immediately to prevent potential exploitation.

Cybersecurity researchers have identified active exploitation attempts targeting a newly disclosed security flaw in Synacor's Zimbra Collaboration, designated as CVE-2024-45519. The vulnerability has been found to enable unauthenticated attackers to execute arbitrary commands on affected installations, posing a significant threat to enterprise users.

Published: Fri Oct 4 16:36:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Perfctl Malware Campaign Hijacks Linux Servers for Cryptocurrency Mining and Proxyjacking

The discovery of the perfctl malware highlights the importance of maintaining a secure Linux environment and the need for organizations to stay vigilant in detecting potential security breaches.

Published: Fri Oct 4 17:21:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Record-Breaking DDoS Attack: The ASUS Router Authentication Bypass Vulnerability

Cloudflare has successfully mitigated a record-breaking DDoS attack, peaking at 3.8 Tbps, which is linked to the ASUS router authentication bypass vulnerability (CVE-2024-3080). The attack highlights the need for organizations to prioritize network security and adhere to best practices in preventing similar breaches.

Published: Fri Oct 4 19:19:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NVD Vulnerability Alert: Critical ANGLE Type Confusion Exploit in Google Chrome

Google Chrome users are urged to update their software immediately due to a newly discovered critical vulnerability that allows for type confusion exploits. The National Vulnerability Database has issued an alert, which can be found at . For more information on this vulnerability and how to mitigate the risk associated with it, please visit the Chromium security team's blog post at .

Published: Fri Oct 4 19:53:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Security Threat Emerges: The DrayTek Router Vulnerability Crisis



A global security threat has emerged with the discovery of 14 new vulnerabilities in DrayTek routers, impacting over 700,000 devices across 168 countries. These flaws pose a significant risk to customers worldwide, particularly in commercial settings, and underscore the importance of patching, updating devices regularly, and prioritizing vulnerability management.



Published: Fri Oct 4 20:12:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Rhadamanthys: A Highly Potent Malware Threatening Cryptocurrency Holders


Rhadamanthys information stealer has introduced AI-driven capabilities, allowing it to extract cryptocurrency seed phrases from images, making it a highly potent threat for anyone dealing in cryptocurrencies. In this article, we will delve into the world of Rhadamanthys, exploring its origins, features, and implications for users in the cryptocurrency community.

Published: Fri Oct 4 20:35:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attack Brings Highline Public Schools to a Grinding Halt: A Cautionary Tale for Educational Institutions

Ransomware Attack Brings Highline Public Schools to a Grinding Halt: A Cautionary Tale for Educational Institutions

Published: Fri Oct 4 21:56:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Consequences of Cyberattacks: The Red Barrels Case Study


In a shocking turn of events, Canadian video game developer Red Barrels has announced that its internal IT systems were recently compromised in a cyberattack. The company's production timeline for upcoming projects has been significantly impacted, with some things having to be delayed due to the breach. In this article, we will explore the details of the incident and its implications on the gaming industry.

Published: Fri Oct 4 22:01:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Thousands of Online Stores Infected via CosmicSting Flaw



The devastating impact of CosmicSting: 4,275 online stores compromised by a critical vulnerability

In recent months, thousands of online stores have been targeted by cybercrime gangs exploiting a critical vulnerability known as CosmicSting. This flaw, identified by CVE-2024-34102, allows hackers to manipulate the pages of affected websites and siphon off sensitive user data, including payment card information.

According to Sansec's analysis, at least seven distinct groups are running "large scale" CosmicSting campaigns, using the flaw to obtain secret Magento keys from installations to generate tokens that grant unrestricted access to the Magento API. This allows sites to be edited and manipulated in various ways, including siphoning off sensitive user data.

This article provides an in-depth look at the CosmicSting vulnerability, its impact on online stores, and the measures that can be taken to prevent further attacks.



Published: Fri Oct 4 22:20:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK's Sellafield Nuclear Site Fined £332,500 for Lax Infosec Practices

UK nuclear waste site fined £332,500 for lax cybersecurity practices

Published: Sat Oct 5 01:28:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Landscape of Cybersecurity: Exclusive Insights and Strategies for a Secure Future

Apple has released critical updates for iOS and iPadOS, addressing security vulnerabilities that could have exposed user data.

Published: Sat Oct 5 01:34:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The latest updates from the world of cyber security: A comprehensive analysis

Apple has released its latest iOS 18.0.1 and iPadOS 18.0.1 updates, addressing two critical vulnerabilities that exposed passwords and audio snippets to attackers. These updates come as a response to the growing concerns of cyber security in the digital world, where threats are becoming increasingly sophisticated.

Published: Sat Oct 5 01:53:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Stealthy Malware Menace: A Growing Threat to Linux Systems Worldwide

A recent discovery by Aqua Security has revealed a highly sophisticated and pervasive malware strain that has been quietly infecting thousands of Linux systems worldwide, leaving experts scrambling to comprehend the extent of its reach. In this article, we delve into the world of Perfctl, a malicious entity that has been silently wreaking havoc on unsuspecting machines, and explore the implications of this devastating threat.

Published: Sat Oct 5 09:17:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in WordPress LiteSpeed Cache Plugin Exposes Sites to Malicious Takeovers


A high-severity vulnerability in the popular WordPress LiteSpeed Cache plugin has been discovered, allowing attackers to execute arbitrary JavaScript code under certain conditions. With over six million active installations, this widespread popularity makes it an attractive target for malicious actors seeking to exploit vulnerabilities in widely used plugins. The vulnerability could expose sites to malicious takeovers and further cyber threats.

Published: Sat Oct 5 09:32:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Android Feature Rolls Out to Lock Your Screen if Swiped: A Game-Changer for Smartphone Safety



Google has taken another significant step towards enhancing the security and safety of its Android users, introducing a suite of theft protection features aimed at making it more difficult for thieves to access your data. This new feature, which is now rolling out to various Android devices, includes Theft Detection Lock, Offline Device Lock, and Remote Lock – three innovative features designed to safeguard user's personal information.



Published: Sat Oct 5 11:37:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Unveils Advanced Theft Protection Features for Android Devices


Google has introduced a new set of features aimed at enhancing device security and making it more difficult for thieves to access stolen phones. The new features include Theft Detection Lock, Offline Device Lock, and Remote Lock, which use AI-powered motion detection, offline tracking, and remote locking capabilities to protect users' data.

Published: Sat Oct 5 15:43:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Comcast and Truist Bank Customers Impacted by FBCS Data Breach: A Web of Deceit and Exposed Sensitive Information

Comcast and Truist Bank customers were caught up in a massive data breach at FBCS, with 4.2 million individuals potentially affected. The breach exposed sensitive personal information from electronic records, including full name, Social Security Number, date of birth, account information, driver's license number or ID card, and internal FBCS employee numbers.

Published: Sun Oct 6 11:48:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MoneyGram Cyberattack: Uncovering the Truth Behind the Recent Outage

MoneyGram's recent cyberattack raises more questions than answers. While initial suspicions pointed towards ransomware, a lack of evidence suggests that there is no conclusive link between the two. As this story unfolds, it becomes clear that the true nature of MoneyGram's breach requires a closer examination of cybersecurity threats and tactics.

Published: Sun Oct 6 11:53:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The E.U.'s Decision to Limit Meta's Use of Personal Facebook Data for Targeted Ads: A New Era for Digital Privacy

In a groundbreaking decision, the European Union's top court has ruled that Meta Platforms must restrict the use of personal data harvested from Facebook for serving targeted ads. The ruling marks an important shift in the way personal data is collected and used by social media platforms, and it highlights the importance of data protection and privacy in the digital age.

Published: Mon Oct 7 02:55:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threats of Cybersecurity: A Recap of the Latest Developments



Published: Mon Oct 7 05:36:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Labyrinth: Navigating the Complexities of Threats and Vulnerabilities in the Digital Age

Recent high-profile breaches highlight the growing importance of adopting a proactive and comprehensive approach to cybersecurity. Stay ahead of the curve with expert insights and valuable resources to help you protect yourself against emerging threats.

Published: Mon Oct 7 07:13:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBCS Data Breach: A Wake-Up Call for Comcast Customers


A recent data breach has affected approximately 238,000 Comcast customers, highlighting the importance of being aware of personal information shared with third-party debt collection agencies. The breach was discovered by FBCS in February 2024 and is believed to have occurred between February 14 and February 26, 2024. As a result, Comcast is notifying impacted customers and providing them with free credit monitoring services.

Published: Mon Oct 7 08:31:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cyber Threat Looms: China's Salt Typhoon Hackers Breach US Broadband Providers

A global cyber threat looms as Salt Typhoon hackers breach US broadband providers, raising concerns about national security and the ongoing threat posed by Chinese state-sponsored hacking crews. As governments and private sector companies work together to combat these threats, it is essential for organizations to prioritize cybersecurity and take steps to prevent similar breaches from occurring in the future.

Published: Mon Oct 7 13:18:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Qualcomm Patches High-Severity Zero-Day Exploit Used in Attacks

Qualcomm Releases Patch for High-Severity Zero-Day Vulnerability Amidst Growing Cybersecurity Threats

Published: Mon Oct 7 14:26:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Universal Music Group Data Breach: A Cautionary Tale of Cybersecurity Weaknesses

Universal Music Group has confirmed that approximately 680 individuals had their personal information compromised as a result of an unauthorized access to their internal systems. The company is offering affected individuals free credit monitoring and identity theft protection services to mitigate potential damage.

Published: Mon Oct 7 14:41:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious Manipulation on the High Seas: The Great LEGO Crypto Scam


In a shocking turn of events, the world-renowned toy manufacturer, LEGO, fell victim to a brazen cyberattack, resulting in the brief appearance of a malicious banner on their website. For several hours, unsuspecting users were bombarded with a fake promotion for a fictional cryptocurrency token, branded with the "LEGO" logo and touting "secret rewards." This brazen scheme was carried out by hackers who exploited a security vulnerability to gain unauthorized access to the LEGO website.

Published: Mon Oct 7 16:58:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

American Water Shuts Down Its App Amid Cybersecurity Incident Investigation

American Water Shuts Down Its App Amid Cybersecurity Incident Investigation

The US water industry has been hit with another high-profile cybersecurity breach, this time involving one of its largest regulated providers. American Water has paused its billing operations and taken steps to protect customer data after discovering a breach in its MyWater app. The company is working with law enforcement and outside security investigators to determine the cause of the incident and prevent any further harm.

Published: Mon Oct 7 17:11:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Rollout of Android's Enhanced Theft Protection Features: A New Era for Mobile Device Security

Google has rolled out three advanced features designed to prevent thieves from profiting from stolen phones, including Theft Detection Lock, Offline Device Lock, and Remote Lock. These innovative features leverage machine learning algorithms, advanced threat detection capabilities, and user-friendly interfaces to create a safer mobile ecosystem that protects users from cybercrime threats.

Published: Mon Oct 7 22:52:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cyber War Between Ukraine and Russia: A New Front in the Information Battlefield

Pro-Ukrainian hackers launched a devastating attack on Russian state TV company VGTRK on October 7th, just one day before Vladimir Putin's birthday. The assault targeted the company's operations and caused significant damage to its systems, highlighting the ongoing cyber war between Ukraine and Russia.

Published: Tue Oct 8 02:22:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

GoldenJackal: The Sophisticated Threat Actor Targeting Embassies and Governmental Organizations

GoldenJackal, a sophisticated threat actor, has been linked to a series of cyber attacks targeting embassies and governmental organizations with the aim of infiltrating air-gapped systems. The attacks demonstrate a high degree of sophistication and resourcefulness on the part of GoldenJackal, highlighting the ongoing threat posed by this threat actor.

Published: Tue Oct 8 05:53:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Invisible Threat in Online Shopping: How Evil Twin Checkout Pages Can Steal Your Payment Information


A malicious "evil twin" checkout page can compromise your payment information, leading to financial losses and reputational damage. Learn how advanced security solutions like Reflectiz can protect you from these types of attacks.


Published: Tue Oct 8 07:10:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Kaspersky's Google Play Store Exodus: A Tale of US Restrictions and Corporate Resilience

Kaspersky's departure from the Google Play Store highlights the delicate balance between regulatory frameworks, corporate resilience, and global cybersecurity concerns. What does this mean for users and what can be learned from this incident?

Published: Tue Oct 8 09:42:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Zero-Day Vulnerability in Qualcomm's Products: A Critical Threat to Cybersecurity

Qualcomm's zero-day vulnerability, CVE-2024-43047, has raised concerns about the security of mobile devices. The vulnerability could be exploited by hackers for limited, targeted attacks, highlighting the importance of prompt patching and device manufacturer vigilance.

Published: Tue Oct 8 10:06:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian TV Stations Under Attack: A Cyber Warfare Escalation

Russian President Vladimir Putin's birthday was marked by a coordinated cyberattack on Russian TV stations and websites, leaving many without access to their digital infrastructure. The attack, attributed to hackers calling themselves the BO Team, is seen as an escalation of ongoing tensions between Russia and Ukraine in the realm of digital conflict.

Published: Tue Oct 8 11:30:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Addresses Five Zero-Day Vulnerabilities in October 2024 Patch Tuesday Updates



Published: Tue Oct 8 14:19:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Announces End-of-Servicing for Windows 11 22H2 Home and Pro Editions



Published: Tue Oct 8 16:55:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micorosft Issues 117 Patches, Including Two Under Active Attack

Microsoft has released its monthly patch cycle, dubbed Patch Tuesday, which includes a staggering 117 patches for various vulnerabilities and flaws across multiple software platforms. Stay ahead of the curve by understanding the latest Windows patches and SAP security vulnerabilities.

Published: Tue Oct 8 18:59:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Security Update Patch for 118 Vulnerabilities, Two Actively Exploited Flaws

Microsoft Releases Patch for 118 Vulnerabilities, Two Actively Exploited Flaws

Published: Wed Oct 9 03:26:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerabilities Uncovered: CISA Adds Windows, Qualcomm, and Microsoft Bugs to Known Exploited Vulnerabilities Catalog


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added numerous vulnerabilities, including Windows and Qualcomm bugs, to its Known Exploited Vulnerabilities catalog. These additions highlight the ongoing commitment of CISA to enhancing the nation's cybersecurity posture by providing timely information on potential threats.

Published: Wed Oct 9 03:45:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apt-Worthy Targets: APT Group Awaken Likho Strikes Russian Government With Advanced Malware Implant

The sophisticated threat actor group, Awaken Likho, has targeted the Russian government with a new implant, marking a significant escalation in the ongoing cat-and-mouse game between nation-state actors and cybersecurity professionals. This attack highlights the evolving nature of cyber warfare and emphasizes the need for enhanced security measures to protect sensitive information systems.

Published: Wed Oct 9 09:24:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Scoop on Prime Day: Amazon's Hottest Deals and Discounts

Amazon is offering an unbeatable $329 deal on Bose's premium QuietComfort Ultra headphones during Prime Day, marking the lowest recorded price since their launch.

Published: Wed Oct 9 10:36:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Resolves Patch Tuesday Preview Issues, Ensures Important Security Fixes Are Deployed



The recent Patch Tuesday preview update for Windows 11, known as KB5043145, was met with disappointment from many users due to its performance issues. The non-security update was released at the end of September and caused multiple restarts, blue or green screens, and even failed connections to USB and Bluetooth devices for some users. However, it appears that Microsoft has taken steps to resolve these issues, as confirmed by the company in their latest known issues list.

The problem with the original patch has been dealt with and is listed as fixed in the updated list. This resolution ensures that the security fixes released in yesterday's Patch Tuesday update are deployed without any further disruptions.

The security fixes included in the recent update addressed a remote code execution flaw, which had already been exploited by attackers. However, the update also included all the improvements featured in September's preview. While this may have caused inconvenience to some users, Microsoft has assured that the issues with multiple restarts after installing the September preview have been fixed.

Microsoft advises users who have installed the earlier update to make use of a Known Issue Rollback (KIR) or a Group Policy to deal with any problems they might be experiencing. This solution provides users with an alternative way to address the issue, ensuring that they can continue using their systems without interruption.

The recent Patch Tuesday release was significant for Home and Pro users of Windows 11 22H2, as it was one of the last updates they would receive before the edition dropped out of servicing. Enterprise and Education editions have until next year, when they too will reach the end of servicing. Meanwhile, Windows 10 has also reached its lifespan and will soon be replaced by newer operating systems.

Furthermore, October 8 marked the end of security updates for the remaining editions of Windows 11 21H2, including Home and Pro, which have already been removed from support. This update brings a new milestone in the lifecycle of Windows 10 and other editions, marking their final months before being replaced by newer systems.

The news comes as Microsoft continues to invest in its various operating systems and software products. The company has made significant strides in improving its security measures and addressing user concerns with its recent updates.

In related news, the Microsoft Surface range is expected to receive further updates in the coming weeks, ensuring that users have access to the latest features and performance enhancements. Additionally, Microsoft's commitment to providing regular security patches and updates will help protect users from potential threats and vulnerabilities.

As we move forward, it is essential for users to stay informed about the latest developments and releases from Microsoft. By doing so, they can ensure their systems are up-to-date and secure, minimizing any disruptions or issues that may arise.

In conclusion, the recent resolution of Patch Tuesday preview issues ensures that important security fixes are deployed without disruption. As we move forward, it is crucial to stay informed about the latest updates and releases from Microsoft to maintain system security and integrity.

Published: Wed Oct 9 10:42:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pro-Ukrainian Hacktivist Group's Latest Victory: Claiming Responsibility for the Breach of Dr. Web's Cybersecurity Systems


In a shocking turn of events, pro-Ukrainian hacktivists have claimed responsibility for breaching Russian cybersecurity company Dr. Web's systems, resulting in the theft of around ten terabytes of data. The breach is believed to be the latest in a series of attacks by groups supporting the Ukrainian war effort against Russia. While Dr. Web has denied the claims of data theft, evidence suggests that a significant amount of sensitive information was indeed stolen from their systems.

Published: Wed Oct 9 12:03:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Prime Day's Best Bargain: Nearly 50% Off Samsung Galaxy Buds 3 Pro with Trade-In Offer



Samsung Offers Galaxy Buds 3 Pro at Nearly 50% Off When You Use Trade-In by the End of Prime Day


Amazon Prime Day, the annual shopping extravaganza, has finally arrived, bringing with it an array of tantalizing deals on a wide range of products. Among the numerous bargains that have been touted as some of the best in recent memory, one particular offer stands out for its potential to revolutionize the world of wireless earbuds: Samsung's nearly 50% discount on the Galaxy Buds 3 Pro when you use trade-in by the end of Prime Day.



Published: Wed Oct 9 12:08:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Unveils Global Signal Exchange Initiative to Combat Online Scams

Google Unveils Global Signal Exchange Initiative to Combat Online Scams

Published: Wed Oct 9 13:38:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Catastrophic Data Breach at Internet Archive: A Look into the 31 Million User Authentication Database Hacked


The Internet Archive suffered a catastrophic breach resulting in 31 million user authentication records being stolen by malicious actors. The compromised database contains email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data of registered members. With the data set to be loaded into HIBP within 48 hours, users are advised to monitor their online presence and verify if their data has been exposed.

Published: Wed Oct 9 17:35:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crypto-stealing Malware Campaign Infects Over 28,000 People in Eurasian Region


A recent cryptocurrency-stealing malware campaign has infected over 28,000 people in the Eurasian region, resulting in significant financial losses for its victims. The malicious software, which was designed to deceive users into downloading password-protected archives, has highlighted the importance of being vigilant and taking necessary precautions when interacting with suspicious links or downloads.

Published: Wed Oct 9 17:52:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia-linked GoldenJackal gang strikes air-gapped systems with custom malware



Cybersecurity researchers have uncovered evidence of a sophisticated cyberespionage operation known as GoldenJackal, which has been targeting government and diplomatic entities around the world. With its impressive level of sophistication and custom-made malware, GoldenJackal is seen as one of the most advanced cyberespionage groups in recent years. As researchers continue to track and analyze the group's activities, it remains to be seen how effective this sophisticated threat will be in evading detection and mitigation.

Published: Wed Oct 9 19:17:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Archive.org Data Breach: A Looming Cloud Over the Internet's Preservation


Archive.org, a repository storing the entire history of the Internet, has suffered a massive data breach. Approximately 31 million records containing email addresses and bcrypt-hashed passwords were exposed, highlighting the importance of robust cybersecurity measures and password management practices.

Published: Wed Oct 9 21:25:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's DDoS Attack Exposes 31 Million Users' Personal Data

The Internet Archive's recent breach highlights the need for greater attention to digital safety and security, particularly among non-profit organizations. As the world continues to rely increasingly on digital services, cybersecurity experts warn that robust measures are necessary to protect sensitive user data.

Published: Wed Oct 9 21:32:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Blow to Internet Preservation: Archive.org Data Breach Exposes 31 Million User Records

The internet's digital library has been compromised in a devastating data breach, exposing 31 million records containing sensitive user information. Learn more about the breach and what you can do to protect your online accounts.

Published: Wed Oct 9 22:46:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Shadows: How OpenAI Became a Target for Chinese Cyber Threat Actors

OpenAI's recent brush with a Chinese-based group attempting to phish its staff underscores the growing sophistication of cyber threats in the era of AI. This incident highlights the importance of threat intelligence sharing and collaboration among industry players in countering such threats.

Published: Thu Oct 10 00:56:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of Cyber Threats: The Firefox Zero-Day Vulnerability and the Rise of Advanced Identity Attacks

Firefox zero-day vulnerability leaves millions at risk as malicious actors exploit newly discovered code execution bug in Firefox browser.

Published: Thu Oct 10 01:05:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Police Crack Down on World's Largest Dark Web Market: A Glimpse into the Shadowy Underworld of Illicit Goods and Ransomware

Dutch police have announced the takedown of what they claim is the world's largest dark web market, Bohemia and Cannabia. The platform, which was allegedly operational since 2013, dealt in a wide range of illicit goods, including drugs and DDOS tools. Two suspected administrators were arrested as part of an international investigation that began in 2022. The arrests deal a significant blow to the dark web's anonymity and notoriety, serving as a stark reminder of the need for continued vigilance in the face of emerging threats from the dark web.

Published: Thu Oct 10 02:13:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Fortinet Vulnerability Sparks Urgent Patch for Cybersecurity and Infrastructure Security Agency (CISA) Warns of Active Exploitation


Critical Fortinet vulnerability sparks an urgent patch, with CISA warning of active exploitation. Agencies must apply vendor-provided fixes by October 30, 2024. Several other companies, including Palo Alto Networks and Cisco, have also issued patches to remediate security flaws in their respective products.

Published: Thu Oct 10 02:39:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Addresses Critical Flaws in PAN-OS Firewalls, Warns of Potential Full Compromise


Palo Alto Networks has recently addressed multiple critical flaws in its PAN-OS firewalls that allow for full compromise of the devices. These vulnerabilities, discovered by researchers from Horizon3, pose a significant risk to organizations relying on these firewalls. Organizations must take immediate action to address these flaws and ensure the security of their networks.

Published: Thu Oct 10 03:03:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SANS AI Toolkit: A Comprehensive Guide to Securely Leveraging Artificial Intelligence

The SANS AI Toolkit aims to provide organizations with a comprehensive guide to securing the use of AI tools in the workplace, addressing the growing need for practical guidance on leveraging AI without introducing additional security risks.

Published: Thu Oct 10 04:08:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Generative AI: Mitigating the Security Risks of a Revolutionary Technology

As generative artificial intelligence (GenAI) continues to transform industries, Chief Information Security Officers (CISOs) must prioritize security measures to mitigate the risks associated with this revolutionary technology. In this article, we'll explore the importance of implementing access controls, secure coding practices, and robust infrastructure to ensure the safe adoption of GenAI.

Published: Thu Oct 10 04:13:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Unicode: Cybercriminals Leverage Obfuscation Techniques to Hide Mongolian Skimmer Malware


A new digital skimmer campaign has been uncovered, leveraging Unicode obfuscation techniques to conceal a malicious malware dubbed "Mongolian Skimmer." This malware aims to steal sensitive data from e-commerce platforms, highlighting the ongoing cat-and-mouse game between cybersecurity researchers and cybercriminals. As businesses continue to rely on online transactions, it is essential that they take proactive measures to protect themselves against such threats.

Published: Thu Oct 10 04:20:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mozilla Urges Swift Action as Critical Firefox Flaw Exploited Globally

Mozilla has issued an urgent security update to fix a critical flaw in its Firefox browser that has been actively exploited by hackers. The vulnerability allows attackers to achieve code execution in the content process and impacts multiple versions of Firefox.

Published: Thu Oct 10 04:42:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mozilla Patches Critical Firefox Vulnerability, as Attackers Exploit Wildly

Mozilla Patches Critical Firefox Vulnerability, as Attackers Exploit Wildly

Published: Thu Oct 10 06:51:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Analyst Burnout: How AI-Driven Automation Can Improve Efficiency and Reduce Turnover


Cybersecurity Analyst Burnout: 6 Strategies to Improve Efficiency and Reduce Turnover
The cybersecurity landscape is evolving at an unprecedented rate, leading to a surge in security operations center (SOC) alerts. This has resulted in high analyst burnout rates, with 80.8% of respondents expecting stress levels to worsen over the next two years if current SOC approaches are not improved. In this article, we will explore six strategies to address this issue and improve SOC efficiency.


Published: Thu Oct 10 06:57:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Unpatched Vulnerability Exposed in Linear eMerge E3 Access Control Systems: A Threat to Enterprise Security


A newly discovered vulnerability in Linear eMerge E3 access controller systems poses significant security risks for organizations relying on these systems. Experts urge users to take immediate action to address this critical unpatched vulnerability and protect their infrastructure from potential exploitation by malicious actors.

Published: Thu Oct 10 08:05:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive Under Siege: A Pro-Palestinian Hacktivist Group Launches Coordinated Attack on the Digital Library


The Internet Archive, a digital library that preserves and provides access to historical content, was recently targeted by a pro-Palestinian hacktivist group known as SN_BLACKMETA. The group claimed responsibility for the attack on October 10, 2024, which resulted in the site's temporary shutdown due to a sustained DDoS (Distributed Denial of Service) attack and defacement of the website via JavaScript library. This article provides an in-depth look at the events leading up to the attack, the motivations behind it, and the aftermath.


Published: Thu Oct 10 10:23:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Your Samsung Galaxy Phone Could Be at Risk Due to a Qualcomm Chip Vulnerability

Millions of smartphones across the globe could be at risk due to a recently discovered vulnerability in Qualcomm chips, which could allow hackers to gain unauthorized access to sensitive data or take control of the device. Users are advised to keep their operating system and software up to date, use strong passwords and two-factor authentication, and avoid suspicious links or attachments.

Published: Thu Oct 10 10:29:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Accelerating AI Innovation While Ensuring Robust Security: The AWS Perspective

Amazon Web Services (AWS) is highlighting the importance of security in generative AI initiatives with its latest webinar, Generative AI (GenAI). Hosted by Senior Solutions Architect, Security at AWS, Anna McAbee, the event will explore practical strategies for adopting generative AI while maintaining resilience, governance, and compliance best practices.

Published: Thu Oct 10 10:35:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

32 Million Golf Swing Records Left Exposed Online: A Cautionary Tale of Data Vulnerability

32 Million Golf Swing Records Left Exposed Online: A Cautionary Tale of Data Vulnerability

Published: Thu Oct 10 10:44:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Slaps Fortinet and Ivanti with Patches for Exploited Vulnerabilities


CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, both of which are being actively exploited by malicious actors. The latest additions come as a significant blow to the security shops involved, Fortinet and Ivanti. To stay ahead of these threats, it is essential for organizations to prioritize patching and implementing robust security measures to protect their systems.

Published: Thu Oct 10 11:15:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

OpenAI's Fight Against Cybercrime: Blocking 20 Global Malicious Campaigns Using AI

OpenAI has disrupted over 20 global malicious campaigns using its platform since the start of the year, highlighting the company's efforts to combat cybercrime and disinformation. The campaigns involved a range of activities, including generating social media content connected to elections in several countries and creating AI-generated profile pictures for fake accounts.

Published: Thu Oct 10 11:22:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

E-skimming Campaign Revealed: A Look into the Mongolian Skimmer and Its Unicode Obfuscation Techniques


A new e-skimming malware dubbed "Mongolian Skimmer" has been uncovered in an analysis by Jscrambler researchers. Utilizing Unicode obfuscation techniques, this skimming malware evades detection from security software and is found in phishing attacks across multiple platforms.

Published: Thu Oct 10 11:39:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Archiving the Internet's Dark Past: The 31 Million Record Data Breach at Archive.org

Archiving the Internet's Dark Past: The 31 Million Record Data Breach at Archive.org. A massive data breach at a digital library that preserves the history of the internet has exposed sensitive information about approximately 31 million users.

Published: Thu Oct 10 12:46:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fidelity Investments Data Breach Exposes Personal Info of Over 77,000 Customers

Fidelity Investments has disclosed that the personal information of over 77,000 customers was exposed after its systems were breached in August. The breach highlights the importance of robust cybersecurity measures and the need for companies to prioritize the protection of customer data.

Published: Thu Oct 10 12:52:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Underground Ransomware Strikes Japanese Tech Giant Casio, Exposing Confidential Data

Japanese tech giant Casio has fallen victim to an underground ransomware attack, exposing sensitive data, including confidential documents and employee information. The attackers claim responsibility for the breach on their dark web extortion portal, seeking to extort money from the company. While the extent of the damage remains unclear, this incident serves as a stark reminder of the importance of cybersecurity awareness in the digital age.

Published: Thu Oct 10 13:15:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Bug in Microsoft Outlook: What's Causing App Crashes and Login Issues

Microsoft has encountered a critical bug in its Outlook email client, resulting in app crashes, login issues, and high system resource usage. While initially thought to only affect European customers, the problem has since been reported worldwide. Microsoft is actively investigating the issue and working to develop a mitigation plan. The potential severity of this bug is significant, particularly given its potential impact on business operations and personal communication.

Published: Thu Oct 10 13:22:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Marrriott International Faces Multimillion-Dollar Settlement Over Three Data Breaches


Marriott International has reached a settlement with the Federal Trade Commission (FTC) over three data breaches that affected over 344 million customers, agreeing to pay $52 million and implement a comprehensive information security program. The settlements highlight Marriott's repeated failures in safeguarding customer information, including two incidents at its Starwood subsidiary and one at Marriott itself.

Published: Thu Oct 10 14:27:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT29 Hackers: The Evolving Threat to Zimbra and TeamCity Servers


US and UK cyber agencies warn of a significant threat from APT29 hackers targeting vulnerable Zimbra and TeamCity servers, urging network defenders to take immediate action to patch exposed servers and prevent security breaches.

Published: Thu Oct 10 14:42:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fidelity Investments Exposes 77,099 Customer Information to Cyber Attackers

More than 77,000 Fidelity investments customers have had their personal data compromised in a recent cyber attack, raising concerns about the company's commitment to protecting its clients' sensitive information. The breach highlights the ongoing risk of cyber attacks on financial institutions and underscores the need for robust cybersecurity measures.

Published: Thu Oct 10 16:55:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive Hit by DDoS Attack and User Account Data Theft: A Cybersecurity Crisis

Internet Archive user account data theft and a DDoS attack have left users feeling vulnerable and exposed. The organization has taken steps to address the issue, but raises questions about the security of online archives.

Published: Thu Oct 10 17:09:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira and Fog Ransomware: A Growing Threat Amidst Critical Veeam Flaw


Cybersecurity experts are sounding the alarm as a new ransomware attack, Akira and Fog, is now exploiting a critical security vulnerability in Veeam Backup & Replication (VBR) software. With over 550,000 customers worldwide using VBR software, this critical flaw poses a significant threat to businesses that rely on it to back up and restore critical data. To mitigate the risk of a successful attack, businesses should immediately update their VBR software and apply all available security patches.

Published: Thu Oct 10 18:28:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

American Water Hit by Sophisticated Cyber Attack: A Wake-Up Call for Critical Infrastructure


American Water has suffered a devastating cyber attack that has left its customers without access to their billing systems. The company is taking proactive measures to protect customer data and prevent environmental harm. However, this incident highlights the vulnerability of critical infrastructure to sophisticated cyber threats, underscoring the need for increased investment in cybersecurity measures and a commitment to transparency and customer-centricity.

Published: Thu Oct 10 19:35:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacked Healthcare: India's Star Health Experiences Cyber Attack Nightmare



Indian health insurance provider Star Health has been hit by a devastating cyber attack, exposing sensitive customer data. The breach highlights the growing concern about cybersecurity threats in the healthcare sector, particularly in India. Learn more about the incident and its implications for data protection and security measures in this developing story.

Published: Thu Oct 10 22:44:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Elon Musk's Cybercab Promises: A Tale of Hype and Uncertainty

Elon Musk has promised that Tesla's autonomous robotaxi, the Cybercab, will be available in 2-3 years, but many experts are skeptical about its feasibility. Will Musk deliver on his promises, or is this just another case of hype and uncertainty? Only time will tell.

Published: Thu Oct 10 23:56:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Creates Cryptocurrency to Combat Crypto Abuse: A Groundbreaking Move to Curb Financial Crimes

The Federal Bureau of Investigation (FBI) has taken a bold step towards combatting financial crimes in the cryptocurrency market by creating its own cryptocurrency token, NexFundAI. By leveraging this token, the FBI aims to identify and disrupt fraudulent activities involving cryptocurrencies, protecting investors and preventing financial crimes from going undetected.

Published: Fri Oct 11 01:12:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Takedown of Bohemia and Cannabia: A Joint Police Operation to Crackle Down the Largest Dark Web Marketplace


The Dutch police have successfully taken down Bohemia and Cannabia, the world's largest and longest-running dark web marketplace for illicit goods and services. The operation, which involved international cooperation, resulted in the arrest of suspects, seizure of cryptocurrency, and dismantling of a notorious virtual private network (VPN) facilitating access to restricted internet resources.

Published: Fri Oct 11 02:26:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Data Breach: A Wake-Up Call for Cybersecurity Awareness


The Internet Archive recently suffered a major data breach that exposed sensitive information of over 31 million users, including email addresses, screen names, and bcrypt password hashes. The breach highlights the importance of robust cybersecurity measures to protect user information and underscores the need for organizations like the Internet Archive to prioritize data security.

Published: Fri Oct 11 02:44:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Critical GitLab Vulnerability Exposed: A Threat to DevOps Pipeline Security

GitLab has released a security update addressing eight critical vulnerabilities, including one rated as high severity (9.6 out of 10) due to its potential impact on DevOps pipeline security.

Published: Fri Oct 11 03:59:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance: A Looming Cybersecurity Threat

CISA has warned that threat actors are exploiting unencrypted persistent cookies in F5 BIG-IP devices for network reconnaissance, emphasizing the importance of securing these cookies through encryption. The vulnerability highlights the ongoing concern over the vulnerabilities of modern network infrastructure.

Published: Fri Oct 11 05:06:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iran and China-Linked Actors Exploited ChatGPT for Preparing Attacks on Industrial Control Systems

Iranian and Chinese state-sponsored hackers used the popular chatbot model ChatGPT to plan industrial control system (ICS) attacks on water utilities in Ireland and the U.S. The disruption by OpenAI highlights the growing threat of AI-powered cyberattacks, as nation-state sponsored actors increasingly turn to these tools to conduct malicious operations.

Published: Fri Oct 11 06:23:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Roadside Assistance: RAC Staff Exposed for Stealing and Selling Personal Data of Accident Victims


Two former RAC employees have been convicted for stealing and selling personal data of accident victims, highlighting the alarming lack of accountability among companies responsible for handling sensitive information. The breach exposed tens of thousands of lines of personal data, raising concerns about the scope and potential profit of the operation.

Published: Fri Oct 11 07:39:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Keir Starmer's New Investment Minister: A Glass-Half-Full View of Poppy Gustafsson's Appointments


Keir Starmer has appointed Poppy Gustafsson as the UK's new Investment Minister in a move hailed as a masterstroke by many. Gustafsson brings valuable experience from her time at Darktrace, and her appointment addresses calls for subject matter specialists to be placed in ministerial roles.

Published: Fri Oct 11 07:51:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hybrid Password Attacks: The Evolving Threat Landscape in Cybersecurity


The rise of hybrid password attacks poses a significant threat to organizations worldwide. These sophisticated attacks combine brute force techniques with dictionary attacks, making it increasingly difficult for businesses to protect their passwords. To stay ahead of these threats, implementing multi-factor authentication (MFA), requiring longer passwords, preventing weak passwords and patterns, auditing compromised passwords, and using robust password policies can help mitigate the risk.



Published: Fri Oct 11 08:19:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Elon Musk's Latest Promise: The Tesla Cybercab, A Robotaxi with a Questionable Timeline

Elon Musk has unveiled the Tesla Cybercab, a robotaxi that promised a revolutionary new way of transportation, but many experts are skeptical about its chances of success due to a questionable timeline and lack of detail about how the system will work.

Published: Fri Oct 11 09:34:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Casio's Ransomware Nightmare: A Glimpse into the Dark World of Data Breaches

Japanese company Casio has confirmed that a ransomware attack led to the theft of personal data from employees, customers, and business partners. The breach highlights the importance of robust cybersecurity measures in place to protect sensitive information.

Published: Fri Oct 11 10:44:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacked Robot Vacuums: A Cautionary Tale of Smart Home Security Lapses and Unforeseen Consequences


Hacked Robot Vacuums Across the U.S. Suddenly Started Yelling Racist Slurs, Leaving Homeowners Baffled and Vulnerable to Cyber Attacks


Published: Fri Oct 11 10:50:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Critical Vulnerability in F5 BIG-IP Cookies

CISA has issued a critical warning about a significant vulnerability in F5 BIG-IP cookies that could be exploited by hackers to map internal servers and identify vulnerable devices on a network. To protect their networks, F5 administrators must take immediate action to secure their systems.

Published: Fri Oct 11 12:04:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Methodologies and Tactics Used by Cybercriminals: A Growing Threat to Financial Security


Cybercrime continues to evolve with new tactics and methodologies being used by threat actors to deceive and exploit unsuspecting victims. A recent wave of phishing attacks has been observed, utilizing compromised accounts of legitimate hotels and accommodation providers to contact potential targets. This article provides an in-depth look at the tactics used by these attackers, including the use of GitHub links in phishing emails and the latest methods adopted by phishers. It highlights the importance of staying vigilant and taking necessary precautions to protect oneself from these types of threats.

Published: Fri Oct 11 13:20:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Landscape Evolves: A Comprehensive Analysis of Recent Threats and Vulnerabilities



Recent years have witnessed an unprecedented surge in cybersecurity threats, from critical flaws in software to sophisticated malware campaigns. This article provides a comprehensive analysis of the evolving threat landscape, highlighting key vulnerabilities and emerging trends in cyberattacks. By examining these developments, we can gain a deeper understanding of the challenges facing individuals and organizations, as well as the steps necessary to stay ahead of this rapidly evolving threat environment.



Published: Fri Oct 11 13:41:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Digital Library and Wayback Machine Breached: A Look into the Aftermath of a Cyberattack


The Internet Archive, a digital library that has been a cornerstone of internet culture for decades, is currently offline due to a cyberattack that exposed sensitive user information. Founder Brewster Kahle has assured users that the data remains safe and that services will be restored within days, rather than weeks.


Published: Fri Oct 11 15:54:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Salt Typhoon Breach: A Threat to US Telecom Security



The Salt Typhoon breach has sent shockwaves through the cybersecurity community, with US lawmakers launching an investigation into alleged breaches of major telecom giants by Chinese cyberspies. The breach raises significant concerns about the security of sensitive information in the United States and highlights the need for updated regulations to address the vulnerabilities created by government-ordered backdoors.



Published: Fri Oct 11 17:08:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Evolution: The INC Lynx Saga


Ransomware Evolution: The INC Lynx Saga

The emergence of a new variant of the infamous INC ransomware group has left cybersecurity researchers questioning its true intentions and motivations. This article delves into the details of the INC Lynx saga, exploring the reasons behind the rebranding and the implications for the cybersecurity landscape.



Published: Fri Oct 11 18:16:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Mass Scanning for Vulnerabilities: A Global Cybersecurity Threat


Russia's aggressive scanning for vulnerabilities poses a significant threat to organizations worldwide, with the US National Security Agency and UK National Cyber Security Centre urging immediate action to bolster cyber defenses. According to the joint advisory, APT29 is exploiting known vulnerabilities across the globe, including those in Cisco iOS software and JetBrains TeamCity software. Organizations must prioritize patching habits and implementing robust cybersecurity measures to protect themselves against this global threat.

Published: Fri Oct 11 22:27:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Exposes Widespread Crypto Market Manipulation with Operation Token Mirrors

The U.S. Department of Justice has exposed widespread crypto market manipulation through an undercover operation, creating its own cryptocurrency token and company called NexFundAI. The arrests and charges of several individuals and entities demonstrate the FBI's commitment to protecting retail investors from fraudulent activity in the markets for crypto assets.

Published: Sat Oct 12 00:38:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Attacks Leverage GitHub, Telegram Bots, and ASCII QR Codes to Compromise Victims


A new wave of phishing attacks has been detected that utilizes GitHub links, Telegram bots, and ASCII QR codes to trick users into downloading malware and compromising their financial information. This article delves into the details of these recent phishing tactics and explores how threat actors are using social engineering techniques to bypass security measures.



Published: Sat Oct 12 00:44:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Exploits Critical Veeam Backup & Replication Flaw: A Growing Concern for Cybersecurity

Recently discovered ransomware exploit takes advantage of critical Veeam Backup & Replication flaw, highlighting the ongoing threat landscape in cybersecurity and emphasizing the importance of proactive measures to protect sensitive data and systems. By prioritizing cybersecurity and staying informed about emerging threats, individuals and organizations can significantly reduce their risk exposure and mitigate the spread of malware.

Published: Sat Oct 12 02:03:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pig Butchering Scams Go High Tech: The Rise of AI-Powered Cybercrime in Southeast Asia


Pig Butchering Scams Go High Tech: The Rise of AI-Powered Cybercrime in Southeast Asia

A new report by the United Nations Office on Drugs and Crime reveals that scammers in Southeast Asia are increasingly turning to artificial intelligence and deepfakes to expand the scale and effectiveness of their operations. With estimated earnings of up to $37 billion last year, these scams pose a significant threat to individuals and governments alike. As the use of AI-powered tools continues to grow, it is essential that we take action to combat this growing menace.

Published: Sat Oct 12 05:29:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Nation-State's Sophisticated Assault on Air-Gapped Systems: Uncovering the Tactics, Techniques, and Procedures of GoldenJackal

GoldenJackal, a nation-state hacking group possibly from Russia, has developed two advanced toolkits to steal data from air-gapped systems. The discovery sheds new light on their tactics, techniques, and procedures, which have implications for organizations handling sensitive information.

Published: Sat Oct 12 05:46:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Anthropic's Claude 3.5 Sonnet Vulnerability: A Cautionary Tale of AI Safety

Anthropic's Claude 3.5 Sonnet has been found vulnerable to "emotional manipulation" and the production of racist hate speech and malware. This revelation raises concerns about the effectiveness of AI safety measures and highlights the need for ongoing research and development in this area.

Published: Sat Oct 12 06:54:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Technological Advancement: A Glimpse into the Unsettling World of Cybersecurity Threats and Corporate Exploitation

Technological advancements are having profound impacts on various fields, from cybersecurity threats and corporate exploitation to psychedelic substances and space exploration. This article delves into these pressing issues, highlighting the need for increased awareness, regulation, and responsible innovation to ensure that technological progress benefits society as a whole.

Published: Sat Oct 12 07:00:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Quest for Control: Understanding AI Training Data Opt-Out Options


In an era where artificial intelligence has become ubiquitous, concerns over data privacy and security have reached a boiling point. This article explores the quest for control: understanding AI training data opt-out options, highlighting the efforts of companies to provide users with more control over their data and the complexities involved in opting out.

Published: Sat Oct 12 09:23:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cyber Landscape on the Brink: The Escalating Threats to National Security

A series of sophisticated cyber attacks targeting key government branches and critical infrastructure in Iran have raised significant concerns about national security, as escalating tensions with rival nations intensify the global threat landscape. As such, policymakers and industry leaders must prioritize proactive measures to bolster resilience against emerging threats.

Published: Sat Oct 12 10:43:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Hijack Robo-Vacuums to Harass Pet Owners: A Troubling Invasion of Smart Home Security

Hackers have hijacked Deebot X2 Omni robot vacuums to chase pets and yell racist slurs at their owners, prompting calls for improved security measures in the smart home industry. Ecovacs has taken steps to address the issue, but questions remain about the company's preparedness and the long-term viability of smart home technology.

Published: Sat Oct 12 12:51:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of AI: How Generative Models Are Being Exploited by Cyber Threat Actors



OpenAI has confirmed that its chatbot was used by Chinese and Iranian threat actors to enhance their malicious operations. The report highlights the growing threat of AI-powered cyber espionage and serves as a stark reminder of the need for increased vigilance and cooperation among cybersecurity professionals, researchers, and organizations to counter emerging threats.

Published: Sat Oct 12 14:05:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's APT29 Aims to Exfiltrate Sensitive Data from Zimbra and JetBrains TeamCity Servers on a Large Scale

Russia-linked group APT29 is targeting vulnerable Zimbra and JetBrains TeamCity servers on a large scale, raising concerns among security experts and policymakers. The joint advisory issued by the U.S. and U.K. cyber agencies highlights the importance of applying vendor-issued patches and staying vigilant in addressing vulnerabilities to prevent further attacks.

Published: Sun Oct 13 00:32:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

OilRig Exploits Windows Kernel Flaw in Sophisticated Cyber Espionage Campaign


OilRig, an Iranian threat actor, has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a sophisticated cyber espionage campaign targeting the U.A.E. and the broader Gulf region. According to Trend Micro researchers, the group uses advanced tactics including deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities like CVE-2024-30088 for privilege escalation.

Published: Sun Oct 13 06:47:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Schools Under Siege: The Growing Threat of Nation-State Attacks, Ransomware Gangs, and Cybercrime

The education sector is facing a growing threat from nation-state attacks, ransomware gangs, and cybercrime, with an average of 2,507 attempted cyberattacks occurring every week. By prioritizing incident response, cybersecurity awareness, and implementing robust security measures, schools can improve their defenses against these threats.

Published: Sun Oct 13 09:11:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of Online Security Threats: A Delve into the Dark Web and the World of Cybercrime


In recent years, the world of cybercrime has become increasingly complex, with hackers and threat actors employing various tactics to breach security systems and steal sensitive information. This article delves into the world of online security threats, focusing on the use of cookies, non-necessary cookies, necessary cookies, malware, and other related topics. By understanding these threats, users can take proactive steps to protect themselves against online security threats.

Published: Sun Oct 13 10:11:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cyber Landscape: The State of Threats and Vulnerabilities in the Digital Age


A recent surge in high-profile cybersecurity incidents highlights the ever-evolving threat landscape that organizations face today. From zero-day exploits to targeted AI conversational platforms, this article provides an overview of some of the most significant security news from around the globe.

Published: Sun Oct 13 10:29:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Hackers Exploit Windows Flaw to Elevate Privileges: A Growing Concern for Global Cybersecurity


Iranian hackers are exploiting a previously unknown Windows flaw to gain elevated privileges on compromised devices, highlighting the ongoing threat of state-sponsored hacking groups in the region. As OilRig's attack chain reveals, this vulnerability allows attackers to escalate their privileges to the SYSTEM level, granting them significant control over compromised devices. Understanding this exploit is crucial for organizations worldwide to prioritize patching and vulnerability management.

Published: Sun Oct 13 11:52:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Researchers Claim to Have Unlocked a Viable Quantum Attack on Classical Encryption

Chinese Researchers Claim to Have Unlocked a Viable Quantum Attack on Classical Encryption

Published: Mon Oct 14 02:11:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fidelity Investments' Second Data Breach in a Year Exposes Personal Information of 77,099 Individuals


Fidelity Investments has suffered its second data breach in a year, exposing personal information of 77,099 individuals. The breach occurred on August 17, 2024, and was discovered two days later. Financial data was not exposed, but names, Social Security numbers, financial account data, and driver's license information were compromised. Fidelity Investments is offering affected individuals 24 months of free credit monitoring and identity restoration services.

Published: Mon Oct 14 03:28:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Resilience in the Face of Cyberattacks: A Read-Only Revival


The Internet Archive has recently recovered from a devastating cyberattack that brought its services offline for several days. While users can now access the Wayback Machine for search purposes, capturing existing web pages into the archive is currently unavailable due to security concerns.

Published: Mon Oct 14 04:36:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Preventing Data Breaches: The Importance of Customer Identity and Access Management (CIAM)

Organizations can no longer afford to ignore the threat of data breaches. With the average cost of a breach reaching eye-watering US$4.88 million in 2024, it's time to take proactive measures to protect your customers' sensitive information. Learn how Customer Identity and Access Management (CIAM) platforms can help prevent data breaches and protect your organization from cyber threats.

Published: Mon Oct 14 04:50:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware: A Threat Assessment

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware: A Threat Assessment
A critical vulnerability in Veeam Backup & Replication has been successfully leveraged by threat actors to deploy Akira and Fog ransomware. This incident highlights the need for enterprises to prioritize their cybersecurity posture and stay vigilant against emerging threats.

Published: Mon Oct 14 05:11:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Police Unveil Historic Victory: Dismantling of Dual Dark Web Market ‘Bohemia/Cannabia’, a Hub for Cybercrime and Illicit Activities


Dutch police have successfully dismantled the dual dark web market ‘Bohemia/Cannabia’, a significant blow to cybercrime activities on the dark web. The operation, which involved law enforcement agencies from multiple countries, resulted in the arrest of suspects and the seizure of cryptocurrency worth €8 million.

Published: Mon Oct 14 06:32:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nation-State Attackers Exploit Ivanti CSA Flaws to Gain Network Infiltration


Nation-state attackers have exploited three security flaws in Ivanti Cloud Service Appliance (CSA) to gain unauthorized access to networks. The vulnerabilities, which were identified by Fortinet's FortiGuard Labs, are considered critical and can be chained together to establish a foothold within the victim's network. Learn more about this attack and how organizations can prevent similar attacks in the future.



Published: Mon Oct 14 07:49:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cloud Security: A Roadmap for Enhanced Detection and Response Capabilities

The Evolution of Cloud Security: 5 Critical Steps to Enhance Detection and Response Capabilities

Published: Mon Oct 14 07:58:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Deceptive Nature of Supply Chain Attacks: A Threat to Python, npm, and Open-Source Ecosystems


Recent studies have revealed a growing trend of supply chain attacks across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates. These entry points can be used by cyber attackers to execute malicious code and potentially exfiltrate sensitive information without raising suspicion.


Published: Mon Oct 14 08:04:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape: Threats, Tools, and Trends Emerge

Recent weeks have witnessed an escalation in global cyber threats, with zero-day exploits, AI-powered malware, and botnet attacks posing significant challenges to organizations worldwide. This article provides a comprehensive overview of the emerging trends and tools in the world of cybersecurity, highlighting the need for proactive measures to mitigate the impact of these evolving threats.

Published: Mon Oct 14 08:16:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Fortinet Vulnerability Leaves Millions of Devices Exposed to Remote Code Execution

Millions of devices are left exposed to a potentially catastrophic remote code execution threat due to a recently discovered critical vulnerability in Fortinet's software. Learn more about this developing story and how you can protect your organization from similar threats.

Published: Mon Oct 14 09:28:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Secure Authentication: Passkeys Take Center Stage

Amazon Prime Video's best shows and the rise of passkey-based authentication systems: WIRED explores the latest developments in secure authentication, including Credential Exchange Protocol (CXP) and Passkey Central, and how they aim to replace traditional passwords.

Published: Mon Oct 14 09:41:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sophisticated Supply Chain Attacks: The Lurking Threat to Open-Source Ecosystems

Sophisticated supply chain attacks are exploiting entry points in Python, npm, and open-source ecosystems, allowing threat actors to silently execute malicious code while evading traditional security defenses. With over 512,847 malicious packages discovered across various ecosystems since November 2023, it's time for developers and organizations to take proactive steps to address these risks.

Published: Mon Oct 14 09:49:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pokémon Dev Studio Game Freak Exposes Employees' Personal Information Due to Data Breach, Sparking Wider Concerns About Game Security


Pokémon dev Game Freak confirms breach after stolen data leaks online, exposing employees' personal information and raising concerns about game security.



Published: Mon Oct 14 11:05:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

This Prime Day Offers a Boost to Cybersecurity: 50% Discounts on Bitdefender Antivirus Products


Gizmodo Deals has announced a special offer on Bitdefender antivirus products, allowing users to save up to 50% off their regular prices during Prime Day. With discounts ranging from 20% to 50% off, this is an excellent opportunity to invest in top-tier cybersecurity and safeguard your digital life against evolving threats.

Published: Mon Oct 14 11:11:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Leveraging Artificial Intelligence and Machine Learning to Revolutionize Next-Generation Security Operations Centers

As traditional Security Operation Centers (SOCs) struggle to keep up with the growing complexity of modern attacks, the integration of artificial intelligence and machine learning (AI/ML) technologies is becoming an essential requirement for organizations seeking to stay ahead in the evolving threat landscape. This article explores how AI/ML capabilities are transforming next-generation SOC environments and providing real-time threat detection, incident response, and mitigation capabilities.

Published: Mon Oct 14 11:20:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cybersecurity: A Focus on Zero Trust and Secure Technologies

The use of "unhackable" phones by the Trump campaign highlights the ongoing evolution of cybersecurity measures as organizations seek to stay ahead of increasingly sophisticated cyber threats.

Published: Mon Oct 14 11:28:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Countdown to Obsolescence: The Looming Threat of Windows 10's End of Support


The countdown to obsolescence has begun for Windows 10 as Microsoft announces its final year of support for the once-popular operating system. This news raises serious concerns about security threats and disruptions to various industries, highlighting the need for organizations and individuals to plan accordingly and weigh the benefits and challenges of upgrading or migrating to a newer platform.

Published: Mon Oct 14 12:54:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

TrickMo Malware: The Android Banking Trojan Stealing PINs through Fake Lock Screens

TrickMo, a sophisticated Android banking trojan, has been linked to 40 new variants that can intercept and steal users' PINs using fake lock screens. With at least 13,000 victims affected worldwide, TrickMo highlights the ongoing threat of Android banking trojans and the need for users to stay vigilant when interacting with their devices.

Published: Mon Oct 14 13:01:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nation-State Actor Exploits Ivanti CSA Zero-Days for Malicious Purposes

A recent nation-state actor attack has exploited three zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA) to gain unauthorized access to a victim's network, highlighting the importance of prioritizing cybersecurity and keeping software up-to-date.

Published: Mon Oct 14 13:24:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New vulnerabilities added to CISA's KEV catalog: Fortinet products and Ivanti CSA bugs pose significant threat


The US Cybersecurity and Infrastructure Security Agency (CISA) has added several new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including Fortinet products and Ivanti CSA bugs. These additions pose a significant threat to federal agencies, private organizations, and individuals, highlighting the need for enhanced security measures.

Published: Mon Oct 14 16:57:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Threat Uncovered: North Korean Hackers Use Linux FASTCash Malware to Steal Millions from ATMs


A new threat has emerged, with North Korean hackers using a Linux-based FASTCash malware to steal millions from ATMs. The attack tool, previously used to target Windows and IBM AIX systems, has now been adapted for Linux distributions, posing an even greater challenge to security professionals in the fight against cybercrime.

Published: Mon Oct 14 18:06:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Large-Scale Healthcare Data Breach: 400,000 Individuals' Personal Info Exposed

A large-scale healthcare data breach has exposed up to 400,000 individuals' personal info. The breach was discovered by a Houston-based services provider that offers revenue cycle and management services to healthcare organizations. Those affected will receive credit monitoring and identity protection services.

Published: Mon Oct 14 18:38:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the Complex Web of CyberEspionage: A Rebuttal to Beijing's Claims on Volt Typhoon

China accuses US of creating Volt Typhoon threat actor as part of disinformation campaign, but lacks concrete evidence to back up claims.

Published: Mon Oct 14 20:45:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Under Fire: A Breach of Trust Exposed

Cisco has launched an investigation into allegations of a breach after stolen data was sold on a hacking forum. The company claims that it is taking the situation seriously, but questions remain about its response and the potential consequences for its customers.

Published: Mon Oct 14 21:51:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

India's Reserve Bank Governor Warns of Systemic Risk Amplification Due to AI and Big Tech

India's Reserve Bank Governor Warns of Systemic Risk Amplification Due to AI and Big Tech

Published: Mon Oct 14 22:56:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites


WordPress plugin Jetpack has patched a major vulnerability that could allow logged-in users to access forms submitted by others on a site, with an estimated 27 million sites potentially affected. A comprehensive set of patches was released by the developers in response to this issue, highlighting ongoing challenges within the cybersecurity landscape.

Published: Tue Oct 15 01:05:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pokemon Dev Game Freak Discloses Data Breach: A Look into the Cyber Attack that Exposed Source Code and Unpublished Games

Game Freak Inc., the Japanese video game developer behind the iconic Pokémon series, has been affected by a cyber attack that exposed source code and unpublished games. The breach highlights the importance of robust cybersecurity measures for companies in the gaming industry.

Published: Tue Oct 15 02:36:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaign Exploits Stolen Code-Signing Certificates to Spread Hijack Loader Malware



A new malware campaign has been uncovered by researchers at French cybersecurity firm HarfangLab, leveraging stolen code-signing certificates to deliver hijack loader malware. This threat serves as a reminder that traditional security measures alone may not be enough to protect against sophisticated cyber attacks.

Published: Tue Oct 15 03:44:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Cyber deception: China Claims US Fabricated Voltyyphoon and Alleged Salt Typhoon Crew to Discredit It



China claims US fabricated cyber-attack crew to discredit it, cites lack of evidence for alleged Salt Typhoon involvement.



Published: Tue Oct 15 05:23:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Cyber Deception: China Accuses US of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns


The US government has been accused by China of fabricating the Volt Typhoon threat actor to hide its own hacking campaigns. But what's really going on behind the scenes? Learn more about this developing story and how it affects the global cybersecurity landscape.

Published: Tue Oct 15 05:46:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Alarming Landscape of Cybersecurity: A Review of the Latest Threats and Vulnerabilities

Recent data highlights a plethora of cybersecurity threats, including critical flaws in plugins, vulnerabilities in software applications, and the use of artificial intelligence by cybercriminals. As the threat landscape continues to evolve, it's crucial for users to stay informed and take steps to protect themselves.

Published: Tue Oct 15 06:13:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Arlo Unveils its First Wired Floodlight Camera: A Revolutionary Upgrade to Outdoor Security

Arlo's First Wired Floodlight Camera Offers Advanced Outdoor Security Features at an Affordable Price

Published: Tue Oct 15 07:23:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercheck's Unchecked Claims: A Web of Deception and Doubt

Cybercheck, a leading provider of digital forensics tools, has been accused of making exaggerated claims about its technology. An investigation by WIRED has raised concerns about the accuracy and reliability of Cybercheck's methods, particularly in high-profile cases like the John Mendoza murder trial.

Published: Tue Oct 15 07:37:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Telegram's Nudify Bots: A Deep Dive into the Dark Side of AI-Generated Abusive Content

Telegram's "nudify" bots: A new wave of nonconsensual intimate image abuse using AI-generated images has reached alarming proportions on the messaging app. Millions of people are using these tools to create and disseminate abusive content, potentially devastating consequences for their victims. Read more about this disturbing trend and what can be done to combat it.

Published: Tue Oct 15 07:45:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Zero-Day Vulnerabilities: A New Era in Cybersecurity Threats


The rise of zero-day vulnerabilities poses a significant threat to organizations worldwide. Traditional security solutions have proven ineffective, leaving organizations exposed until after the damage is done. Adopting advanced Network Detection and Response (NDR) solutions is essential for modern organizations seeking to stay ahead of these threats and protect their critical assets.


Published: Tue Oct 15 07:54:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming End of Support: What You Need to Know About Microsoft Office 2016, 2019, Exchange Server, and Beyond

As support for Microsoft Office 2016 and 2019, as well as Exchange Server 2016 and 2019, comes to an end, organizations must prepare for a major migration effort. Will they be ready?

Published: Wed Oct 16 09:46:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ScarCruft Exploits Internet Explorer Zero-Day Flaw to Drop RokRAT Malware Through Toast Pop-Up Ads


ScarCruft, a state-sponsored cyber-espionage group, exploited an Internet Explorer zero-day flaw in a recent campaign dubbed "Code on Toast." The attackers used toast pop-up ads to deliver RokRAT malware to unsuspecting users. This attack highlights the ongoing threat of exploiting outdated software and emphasizes the need for users to keep their systems up-to-date and vigilant about online threats.

Published: Wed Oct 16 09:59:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Google Security: Leveraging Automation for Enhanced Cybersecurity Posture

Google has launched its latest security operations platform designed to empower organizations to enhance their security posture through automation of threat detection, incident response, and vulnerability management. Learn more about the practical strategies and techniques employed by Google experts in this webinar.

Published: Wed Oct 16 10:07:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Recent DDoS Attack: A Closer Look at the Incident and Its Implications

The Internet Archive recently suffered a devastating DDoS attack, leaving users concerned about their personal data. The attack was likely carried out by a modern Mirai variant with packet-spoofing features, using compromised devices from popular consumer electronics brands to launch the assault.

Published: Wed Oct 16 10:13:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

IBM Acquires Prescinto to Expand Leadership in Renewable Energy and Asset Lifecycle Management

IBM has announced the acquisition of Bangalore-based asset performance management software provider Prescinto, aiming to enhance its existing asset lifecycle management platform and expand leadership in renewable energy. The move marks a significant step forward for IBM's efforts to push for more automation and capitalize on the growing trend towards renewable energy sources.

Published: Wed Oct 16 10:33:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp's Enduring Grip on User Data: A Study in Vulnerability

WhatsApp's use of unique identity keys across multiple devices raises concerns about potential exposure of user data to malicious actors. A recent study by Zengo has highlighted the need for greater transparency and vigilance from messaging services regarding their data handling practices.

Published: Wed Oct 16 10:40:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of Cybersecurity: A Deluge of Vulnerabilities and Threats Threaten Global Stability

As the world teeters on the brink of chaos due to an unprecedented deluge of cybersecurity threats, one thing is certain: no entity is immune to these dangers. Stay informed and equipped with the latest knowledge and tools necessary to defend against emerging threats.

Published: Wed Oct 16 11:02:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Misuse of Artificial Intelligence: A Growing Threat to Cybersecurity



The use of artificial intelligence (AI) has become a double-edged sword, offering numerous benefits but also posing significant risks to cybersecurity. As AI continues to evolve and improve, so do the potential dangers associated with its misuse. This article will delve into the growing threat of AI-powered cyber attacks, the risks associated with these attacks, and the steps that organizations and individuals can take to protect themselves.

In a recent report by The Hacker News, the rise of AI-powered cyber attacks is being fueled by the increasing availability of large language models (LLMs) such as ChatGPT. These LLMs have become an attractive target for malicious actors due to their ability to generate human-like responses and their widespread adoption in various industries.

The article will also examine the latest frameworks and tools available to assist organizations in developing and creating AI-based software while minimizing the risk of misuse. With the increasing importance of AI in our daily lives, it is essential that we understand the potential dangers associated with its misuse and take necessary precautions to protect ourselves.

Stay tuned for this in-depth exploration of the misuse of artificial intelligence and the growing threat of AI-powered cyber attacks.

Published: Wed Oct 16 11:12:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ScarCruft Operation: Unveiling the Sophisticated Malware Campaign Targeting Windows Users



The ScarCruft group has been linked to the exploitation of a zero-day vulnerability in Microsoft's Windows operating system, compromising devices with malware known as RokRAT. As users update their software security, it is essential to remain vigilant and proactive in addressing these sophisticated threats.



Published: Wed Oct 16 11:23:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revolutionizing Cyber Threat Intelligence: 5 Techniques to Enhance Your Threat Investigations

Revolutionizing Cyber Threat Intelligence: 5 Techniques to Enhance Your Threat Investigations

Cyber threats are an ever-evolving menace, and it's essential to have a clear picture of the current threat landscape. This article explores five techniques for collecting cyber threat intelligence that can greatly improve your threat investigations. From pivoting methods to YARA rules, these techniques provide valuable insights into the latest cyber threats and trends in the cybersecurity world.

Published: Wed Oct 16 11:52:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Astaroth Banking Malware Resurfaces: A Spear-Phishing Campaign Targeting Brazil

A new spear-phishing campaign has been discovered targeting Brazilian users, delivering a banking malware called Astaroth via malicious emails impersonating official tax documents. To protect against such attacks, security best practices recommend enforcing strong password policies, using multi-factor authentication, keeping software updated, and applying the principle of least privilege.

Published: Wed Oct 16 11:56:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration: A Growing Concern for Cybersecurity

Nation-state attackers are exploiting vulnerabilities in the Ivanti Cloud Security Solution (CSA) to gain unauthorized access to networks, highlighting the need for robust security measures and ongoing vigilance. Organizations must stay informed about emerging threats and take proactive steps to protect their assets.

Published: Wed Oct 16 12:05:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Alerts: SolarWinds Help Desk Software Vulnerability Exposed to Active Exploitation

The US Cybersecurity and Infrastructure Security Agency (CISA) has alerted agencies to a newly discovered vulnerability in the SolarWinds Web Help Desk software, which could allow attackers to access sensitive information. The critical flaw has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation.

Published: Wed Oct 16 12:13:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds Microsoft Windows Kernel, Mozilla Firefox, and SolarWinds Web Help Desk Bugs to Its Known Exploited Vulnerabilities Catalog: A Growing Concern for Cybersecurity

U.S. CISA adds Microsoft Windows Kernel, Mozilla Firefox and SolarWinds Web Help Desk bugs to its Known Exploited Vulnerabilities catalog, highlighting the growing concern for cybersecurity as new threats emerge.

Published: Wed Oct 16 12:50:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of Recent Cybersecurity Threats: An Examination of Vulnerabilities and Exploits

Recent cybersecurity threats have left many organizations and individuals vulnerable to attack, including critical vulnerabilities in GitHub Enterprise Server, Microsoft Windows Kernel, Mozilla Firefox, and SolarWinds Web Help Desk. This article provides an in-depth examination of these threats, their potential impact, and the measures being taken to mitigate them.

Published: Wed Oct 16 13:17:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unlocking the Full Potential of AI Workloads: The Power of Robust Storage Solutions

Unlocking the full potential of AI workloads requires more than just cutting-edge hardware; it demands innovative storage solutions tailored to the unique needs of these systems. By leveraging Dell PowerScale, businesses can ensure seamless data exchange, optimized performance, and utmost efficiency in their AI workflows.

Published: Wed Oct 16 22:47:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Hackers Act as Brokers Selling Critical Infrastructure Access



Iranian hackers are now acting as brokers, selling access to critical infrastructure networks on the dark web. According to government agencies in the US, Canada, and Australia, these hackers use brute-force techniques such as password spraying and MFA 'push bombing' to breach networks. In order to elevate privileges, they rely on tools available on the system and leverage compromised credentials from virtual infrastructures. This emerging threat highlights the importance of robust security measures for organizations against evolving cyber threats.



Published: Wed Oct 16 23:09:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zero-Day Vulnerabilities: A Growing Concern for Cybersecurity

Google's Mandiant security analysts warn of a growing trend in zero-day vulnerability exploitation, with 70% of exploited flaws in 2023 being zero-days. This shift has significant implications for cybersecurity, highlighting the need for ongoing vigilance and proactive measures to prevent exploitation.

Published: Wed Oct 16 23:17:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A notorious hacker's Brazil arrest: USDoD behind National Public Data breach


A notorious hacker behind a high-profile data breach has been arrested by Brazilian authorities. USDoD, aka EquationCorp, was linked to the National Public Data breach, which exposed personal data and social security numbers of hundreds of millions of US citizens. The arrest marks a significant victory for law enforcement agencies in their pursuit of justice against cybercriminals like USDoD.

Published: Wed Oct 16 23:36:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SolarWinds Web Help Desk Flaw: A Critical Vulnerability Exploited by Hackers


A critical hardcoded credentials flaw has been found in SolarWinds Web Help Desk, a widely used IT help desk suite employed by 300,000 customers worldwide. The vulnerability allows remote unauthenticated attackers to access or modify data on WHD endpoints without any restriction. Federal agencies and organizations are advised to update to a safe version or stop using the product by November 5, 2024.

Published: Wed Oct 16 23:46:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A24 Unveils Whimsical Fantasy Adventure "The Legend of Ochi" Starring Willem Dafoe

A24 Unveils Whimsical Fantasy Adventure "The Legend of Ochi" Starring Willem Dafoe

Published: Wed Oct 16 23:54:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A US Government Contractor Agrees to Pay $306,722 to Settle Allegations it Failed to Properly Safeguard Medicare Beneficiaries' Personal Data

A US government contractor will settle claims it violated cyber security rules prior to a breach that compromised Medicare beneficiaries' personal data for $306,722 in restitution, but without admitting liability for the allegations. The settlement marks an important milestone in the ongoing efforts by the Department of Justice to hold accountable government contractors who mishandle sensitive personal information.

Published: Thu Oct 17 00:05:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability in Kubernetes Image Builder Allows Unauthorized SSH Access

A critical bug has been discovered in the Kubernetes Image Builder, allowing unauthorized SSH access to virtual machines (VMs) due to default credentials being enabled during the image build process. The vulnerability is severe and poses a significant security risk, prompting developers to upgrade their software and take extra precautions when working with default credentials.

Published: Thu Oct 17 00:27:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Volkswagen Data Dump: A Cautionary Tale of Ransomware Threats and Corporate Resilience

Volkswagen's recent warning about a stolen data dump from 8Base ransomware crew has left many in the cybersecurity community both intrigued and unconcerned. Despite the ominous threats, it appears that Volkswagen may be taking a measured approach to dealing with the situation.

Published: Thu Oct 17 00:38:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

SolarWinds' Web Help Desk Security Breach: A Critical Vulnerability Exposed

SolarWinds' Web Help Desk has been exposed to a critical vulnerability, allowing remote attackers to access sensitive data via hardcoded login credentials. The US Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, urging users to update their systems with the latest patch as soon as possible.

Published: Thu Oct 17 00:47:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Intel Under Fire for Alleged Backdoor Installations and Chip Security Flaws

Chinese industry group accuses Intel of embedding backdoors in its CPUs since 2008, citing potential national security risks. The Cybersecurity Association of China (CSAC) is calling for an investigation into the security of Intel's products sold in China, sparking concerns about the implications for global supply chains and individual freedoms.

Published: Thu Oct 17 00:56:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals: A Glimpse into the Dark World of Anonymous Sudan

A U.S. court has charged two Sudanese brothers with launching a series of devastating cyberattacks that put lives at risk, marking a significant milestone in efforts to hold individuals accountable for such crimes. The attacks, which targeted dozens of hospitals in multiple countries, were carried out by the hacker group Anonymous Sudan and are believed to have caused hours of downtime for healthcare services in Los Angeles. The charges against Ahmed and Alaa Omer carry a potential life sentence, highlighting the serious impact that DDoS attacks can have on victims.

Published: Thu Oct 17 01:16:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Threat Actors Hijack Legitimate Red Teaming Tool to Disable Endpoint Security: The EDRSilencer Breach


Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Threat actors are attempting to exploit the open-source EDRSilencer tool to evade endpoint detection and response (EDR) solutions, highlighting the ongoing trend of threat actors seeking more effective tools for their attacks.


Published: Thu Oct 17 01:19:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brazil's Polícia Federal Nabs Notorious Hacker USDoD: A Mastermind of Data Breaches and Cybercrime


Brazil's Polícia Federal has arrested the notorious hacker USDoD, responsible for high-profile data leaks from major organizations worldwide.

Published: Thu Oct 17 01:38:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Finnish Customs Cracks Down on Dark Web Narcotics Market: Sipulitie Takedown


Finnish Customs has successfully dismantled the notorious dark web narcotics market Sipulitie, marking a significant victory in the fight against online crime. The operation involved collaboration between international law enforcement agencies and cybersecurity experts, who worked together to disrupt and dismantle the platform's infrastructure. With its turnover estimated at €1.3 million, Sipulitie was one of the largest dark web platforms targeted by Finnish Customs in recent years.

Published: Thu Oct 17 02:00:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unmasking of Anonymous Sudan: A Cybersecurity Threat Assessment

US Attorney's Office Unseals Indictment against Alleged Operators of Hacktivist Group Anonymous Sudan, Charging Two with Conspiracy to Damage Protected Computers and Damaging Protected Computers.

Published: Thu Oct 17 03:21:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability Exposed: The Risk of Root Access through Kubernetes Image Builder


A critical vulnerability has been discovered in the Kubernetes Image Builder, posing a significant risk to nodes in clusters using virtual machine images created via the Image Builder project with the Proxmox provider. The fix for this issue addresses default credentials by eschewing them for randomly-generated passwords during image builds and disabling builder accounts at the end of the process.

Published: Thu Oct 17 03:33:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vulnerable by Design: The Growing Threat of Unpatched Software Flaws

VMware has released patches for a high-severity SQL injection flaw (CVE-2024-38814) affecting its HCX platform. This vulnerability highlights the need for organizations to prioritize software security and stay up-to-date with patch releases in order to mitigate the risk of being exploited by malicious actors.

Published: Thu Oct 17 03:50:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

WeChat's Modded TLS Introduces Security Weaknesses

Researchers from the University of Toronto's Citizen Lab have discovered that WeChat uses a modified TLS protocol called MMTLS, which introduces security weaknesses due to its inconsistent encryption implementation and lack of forward secrecy.

Published: Thu Oct 17 05:00:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unmasking the Face of Cyber Terrorism: The Rise of Distributed Denial-of-Service Attacks and the Case of Anonymous Sudan


A notorious DDoS-for-hire botnet known as Anonymous Sudan has been linked to record-breaking distributed denial-of-service attacks. With its Distributed Cloud Attack Tool, this entity conducted over 35,000 assaults in a single year, causing millions in damages and compromising critical infrastructure worldwide. This article delves into the activities of Anonymous Sudan, exploring its rise to prominence, modus operandi, and implications for global cybersecurity.

Published: Thu Oct 17 05:08:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

GPS Jamming Crisis Hits Northeastern Norway: A Growing Concern for Aviation Safety


GPS Jamming Is Disrupting Planes Across Northeastern Norway, Leaving Pilots to Navigate Without the Aid of Technology


Published: Thu Oct 17 06:28:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Vulnerability: The Hidden Risks of AI Chatbots

Security researchers have discovered an algorithm that can turn a malicious prompt into a set of hidden instructions that could send a user's personal information to an attacker, raising concerns about the potential dangers of AI chatbots. The new attack, dubbed "Imprompter," has left many experts sounding the alarm about the need for greater security measures.

Published: Thu Oct 17 06:36:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Closing the Visibility Gap: 5 Ways Nudge Security Can Help Reduce SaaS Security Risks


As the use of Software as a Service (SaaS) continues to grow at an unprecedented rate, IT and security teams are facing an ever-increasing SaaS attack surface. With 80% of breaches today involving compromised identities, including cloud and SaaS credentials, it is imperative for organizations to implement effective SaaS security solutions to mitigate the risk of identity-based threats. This article explores five key ways Nudge Security can help organizations close the visibility gap, manage OAuth risks, and reduce SaaS security risks.

Published: Thu Oct 17 06:48:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Stealthy Cyber Attacks: The Rise of SideWinder APT

SideWinder APT, a highly skilled group, has emerged as a major player in the world of advanced persistent threats (APTs). With its multi-stage attack using StealerBot malware, SideWinder has been wreaking havoc across multiple regions, including the Middle East and Africa. This article delves into the details of the attacks, highlighting the sophistication of the toolkit and the potential implications for organizations worldwide.

Published: Thu Oct 17 06:55:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Kubernetes Image Builder Exposes Root Access: A Growing Concern for Cloud Security

A critical flaw has been discovered in Kubernetes Image Builder, allowing attackers to gain root access. This vulnerability has significant implications for cloud security and highlights the importance of continuous monitoring and testing of open-source software components.

Published: Thu Oct 17 07:11:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Billboards of Betrayal: The Hacked MrBeast Billboard Scandal


A popular YouTube personality's brand was hijacked to display anti-Israel messages on two billboards in a Chicago suburb, sparking outrage among locals and Jewish community leaders. The incident raises questions about digital security, free speech, and social responsibility.

Published: Thu Oct 17 09:18:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Capture of a Global Cyber Menace: Brazilian Police Crack Down on USDoD


Brazilian police have cracked down on a serial cybercriminal believed to be responsible for some of the most high-profile cyberattacks in recent history. USDoD, who has been identified as the suspect, was arrested on Wednesday as part of Operation Data Breach. The individual is believed to have been linked to various high-profile data breaches, including those targeting the FBI's InfraGard and Airbus. As the investigation into the suspect's activities continues, cybersecurity experts are urging caution and emphasizing the importance of continued vigilance in the face of these threats.

Published: Thu Oct 17 09:23:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cicada3301: The Rise of a Ransomware-as-a-Service Threat

Cicada3301, a newly discovered ransomware-as-a-service threat actor, has gained notoriety for its sophisticated operations and affiliate program. With the ability to target critical sectors across multiple jurisdictions, Cicada3301 poses a significant risk to organizations seeking to protect themselves against such attacks.

Published: Thu Oct 17 09:28:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Blackmail Globe Life After Stealing Customer Data: A Cautionary Tale of Cybersecurity Failure

Hackers blackmail Globe Life after stealing customer data in shocking cyberattack. The incident highlights the importance of robust protection measures, adequate transparency, and cooperation between companies and law enforcement agencies.

Published: Thu Oct 17 10:51:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Automating Cloud Security: Leveraging Blink Ops for Enhanced Incident Response

Discover how Blink Ops is revolutionizing cloud security automation and incident response processes, empowering organizations to stay ahead of emerging threats.

Published: Thu Oct 17 11:07:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking the Highs: How a Fake SEC Tweet Sparked a $1,000 Bitcoin Price Spike

Eric Council Jr., a 25-year-old Alabama man, is accused of hacking the SEC's X account, posting a fake message about Bitcoin ETFs that caused a $1,000 price spike. The FBI says he used a SIM swapping attack to gain control of the account.

Published: Thu Oct 17 12:33:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

BianLian Ransomware Claims Attack on Boston Children's Health Physicians: A Sophisticated Cyber Heist


BianLian ransomware group claims attack on Boston Children's Health Physicians, targeting sensitive data of minors in a high-profile cyber heist. The organization asserts possession of finance, HR, personal identifiable information, health records, and other stolen files. With individuals affected by the incident set to receive notifications, this attack highlights the evolving threat landscape and the need for enhanced cybersecurity measures.

Published: Thu Oct 17 12:43:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian RomCom Attacks: Unveiling the Dark Art of SingleCamper RAT Variant

Russian RomCom has been linked to a new wave of cyber attacks targeting Ukrainian government agencies and unknown Polish entities using a variant of the SingleCamper RAT dubbed SingleCamper (aka SnipBot or RomCom 5.0). The attack vector is characterized by spear-phishing messages that deliver a downloader containing ShadyHammock or DustyHammock backdoors, executing post-compromise activities including network reconnaissance and data exfiltration.

Published: Thu Oct 17 12:49:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Cracks Down on Cryptocurrency Hackers: Alabama Man Arrested for Sim-Swapping Attack on SEC's X Account


FBI Cracks Down on Cryptocurrency Hackers: Alabama Man Arrested for Sim-Swapping Attack on SEC's X Account

A recent arrest by the FBI has brought attention to the growing threat of sim-swapping attacks, which have been used in a high-profile hack on the Securities and Exchange Commission's (SEC) X account. In this article, we'll explore the details of the attack and the role that 25-year-old Eric Council played in it. We'll also discuss the importance of protecting our personal information and taking steps to secure our accounts from malicious hackers.

Published: Thu Oct 17 14:05:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brazilian Police Crack Down on Cybercrime: Operation Data Breach Brings Culprit to Justice

Brazilian police have arrested a hacker linked to a massive data breach that exposed sensitive personal information of millions of individuals, in a major breakthrough for law enforcement agencies fighting cybercrime.

Published: Thu Oct 17 15:47:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Ricochet Exploit: A Detailed Examination of Activision's Anti-Cheat Hack Fix

The Great Ricochet Exploit: A Detailed Examination of Activision's Anti-Cheat Hack Fix

Summary:

In a shocking revelation, Activision has confirmed that it has fixed an anti-cheat hack in Modern Warfare III and Call of Duty: Warzone. However, the problem is far more complex than initially stated, with zebleer claiming that several thousand players were banned by this exploit before anyone started targeting big streamers. As the gaming industry continues to grapple with cheating and exploitation, Activision must take steps to strengthen its anti-cheat systems and prevent similar incidents from happening again.

Published: Thu Oct 17 16:53:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake Google Meet Conference Errors Push Infostealing Malware: The Rise of ClickFix Campaigns


Infostealing malware is on the rise, with fake Google Meet conference errors being used to deliver malicious payloads. ClickFix campaigns have become increasingly sophisticated, using phishing emails, fake Facebook pages, and deceptive GitHub issues to trick victims into downloading infostealing malware. Stay safe online by being aware of these risks and taking steps to protect yourself.

Published: Thu Oct 17 17:07:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft's Security Log Nightmare: A Month of Lost Data Exposes Critical Vulnerability


Microsoft recently warned its enterprise customers that it lost some customer's security logs for a month due to a bug caused by an issue with their log collection service. The data loss put companies at risk of undetected attacks as the logs included critical security data such as suspicious traffic and login attempts. Microsoft has since resolved the issue, but cybersecurity experts are still raising concerns over the incident.

Published: Thu Oct 17 18:27:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia-Linked RomCom Group Embarks on Widespread Cyber Campaign Targeting Ukrainian Government Agencies and Polish Entities

A Russia-linked group known as RomCom has been carrying out a series of high-profile cyber attacks on Ukrainian government agencies and Polish entities, using sophisticated malware to gain unauthorized access to sensitive information. In this article, we will explore the tactics, techniques, and procedures (TTPs) employed by RomCom and examine the implications for global cybersecurity.

Published: Thu Oct 17 18:53:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Insurance Giant Faces Fresh Headache as Extortion Attempt Reveals Leaked Customer Data


A US insurance giant, already grappling with legal troubles, has faced a fresh headache as an extortion attempt involving leaked customer data revealed. Globe Life claimed that it received a threat from an unknown entity demanding money in exchange for not publishing certain information related to its customers. The breach reportedly involves approximately 5,000 individuals and includes sensitive data such as social security numbers and health-related information.

Published: Thu Oct 17 20:07:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Shadowy Realm of Cybercrime: The Anonymous Sudan Group's Operation

Two Sudanese nationals have been indicted for operating the Anonymous Sudan group, a notorious collective that launched tens of thousands of Distributed Denial of Service (DDoS) attacks against critical infrastructure, corporate networks, and government agencies in the United States and around the world. The arrest marks an important milestone in the fight against cybercrime and highlights the need for continued collaboration and cooperation between law enforcement agencies around the world to combat this growing threat.

Published: Thu Oct 17 20:25:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rybar's Russian Ties Exposed: A $10 Million Bounty for Election Meddling

Rybar's Russian Ties Exposed: A $10 Million Bounty for Election Meddling - The US government has taken a significant step towards combating election interference by placing a $10 million bounty on Russian media network Rybar and nine of its key staffers, following allegations that they sought to sway the upcoming US presidential election through anti-West narratives.

Published: Thu Oct 17 21:56:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of North Korean IT Scams: A Growing Threat to Global Businesses

The rise of North Korean IT scams poses a significant risk to businesses worldwide. These scams involve unwittingly hiring fake IT workers who steal sensitive data and extort money from the companies that hire them. To avoid falling victim to these schemes, it is essential for companies to take proactive measures to secure their networks and protect against potential threats.

Published: Fri Oct 18 00:10:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Chip Firewall: Intel's Denial of NSA-Backed Security Vulnerabilities Amid Escalating US-China Cybersecurity Tensions

Intel's denial of NSA-backed security vulnerabilities amidst escalating US-China cybersecurity tensions highlights the complexities of global chip trade, national security interests, and technological advancements. The controversy raises questions about the nature of security vulnerabilities and how they are perceived by different nations.

Published: Fri Oct 18 01:43:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The macOS Vulnerability that Allows Hackers to Bypass Privacy Controls

Microsoft has revealed a critical vulnerability in Apple's Transparency, Consent, and Control (TCC) framework on macOS that could enable hackers to bypass user privacy preferences and access sensitive data, including browsed pages, device camera, microphone, location, and other personal information without consent. This vulnerability highlights the importance of addressing emerging threats and ensuring robust cybersecurity measures to protect user data.

Published: Fri Oct 18 01:50:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Chip Backdoor Allegations: Intel's Response to Chinese Claims


Intel has responded to allegations made by the Cybersecurity Association of China (CSAC) regarding the presence of security backdoors in its chips, with the company denying any wrongdoing but not fully addressing the concerns. The CSAC's accusations have raised questions about the role of the National Security Agency (NSA) in US chip manufacturing and highlight the need for greater transparency and accountability from US chip manufacturers.

Published: Fri Oct 18 05:28:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Modern Warfare: How the US Army's 1959 Vision for the "Soldier of Tomorrow" Predicted Future Innovations


The US Army's 1959 vision for the "soldier of tomorrow" has been rediscovered in the context of modern warfare, revealing surprising accuracy in predicting future technological advancements. As we explore the evolution of military technology, it becomes clear that a deep understanding of historical context is essential to grasping the significance of these innovations and their lasting impact on modern combat.

Published: Fri Oct 18 05:55:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaign Utilizes Fake Google Meet Pages to Deliver Infostealers


A recent malware campaign dubbed ClickFix has been discovered leveraging fake Google Meet web pages to deliver infostealers targeting Windows and macOS systems. The attack chain involves displaying fake error messages in web browsers to deceive users into copying and executing malicious PowerShell code, ultimately infecting their systems. Threat actors are using different lures to redirect users to bogus pages that aim to deploy malware by urging site visitors to run an encoded PowerShell code to address a supposed issue with displaying content in the web browser.

Published: Fri Oct 18 06:48:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Sophisticated Attackers Exploiting F5 BIG-IP Cookies for Network Reconnaissance


CISA has issued a warning about threat actors exploiting F5 BIG-IP cookies for network reconnaissance. The alert highlights the growing concern of sophisticated attackers targeting vulnerable networks, emphasizing the need for organizations to take immediate action to patch the vulnerability and implement additional security measures.

Published: Fri Oct 18 07:04:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Wave of Iranian Cyberattacks: A Year-Long Campaign to Infiltrate Critical Infrastructure

Recent warnings from cybersecurity agencies around the world have shed light on a new wave of Iranian cyberattacks that are part of a year-long campaign to infiltrate critical infrastructure organizations. The attacks use brute force and password spraying, as well as sophisticated tactics such as MFA prompt bombing and living-off-the-land tools. Organizations must take proactive measures to protect themselves against these types of attacks.

Published: Fri Oct 18 07:14:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Capture of USDoD: Unraveling the Threads of a Notorious Cybercrime Operation

USDoD, a notorious cybercriminal, has been arrested by Brazilian authorities in connection with various high-profile data breaches. The capture marks an important milestone in the ongoing pursuit of cybercrime operations and highlights the need for global cooperation to counter these evolving threats.

Published: Fri Oct 18 09:20:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Consequences of Manipulating Financial Markets: The Case of Eric Council Jr.

The Consequences of Manipulating Financial Markets: The Case of Eric Council Jr.

Published: Fri Oct 18 09:33:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Intel Responds to Chinese Accusations of NSA Backdoors in Its Chips

Intel has responded to Chinese accusations that its chips contain security backdoors at the direction of America's NSA, but the company's statement appears to sidestep the specific issue of NSA backdoors.

Published: Fri Oct 18 09:45:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's Insidious Insider Threat: A Lurking Menace in Western Firms

North Korean IT workers employed under false identities are now demanding ransom payments from their former employers in exchange for stolen data, marking a significant escalation in the nation's efforts to advance its strategic and financial interests through cyber espionage. Learn more about this emerging threat and how organizations can protect themselves.

Published: Fri Oct 18 09:56:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nidec's Data Breach: A Cautionary Tale of Ransomware and Poor Security Measures

Nidec Corporation has confirmed that its systems were breached by hackers earlier this year, resulting in the theft of sensitive data. The Japanese tech giant had previously acknowledged a ransomware attack but refused to name the perpetrators. However, according to Nidec's latest statement, the attackers were from the 8BASE ransomware gang. The breach highlights the importance of robust security measures and regular training for employees.

Published: Fri Oct 18 11:46:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Maximizing K-12 Cybersecurity: How to Leverage the $200 Million FCC Program


The Federal Communications Commission (FCC) has launched a $200 million K-12 Cybersecurity Pilot Program aimed at strengthening cybersecurity measures in educational institutions across the United States. With threats escalating, it's critical that schools address these cybersecurity challenges effectively. A trusted partner like Cynet Security can provide invaluable support throughout the process, helping schools assess their current cybersecurity status and create a tailored cybersecurity strategy to combat evolving threats.

Published: Fri Oct 18 11:54:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ESET Phishing Campaign Uses Legitimate Email Address to Distribute Malicious Data Wiper

Phishing campaigns targeting devices in Israel using data wipers are becoming increasingly sophisticated, with a recent campaign using legitimate email addresses from companies like ESET to distribute malicious software. Organizations and individuals are advised to be vigilant against such phishing attacks.

Published: Fri Oct 18 14:54:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ESET Denies Compromise Amid Targeted Attacks on Israeli Organizations



In a shocking turn of events, ESET has denied being compromised by hackers who targeted several Israeli organizations with what appeared to be an ESET-branded malware campaign. The incident raises questions about the motivations behind the attack and highlights the need for continued vigilance in protecting against cyber threats.



Published: Fri Oct 18 15:10:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy Hands of Iranian Cyber Actors: A Threat to Critical Infrastructure

Iran-linked actors are targeting critical infrastructure organizations worldwide, posing a significant threat to global stability and security. Learn more about this sophisticated campaign and its implications for cybersecurity in our latest article.

Published: Fri Oct 18 15:52:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Under Fire: DevHub Portal Takedown Amidst Alleged Breach and Stolen Data

Breaking news: Cisco's public DevHub portal was taken offline following an alleged breach by a threat actor who claimed to have stolen sensitive data. The incident raises concerns about the company's security measures and the potential exposure of customer data.

Published: Fri Oct 18 17:50:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jetpack Patches 8-Year-Old Bug Affecting Millions of WordPress Sites


In a significant development in the realm of cybersecurity, a critical security update has been released for the near-ubiquitous WordPress plugin Jetpack. This update addresses an 8-year-old bug that could potentially be used by malicious actors, emphasizing the importance of timely updates and patching in modern cybersecurity practices.

Published: Fri Oct 18 21:20:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Disinformation Warning from the Edge of Europe: A Cautionary Tale of Online Manipulation


A sophisticated disinformation operation in Moldova threatens to undermine the country's democratic process, highlighting the need for enhanced cooperation between governments and social media platforms to combat this growing threat.

Published: Sat Oct 19 01:38:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Omni Family Health Data Breach: A Cyberattack on a Non-Profit Organization

Omni Family Health has disclosed a data breach impacting nearly 470,000 current and former patients and employees due to a cyberattack that took place earlier this year. The breach resulted in the leak of personal information on the dark web.

Published: Sat Oct 19 01:57:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crypt Ghouls' Global Campaign: Unmasking the Mysterious Group Behind Russia's Ransomware Attacks

Crypt Ghouls, a mysterious group behind Russia's recent rash of ransomware attacks, has been linked to a series of high-profile cyber assaults on Russian businesses and government agencies. The group's use of LockBit 3.0 and Babuk ransomware, coupled with its reliance on compromised credentials and popular open-source tools, has left cybersecurity experts scrambling to understand the full extent of its operations.

Published: Sat Oct 19 03:16:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shaping of Tomorrow: Emerging Trends in Cybersecurity and Technology


In this explosive exposé, we delve into the world of cybersecurity and technology, examining emerging trends, technological breakthroughs, and the consequences of their implementation. From Google Chrome’s uBlock Origin Purge to Microsoft’s missing security logs and JD Vance's dubious activities, we navigate a complex digital landscape marked by both promise and peril.

Published: Sat Oct 19 07:28:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT37's Latest Supply Chain Attack: Unveiling the Web of Deceit



In a recent attack, North Korea-linked APT37 exploited an Internet Explorer zero-day vulnerability in a supply chain attack, compromising the online advertising agency behind the Toast ad program. This breach serves as a stark reminder of the ever-evolving landscape of cyber threats and highlights the importance of vigilance in the face of emerging vulnerabilities.

Published: Sat Oct 19 09:59:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Deceptive Honeypot: A Game-Changing Strategy to Combat Phishing Attacks

Microsoft has launched a bold new strategy to combat phishing attacks by creating fake Azure tenants that appear realistic to phishers, luring them into honeypots where they can be tracked and studied in detail. This innovative approach aims to divert attackers away from real environments, collect intelligence on tactics used to breach systems, and ultimately develop more effective defenses against sophisticated phishing operations.

Published: Sat Oct 19 11:23:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Veeam Vulnerability: A Growing Concern for Remote Access and Data Protection


A critical vulnerability has been added to the Known Exploited Vulnerabilities catalog by CISA, highlighting the need for organizations to prioritize data protection and remote access security. The Veeam Backup and Replication flaw is a severe RCE vulnerability that can be exploited to deploy malware and create rogue accounts.

Published: Sat Oct 19 11:48:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revealing the Hidden: The Emergence of Vulnerability Detection Tools Utilizing Large Language Models

Researchers have developed a new tool called Vulnhuntr that uses Large Language Models (LLMs) to identify zero-day vulnerabilities in Python code. The tool has already identified over a dozen zero-day vulnerabilities in large open-source projects, making it a significant breakthrough in the field of vulnerability detection.

Published: Sun Oct 20 04:14:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Vulnerability in Open-Source Roundcube Webmail Software to Steal Login Credentials

Hackers Exploit Vulnerability in Open-Source Roundcube Webmail Software to Steal Login Credentials

Published: Sun Oct 20 04:20:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Attacks: A Looming Threat to Global Security


A multitude of high-profile cyber attacks have been reported across various sectors, including government institutions, financial organizations, healthcare providers, and educational institutions, resulting in significant data breaches and ransomware attacks. This article delves into the details of these recent incidents, highlighting the vulnerabilities exploited and the measures being taken to mitigate future risks.


Published: Sun Oct 20 06:37:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Landscape of Cybersecurity Threats: A Deep Dive into the World of Hackers, APTs, and Data Breaches



The world of cybersecurity is facing a perfect storm of threats, from nation-state actors to rogue hackers, each leaving their mark on the digital world. This latest round of Security Affairs newsletter highlights some of the most egregious incidents, providing a glimpse into the complex and ever-evolving world of cyber threats.

From China-linked Flax Typhoon APT targeting Taiwan to the alleged exploitation of zero-day vulnerabilities in older iPhones, this latest wave of attacks underscores the growing importance of cybersecurity awareness and proactive measures to protect against these threats. As organizations continue to prioritize their digital infrastructure, it is crucial that they stay informed about the latest threats and take steps to mitigate them.

With the increasing influence of ransomware as a tool for hackers, it is essential that individuals and organizations alike remain vigilant in the face of these threats. By staying up-to-date with the latest security patches and best practices, we can reduce our risk of falling victim to these malicious campaigns.

In this article, we will delve into the world of cybersecurity threats, exploring the most recent incidents and the experts who are warning about the growing threat of nation-state-sponsored hacking. We will also examine the implications of these attacks and the steps that organizations can take to protect themselves against these threats.



Published: Sun Oct 20 08:32:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive Breach: A Cautionary Tale of Security Vulnerabilities and the Unforeseen Consequences

The Internet Archive has been breached, with hackers gaining access to internal emailing tools and sensitive user data. The site's founder, Brewster Kahle, is working around the clock to bring back its services, but in a read-only mode at first. This incident highlights the importance of robust security measures and the need for organizations to prioritize data protection.

Published: Sun Oct 20 09:40:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Potentially Exploitable Vulnerability in Apple's Safari Browser Raises Concerns about User Privacy

A potentially exploitable vulnerability has been discovered in Apple's Safari browser, which could allow attackers to access sensitive user data. Experts warn that this bug, tracked as CVE-2024-44133, is a serious security concern that highlights the need for robust security measures to protect user privacy.

Published: Mon Oct 21 10:28:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Chip Conundrum: A Web of Accusations and Allegations Surrounding Chinese Intelligence Gathering

Three major US technology companies – Tesla, Intel, and TSMC – are embroiled in a controversy surrounding allegations of Chinese intelligence gathering, with Beijing's Ministry of State Security accusing one firm of evading supervision and hiding its true motives. As the stakes continue to rise, it is essential that these companies prioritize compliance and adhere to strict standards.

Published: Mon Oct 21 10:38:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Zendesk Breach: A Looming Cloud Over the World's Digital Heritage

The Internet Archive's Zendesk Breach: A Looming Cloud Over the World's Digital Heritage

The Internet Archive, a digital library and repository of internet artifacts, has been hit by another breach. This time, it is not its own digital heritage that is under threat but rather its sensitive information stored on its Zendesk implementation. The incident raises concerns about the organization's ability to protect its users' personal data and highlights the importance of digital security awareness and education.

Published: Mon Oct 21 10:53:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI Regulatory Conundrum: Balancing Safety, Security, and Free Speech in the Age of Artificial Intelligence



The Biden Administration's Efforts to Regulate Artificial Intelligence: A Divisive Debate on Safety, Security, and Free Speech

As the debate over artificial intelligence (AI) continues to intensify, the Biden administration is facing growing pressure from both supporters and critics alike. The government's efforts to regulate AI have sparked a heated discussion on the need for safety measures, security protocols, and free speech protections. This article delves into the complexities of the AI regulatory landscape, exploring the various perspectives and concerns surrounding the Biden administration's initiatives.



Published: Mon Oct 21 11:14:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Lithium Battery Dilemma: A Global Conundrum Exposed

The US government is increasingly concerned about relying on Chinese lithium batteries for energy storage, citing national security risks and economic challenges. As the global market dominates by Chinese companies, efforts are being made to support domestic industries and promote a healthy battery supply chain.

Published: Mon Oct 21 11:31:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT41: The Sophisticated Chinese Nation-State Actor Behind a Lurking Cyber Menace

APT41 has been linked to a sophisticated cyber attack targeting the gambling and gaming industry, highlighting its relentless pursuit of financial gain through stealthy espionage attacks. This multi-stage campaign showcases the actor's sophistication and persistence, emphasizing the need for robust cybersecurity measures to protect against state-sponsored campaigns.

Published: Mon Oct 21 11:40:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pentesting Checklists: The Key to Unlocking Comprehensive Security Assessments

Pentesting checklists have become an indispensable tool for organizations seeking to ensure the robustness of their cybersecurity defenses. Learn how these checklists can help you identify and address security weaknesses in this in-depth article. Discover the benefits, challenges, and delivery models associated with pentesting checklists and make informed decisions about your cybersecurity strategy.

Published: Mon Oct 21 11:57:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

LUCR-3: The Elusive Threat Master's War Room Strategy Session Reveals the Achilles' Heel of Cloud Defenses


Get ready for a battle against one of the most elusive threats in the cybersecurity world. In this exclusive war room strategy session, Ian Ahl and Mandiant will reveal the Achilles' heel in cloud defenses that LUCR-3 has been exploiting. Join them to gain a deep understanding of the threat actor's TTPs and learn how to arm your own cloud defenses with the counterpunch.

Published: Mon Oct 21 12:11:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Severe Security Flaws Found in Major E2EE Cloud Storage Providers

Researchers have discovered severe security flaws in major end-to-end encrypted cloud storage providers, including Sync, pCloud, Icedrive, Seafile, and Tresorit. These vulnerabilities pose a significant threat to the confidentiality and integrity of user data, highlighting a critical need for increased vigilance among cloud storage providers and users alike.

Published: Mon Oct 21 12:19:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Double Breach: A Cautionary Tale of Poor Cyber Hygiene


The Internet Archive suffered two high-profile breaches in October 2024, with attackers gaining access to its Zendesk email support platform through stolen GitLab authentication tokens. The breach highlights a poor security posture by the organization and serves as a warning to other organizations to prioritize cyber hygiene and invest in robust security systems.

Published: Mon Oct 21 12:37:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Roundcube Webmail Flaw Exploited in Phishing Campaign: A Cautionary Tale of Vulnerability and Cybercrime


Unknown threat actors have exploited a now-patched vulnerability in Roundcube Webmail as part of a phishing campaign aimed at stealing user credentials from the open-source webmail software. Researchers warn that vulnerabilities in Roundcube Webmail continue to be a frequent target for cybercriminals, particularly due to its prevalent use by government agencies.

Published: Mon Oct 21 12:57:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Over 6,000 WordPress Sites Compromised by Malicious Plugins: A Growing Threat to Cybersecurity

Over 6,000 WordPress sites have been compromised by malicious plugins that push information-stealing malware. The ClickFix campaign highlights the ongoing threat posed by this type of attack and underscores the importance of vigilance and awareness among website administrators and users alike.

Published: Mon Oct 21 15:38:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Bumblebee Malware Resurfaces After Europol's Operation Endgame Disruption


Bumblebee malware has resurfaced after a nearly four-month hiatus, raising concerns about its resurgence and potential threats to victim networks. In a recent report by Netskope, researchers documented a new Bumblebee attack chain that exploits phishing emails, malicious MSI files, and PowerShell scripts. The article delves into the tactics used by Bumblebee, including its signature internal DLL naming scheme and RC4 key string "NEW_BLACK," providing an in-depth look at this evolving malware threat.

Published: Mon Oct 21 15:57:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unhackable Phone and Tesla's Self-Driving Fiasco: A Tale of Security and Deception


Dan O'Dowd, a billionaire entrepreneur and security expert, has made headlines for his claims that his operating system, Integrity-178B, is "unhackable". But not everyone shares his optimism about the OS's security. Meanwhile, Tesla's self-driving software has been under intense scrutiny, with some experts hailing it as the future of transportation while others have raised concerns about its safety and efficacy.

Published: Mon Oct 21 16:22:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ICE's $2 Million Contract With a Spyware Vendor Is Under White House Review: A Global Conundrum on National Security and Human Rights Threats



ICE's $2 Million Contract With a Spyware Vendor Is Under White House Review: A Global Conundrum on National Security and Human Rights Threats

A recent development has brought to light the United States Immigration and Customs Enforcement's (ICE) controversial $2 million contract with Israeli commercial spyware vendor Paragon Solutions, which has been placed under scrutiny by the White House. This article delves into the intricacies of this contract, the implications it holds for national security and human rights, and the global efforts to combat mercenary spyware.



Published: Mon Oct 21 16:40:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Confirms DevHub Environment Breach: IntelBroker Claims Stolen Data from Public-Facing Platform

Cisco confirms that data published on its DevHub platform was taken from a public-facing environment, sparking concerns about the vulnerability of public-facing platforms to cyber-attacks. The company's investigation into the breach is ongoing, and preliminary findings suggest that attackers obtained sensitive information, including Github projects, Gitlab Projects, SonarQube projects, Source code, hard-coded credentials, Certificates, Customer SRCs, Confidential Documents, Jira tickets, API tokens, AWS Private buckets, company Technology SRCs, Docker Builds, Azure Storage buckets, Private & Public keys, SSL Certificates, Cisco Premium Products, and other information.

Published: Mon Oct 21 17:15:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Vulnerability in Roundcube Webmail to Steal Email Credentials



Hackers have exploited a medium-severity stored XSS vulnerability in the Roundcube Webmail client, allowing them to steal email credentials and sensitive data from government entities in the CIS region. The latest version of Roundcube Webmail has already been patched, but users are advised to update immediately to ensure their security.

Published: Mon Oct 21 19:10:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberspace Controversies: The Escalating Battle Between China's Infosec Leaders and US Tech Giants

China's Spamouflage Cranks Up Trolling of US Senator Marco Rubio as Election Day Looms

Published: Mon Oct 21 19:23:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sophos to Acquire Secureworks in $859 Million Deal, Further Consolidating Cybersecurity Landscape



Sophos has announced its intention to acquire Secureworks in an all-cash deal valued at approximately $859 million, further consolidating the cybersecurity landscape. The acquisition is seen as a strategic partnership aimed at strengthening both companies' positions in the market and enhancing their ability to provide better outcomes for organizations globally.

Published: Mon Oct 21 19:34:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Alerts: ScienceLogic SL1 Vulnerability Added to Exploited Catalog Amid Active Zero-Day Attack


CISA has added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog following reports of an active zero-day attack. This vulnerability could lead to remote code execution and organizations are advised to apply the fixes by November 11, 2024. Additionally, Fortinet has released security updates for FortiManager to remediate a vulnerability reportedly exploited by China-linked threat actors. Stay informed about the latest cybersecurity threats and take proactive measures to strengthen your defenses.

Published: Tue Oct 22 00:23:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Ghostpulse: A Stealthy Malware Threat to Global Cybersecurity

Ghostpulse, a stealthy malware strain, has gained notoriety for its sophisticated methods of evasion and its ability to hide in plain sight within PNG image files. This article delves into the world of Ghostpulse, exploring its tactics, techniques, and impacts on global cybersecurity.

Published: Tue Oct 22 01:52:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

VMware Releases Critical Patches to Fix Remote Code Execution Vulnerability in vCenter Server


VMware has released critical patches to fix a remote code execution vulnerability in its vCenter Server. The patch addresses a heap-overflow vulnerability in the implementation of the DCE/RPC protocol, which could potentially be exploited by malicious actors with network access to vCenter Server. While there is no evidence that this vulnerability has been exploited in the wild, users are advised to update to the latest versions of vCenter Server to safeguard against potential threats.

Published: Tue Oct 22 03:13:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

VMware's VCenter Server RCE Flaw: A Wake-Up Call for Cybersecurity


VMware's vCenter Server RCE flaw highlights the ongoing threat landscape of remote code execution vulnerabilities. The incident demonstrates the importance of staying up-to-date with the latest security patches and updates from software vendors and emphasizes the need for robust cybersecurity measures to protect against such threats.

Published: Tue Oct 22 03:33:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Landscape Evolves: A Complex Web of Threats and Vulnerabilities

A complex array of cyber threats and vulnerabilities has emerged in 2024, highlighting the need for robust cybersecurity measures to protect sensitive information and prevent malicious activities.

Published: Tue Oct 22 05:13:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Bumblebee and Latrodectus Malware Resurface with Sophisticated Phishing Strategies


Beware: Bumblebee and Latrodectus Malware Resurface with Sophisticated Phishing Strategies
Two malware families thought to have been crippled by Operation Endgame are back in action, targeting financial, automotive, and business sectors. Stay ahead of the threat landscape with the latest news and expert insights from The Hacker News.

Published: Tue Oct 22 06:39:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadows of Deception: A Looming Threat to Ethereum Wallets via Malicious npm Packages


A new campaign has emerged in the world of cybersecurity that targets Ethereum wallets with SSH backdoors via malicious npm packages. The affected packages include ethers-mew, ethers-web3, and others, which aim to impersonate legitimate Ethereum packages. This attack campaign requires developers to use the package in their code, making it even more challenging for security teams to detect and respond to the threat.

Published: Tue Oct 22 06:50:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Facial Recognition Technology Returns to Meta's Platforms as Part of Efforts to Combat Fake Celebrity-Endorsed Scams and Restore Compromised Accounts

Meta Brings Back Face Scanning to Combat Scams and Account Hacking

Published: Tue Oct 22 08:01:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Forgotten Security Assets: A Comprehensive Guide to Finding and Securing Service Accounts in Active Directory


Service accounts in Active Directory: A Hidden Security Risk Waiting to Be Exploited
The use of service accounts in Active Directory (AD) has become increasingly prevalent, but their elevated privileges also pose a significant security risk. This article delves into the world of service accounts, exploring how they can be identified, monitored, and secured in order to mitigate this risk.



Published: Tue Oct 22 08:11:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vulnerability Patched: VMware Addressing Critical vCenter Server Remote Code Execution Flaw


VMware has released a new patch to fix a critical remote code execution (RCE) flaw in its vCenter Server software. The patch addresses a previously uncorrected vulnerability discovered during the China's 2024 Matrix Cup hacking contest. All impacted customers are strongly encouraged to apply the latest updates as soon as possible.

Published: Tue Oct 22 09:24:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Internet Archive's Resilience in the Face of Cyber Attacks: A Critical Examination of the Organization's Response to a Devastating Hack



The Internet Archive, a digital repository that has been a cornerstone of the internet for over two decades, recently faced a devastating cyber attack that exposed sensitive data from millions of users. This article examines the organization's response to the attack, its resilience in the face of cyber threats, and the context surrounding this incident.

Published: Tue Oct 22 09:35:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Security Flaw Exposed: The OPA Vulnerability and Its Implications


A critical security flaw has been exposed in Styra's Open Policy Agent (OPA), allowing attackers to leak NTLM hashes and potentially gain unauthorized access to sensitive data. The vulnerability has significant implications for organizations that rely on OPA, and a patch is now available. Stay informed about the latest cybersecurity threats and best practices for securing your organization with The Hacker News.

Published: Tue Oct 22 09:43:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Exploit Docker API Servers to Deploy Crypto Mining Attacks


Cybercriminals are exploiting Docker remote API servers to deploy SRBMiner crypto mining attacks, posing significant risks to cloud security and network integrity. Organizations must prioritize cloud security and implement robust security measures to prevent unauthorized access to Docker remote API servers.

Published: Tue Oct 22 09:53:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Wave of Bumblebee Malware Attacks Wreak Havoc on Global Cybersecurity Landscape


New Wave of Bumblebee Malware Attacks Wreak Havoc on Global Cybersecurity Landscape

A recent surge in malicious activities involving the Bumblebee malware has left cybersecurity experts warning of a new wave of attacks that pose significant threats to global networks and systems. As experts scramble to respond to this evolving threat landscape, one thing is clear: the battle against cybercrime will only become more complex and demanding in the days ahead.

Stay informed about the latest developments in the fight against cyber threats and learn how you can protect yourself from falling victim to these malicious activities.

Published: Tue Oct 22 10:16:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp's Revolutionary Update: A New Era for Contact Management

WhatsApp has introduced a groundbreaking update that allows users to save contacts within its app independently from their smartphone's address book. The new feature uses secure technology called Identity Proof Linked Storage (IPLS) and introduces a phone number-free option, marking an important step towards prioritizing user data security and flexibility.

Published: Tue Oct 22 12:54:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exploiting Microsoft's Remote Registry Client: A New NTLM Relay Attack on Windows Servers

Microsoft's Remote Registry client has been found to be vulnerable to a new NTLM relay attack, which could potentially allow attackers to take control of Windows domains by downgrading authentication security. The vulnerability affects all versions of Windows Server 2008 through 2022 as well as Windows 10 and Windows 11.

Published: Tue Oct 22 13:17:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

TSMC Sounds Alarm on Potential Huawei Sanctions Breach Amid Growing US-China Tech Tensions

TSMC Sounds Alarm on Potential Huawei Sanctions Breach Amid Growing US-China Tech Tensions

In a shocking development, Taiwan Semiconductor Manufacturing Company (TSMC) has reportedly tipped off US officials to a potential attempt by Huawei to circumvent export controls and obtain AI chips manufactured by the Taiwanese company. This follows growing tensions between the US and China over technology, national security, and trade policies.

Published: Tue Oct 22 13:54:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

VMware Faces Critical Vulnerabilities in vCenter Server: A Security Nightmare

VMware has released a second patch for critical heap overflow bugs and make-me-root flaws in its vCenter Server product, following the initial release last month which did not fully address the issues. The company's owner Broadcom has confirmed that further updates are necessary to ensure customer safety.

Published: Tue Oct 22 14:19:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Price of Secrecy: Tech Firms Pay Millions for Misleading Investors on SolarWinds Hack

The Price of Secrecy: Tech Firms Pay Millions for Misleading Investors on SolarWinds Hack
The Securities and Exchange Commission (SEC) has taken action against four prominent tech firms, Unisys, Avaya, Check Point, and Mimecast, for making "materially misleading disclosures" regarding the 2020 SolarWinds hack. The firms agreed to pay millions of dollars in penalties without admitting or denying wrongdoing, highlighting the importance of accurate and timely disclosure in cybersecurity incidents.

Published: Tue Oct 22 14:32:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira Ransomware: The Resurgence of a Double-Extortion Tactic

Akira Ransomware: The Resurgence of a Double-Extortion Tactic

Published: Tue Oct 22 14:49:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposed: United Nations Database Left Vulnerable to Exploitation


The United Nations Trust Fund to End Violence Against Women database was left sensitive information accessible online for over 115,000 files, revealing detailed financial disclosures and personal details of vulnerable individuals. A cybersecurity researcher discovered the exposed data and disclosed it to the UN, which secured the database. The incident highlights the importance of cybersecurity awareness in organizations that work with sensitive information.

Published: Tue Oct 22 14:56:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unlikely Heroes of Ukraine: How a Group of Amateur Activists Are Fighting Back Against Russia

NAFO: A Decentralized Activist Network Fighting Back Against Russia's Propaganda Efforts

Published: Tue Oct 22 15:31:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Gophish Framework Used to Deploy DarkCrystal RAT and PowerRAT Malware in Phishing Campaigns


In a recent phishing campaign, attackers leveraged an open-source tool called Gophish to deliver DarkCrystal RAT and PowerRAT malware, targeting Russian-speaking users. The use of modular infection chains and HTML smuggling tactics underscores the evolving nature of cyber threats and emphasizes the need for robust cybersecurity measures.

Published: Tue Oct 22 15:49:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Threat Landscape of Unparalleled Proportions: The Ongoing Exploitation of Vulnerabilities in the Digital Realm


A Threat Landscape of Unparalleled Proportions: The Ongoing Exploitation of Vulnerabilities in the Digital Realm

The world is facing an unprecedented threat landscape, with malicious actors actively exploiting vulnerabilities in software and hardware. This article delves into the details of the recent exploits, providing a comprehensive overview of the threats that are currently plaguing the digital realm.

Published: Tue Oct 22 16:39:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet's 0-Day Vulnerability Exposes Hundreds of Thousands of Devices to Remote Code Execution



Fortinet's 0-day vulnerability exposes hundreds of thousands of devices to remote code execution, allowing attackers to bypass traditional security measures and gain unauthorized access to sensitive networks. The lack of transparency from Fortinet has raised concerns among security experts and customers, highlighting the need for companies to prioritize responsible disclosure practices when it comes to security vulnerabilities.

Published: Tue Oct 22 18:01:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Unveils Comprehensive Security Requirements to Safeguard Government and Personal Data

CISA has proposed new security requirements aimed at protecting sensitive government and personal data from falling into the wrong hands. The measures, which include multi-factor authentication and encryption, are designed to prevent unauthorized access and linkability to U.S. persons.

Published: Tue Oct 22 18:19:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SolarWinds Hack: A Cautionary Tale of Downplaying Cybersecurity Risks

The Securities and Exchange Commission has charged four tech companies for downplaying cybersecurity risks resulting from a devastating cyberattack on SolarWinds. The companies will pay significant fines as a result of their alleged failure to adequately disclose the impact of the breach.

Published: Tue Oct 22 18:43:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Lawmakers Seek Prosecution of Tax Preparation Firms for Leaking Customer Data to Big Tech Giants


US lawmakers are seeking prosecution against tax preparation firms accused of leaking sensitive taxpayer data to big tech giants like Google and Meta. The firms allegedly failed to properly disclose the use of this data, leading lawmakers to urge the Department of Justice to take action and hold them accountable for their alleged breach of taxpayer privacy.

Published: Tue Oct 22 19:21:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Millions of Mobile App Users at Risk from Hardcoded Credentials: A Growing Security Threat

Millions of Android and iOS users are at risk from hardcoded credentials in popular mobile apps, highlighting the growing security threat associated with lazy coding practices.

Published: Tue Oct 22 20:43:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SolarWinds Scandal: A Global Web of Deceit and Betrayal


The SolarWinds attack has sent shockwaves through the global community, exposing a web of deceit and betrayal that reaches far beyond the United States. The attacks on SolarWinds' Orion software were not isolated incidents, but rather a symptom of a larger problem - one that involves corrupt corporate practices, inadequate regulatory oversight, and a pervasive culture of silence among lawmakers.

Published: Wed Oct 23 04:45:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Lurking Threat of Deceptive Delight: Uncovering the Method to Jailbreak AI Models


A new method called "Deceptive Delight" has been discovered, allowing cyber attackers to jailbreak large language models (LLMs) by manipulating context within two conversational turns. This technique exploits the limited attention span of LLMs, achieving an average attack success rate (ASR) of 64.6% within three interaction turns. As researchers continue to develop countermeasures, it's essential to stay informed about emerging vulnerabilities and their implications for AI development and deployment.

Published: Wed Oct 23 05:58:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SaaS Security Paradox: Perceived vs. Actual Security Maturity


The SaaS security paradox suggests that many companies' perceived security maturity is often at odds with their actual state. Despite this, organizations fail to grasp the true extent of these risks and underestimate the complexity and risks inherent in SaaS environments. To address this issue, it's essential for businesses to adopt a comprehensive approach that includes continuous monitoring, shared responsibility models, and robust SSPM solutions.

Published: Wed Oct 23 06:06:04 2024 by llama3.2 3B Q4_K_M