Today's cybersecurity headlines are brought to you by ThreatPerspective


Biz & IT Ars Technica

Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

Unearthed sample likely works against Linux devices from Acer, HP, Fujitsu, and Lenovo. Researchers have discovered malicious code circulating in the wild that hijacks the earliest stage boot process of Linux d

Published: 2024-11-29T21:37:00



Biz & IT Ars Technica

Spies hack Wi-Fi networks in far-off land to launch attack on target next door

“Nearest Neighbor Attack” finally lets Russia’s Fancy Bear into target’s Wi-Fi network. One of 2024's coolest hacking tales occurred two years ago, but it wasn't revealed to the public until Friday at the Cyberw

Published: 2024-11-23T02:03:27



Biz & IT Ars Technica

5 charged in “Scattered Spider,” one of the most profitable phishing scams ever

Phishing attacks were so well-orchestrated that they fooled some of the best in the business. Federal prosecutors have charged five men with running an extensive phishing scheme that allegedly allowed them to co

Published: 2024-11-21T13:00:21



The Register - Software

Microsoft patches the patch that broke Exchange Server

If at first you don't succeed, you might be on the Microsoft Exchange team Microsoft has resumed the rollout of an Exchange Security update that was paused following reports of broken transport rules and disrupted email flow.

Published: 2024-11-28T18:30:10



The Verge - Securities

FTC changes its telemarketing rules to cover growing tech support scam calls

Illustration of a phone with yellow caution tape running over it. The Federal Trade Commission (FTC) has finalized amendments to its Telemarketing Sales Rule (TSR), making it easier to protect consumers who are tricked into paying scam tech support companies. The FTC could already go after these fraudster...

Published: 2024-11-27T17:59:08



The Verge - Securities

Microsoft is being investigated by the FTC over antitrust concerns

Illustration of Microsoft CEO Satya Nadella Microsoft is being investigated by the Federal Trade Commission in a wide-ranging antitrust probe, making it the fifth Big Tech company to fall under such scrutiny in several years. The agency is looking into Microsoft’s cloud and software ...

Published: 2024-11-27T17:29:27



The Verge - Securities

How to watch a baby

Parenthood is abrupt and total. When I went to the hospital, I understood that I’d be sent home with a vulnerable being who would require constant care, but it was impossible to prepare for what that actually felt like. I’d loved being in t...

Published: 2024-11-25T09:00:00



The Verge - Securities

A new ultra-secure phone carrier says it can make you harder to track

Photo collage of a phone with a deadbolt and key over the passcode number pad. A new cell phone carrier is launching with an interesting pitch: it says it will offer secure cell service that limits how much personal data users give up, as reported earlier by 404 Media. The service, called Cape, is geared toward “high-...

Published: 2024-11-21T12:09:45



The Verge - Securities

Microsoft announces its own Black Hat-like hacking event with big rewards for AI security

Illustration of a closed combination lock turning into pixels, implying a data breach or a lack of security. Microsoft is creating an in-person hacking event, Zero Day Quest, which it says will be the largest of its kind. The event will build upon Microsoft’s existing bug bounty program and incentivize research into high-impact security flaws that...

Published: 2024-11-19T08:30:00



The Verge - Securities

Microsoft's new Windows Resiliency Initiative aims to avoid another CrowdStrike incident

 Alongside the resiliency improvements, Windows 11 is also getting administrator protection soon. It’s a new feature that lets users have the security of a standard user but with the ability to make system changes and even install apps when ne...

Published: 2024-11-19T08:30:00



BleepingComputer

SpyLoan Android malware on Google play installed 8 million times

A new set of 15 SpyLoan Android malware apps with over 8 million installs was discovered on Google Play, targeting primarily users from South America, Southeast Asia, and Africa. [...]

Published: 2024-11-30T10:11:21



BleepingComputer

New Rockstar 2FA phishing service targets Microsoft 365 accounts

A new phishing-as-a-service (PhaaS) platform named 'Rockstar 2FA' has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. [...]

Published: 2024-11-29T14:01:50



BleepingComputer

Russia arrests cybercriminal Wazawaka for ties with ransomware gangs

Russian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin) for developing malware and his involvement in several hacking groups. [...]

Published: 2024-11-29T12:50:55



BleepingComputer

Bologna FC confirms data breach after RansomHub ransomware attack

Bologna Football Club 1909 has confirmed it suffered a ransomware attack after its stolen data was leaked online by the RansomHub extortion group. [...]

Published: 2024-11-29T12:19:47



BleepingComputer

New Windows Server 2012 zero-day gets free, unofficial patches

Free unofficial security patches have been released through the 0patch platform to address a zero-day vulnerability introduced over two years ago in the Windows Mark of the Web (MotW) security mechanism. [...]

Published: 2024-11-29T12:00:18



BleepingComputer

UK hospital network postpones procedures after cyberattack

Major UK healthcare provider Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, has suffered a cyberattack that caused a systems outage leading to postponing appointments and scheduled procedures. [...]

Published: 2024-11-28T05:08:58



BleepingComputer

Hackers abuse popular Godot game engine to infect thousands of PCs

Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months. [...]

Published: 2024-11-27T16:17:08



BleepingComputer

Hackers exploit ProjectSend flaw to backdoor exposed servers

Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote access to servers. [...]

Published: 2024-11-27T16:00:41



Threat Intelligence

Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence

One of Google Cloud's major missions is to arm security professionals with modern tools to help them defend against the latest threats. Part of that mission involves moving closer to a more autonomous, adaptive approach in threat intelligence automa

Published: 2024-11-19T14:00:00



Krebs on Security

Hacker in Snowflake Extortions May Be a U.S. Soldier

Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but a third suspect — a prolific hacker known as Kiberphant0m — remains at large and continu...

Published: 2024-11-27T00:45:48



Krebs on Security

Fintech Giant Finastra Investigating Data Breach

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top ...

Published: 2024-11-20T01:12:15



Gizmodo

Forget Samsung Watches, This Apple Watch Ultra Is Slashed to Its All-Time Low Price for Cyber Monday

Save over 15% on a #1 best-selling renewed Apple Watch Ultra fitness smartwatch for Black Friday at Amazon.... Applewatchultra

Published: 2024-12-01T17:00:21



Gizmodo

The Sonos Beam Soundbar Is Now at a Record Low For Cyber Monday, With Amazon Crushing Its Price

This Sonos Beam will be one of the best-selling soundbars this Cyber Monday.... Sonos Beam 2

Published: 2024-12-01T16:45:05



Gizmodo

Amazon Is Clearing Out AirTags This Cyber Monday, Now at a Record Low Price Until They Sell Out

AirTags are the perfect gift for the holiday season.... Airtags Apple

Published: 2024-12-01T16:30:02



Gizmodo

The Galaxy Z Fold6 Hits a New All-Time Low for Cyber Monday, Samsung Is Going All Out

It's our absolute favorite for Cyber Monday.... Samsung Galaxy Z Fold6

Published: 2024-12-01T15:04:52



Gizmodo

The Anker Solix Portable Power Station Is Down to Record Low, Amazon Goes All Out For Cyber Monday

Invest in one of the best portable power solutions on the market today.... Anker Solix C1000

Published: 2024-12-01T14:55:44



Gizmodo

For Cyber Monday, These Bose Headphones are Cheaper Than They Were on Black Friday (51% Off)

The Bose headphones cost less than half of their original price.... Bose Headphones White

Published: 2024-12-01T14:35:44



Gizmodo

Forget Black Friday: Amazon Just Revealed 12 Gems This Sunday For Cyber Monday

Black Friday has officially transitioned into Cyber Monday on Amazon. Here’s our selection of the best deals for today.... Black Friday Cyber Monday Amazon

Published: 2024-12-01T14:31:25



Gizmodo

After Black Friday, The Roborock Qrevo S Robot Vacuum And Mop Is Now At Its Lowest Price Ever For Cyber Monday

With a 43% discount, this Roborock is our top choice.... Roborock Qrevo S

Published: 2024-12-01T14:20:11



Gizmodo

Bose QuietComfort Headphones Dip Below $200 for the First Time Ever on Amazon for Black Friday and Cyber Monday

These high-end noise-cancelling Bluetooth headphones are now $300 less than AirPods Max for Black Friday and Cyber Monday.... Bose Quietcomfort 5.1 Headphones

Published: 2024-12-01T14:00:02



Gizmodo

The Galaxy Watch Ultra Is Even Cheaper This Sunday, Now $134 Instead Of $649 For Cyber Monday

Samsung has just reduced the price of its Galaxy Watch Ultra by an additional $50.... Galaxy Watch Ultra

Published: 2024-12-01T13:45:20



The Register - Security

RansomHub claims to net data hat-trick against Bologna FC

Crooks say they have stolen sensitive files on managers and players Italian professional football club Bologna FC is allegedly a recent victim of the RansomHub cybercrime gang, according to the group's dark web postings.

Published: 2024-11-30T09:31:11



The Register - Security

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.

Published: 2024-11-29T17:44:05



The Register - Security

Ransom gang claims attack on NHS Alder Hey Children's Hospital

Second alleged intrusion on English NHS org systems this week Yet another of the UK's National Health Service (NHS) systems appears to be under attack, with a ransomware gang threatening to leak stolen data it says is from one of England's top children's hospitals.

Published: 2024-11-29T12:24:46



The Register - Security

Fighting cybercrime with actionable knowledge

A reason to celebrate SANS and its 35 years of cyber security training Sponsored Post Cybercrime never sleeps. As threats continue to evolve and attack surfaces become broader and harder to defend, it has never been more important for the good guys to keep their skills sharp and their knowledge up to date.

Published: 2024-11-29T09:19:11



The Register - Security

NHS major 'cyber incident' forces hospitals to use pen and paper

Systems are isolated and pulled offline, while scheduled procedures are canceled The ongoing cyber security incident affecting a North West England NHS group has forced sites to fall back on pen-and-paper operations.

Published: 2024-11-28T12:31:10



The Register - Security

The only thing worse than being fired is scammers fooling you into thinking you're fired

Scumbags play on victims' worst fears in phishing campaign referencing UK Employment Tribunal A current phishing campaign scares recipients into believing they've been sacked, when in reality they've been hacked and infected with infostealers and other malware that means a payday for the crooks behind the scam.

Published: 2024-11-28T07:31:07



The Register - Security

Salt Typhoon's surge extends far beyond US telcos

Plus, a brand-new backdoor, GhostSpider, is linked to the cyber spy crew's operations The reach of the China-linked Salt Typhoon gang extends beyond telecommunications giants in the United States, and its arsenal includes several backdoors including a brand-new malware dubbed GhostSpider according to Trend Micro researchers.

Published: 2024-11-27T23:44:14



The Register - Security

T-Mobile US takes a victory lap after stopping cyberattacks: 'Other providers may be seeing different outcomes'

Funny what putting more effort and resources into IT security can do Attackers - possibly China's Salt Typhoon cyber-espionage crew - compromised an unnamed wireline provider's network and used this access to try to break into T-Mobile US systems multiple times over the past few weeks, according to its Chief Security Officer Jeff Simon.

Published: 2024-11-27T20:59:13



The Register - Security

Bolster resilience against 2025 cyber threats

Watch this webinar to learn why cybersecurity leaders can trust the MITRE ATT&CK Evaluations Partner Content In today's dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations.

Published: 2024-11-27T18:40:07



The Register - Security

Data broker leaves 600K+ sensitive files exposed online

Researcher spotted open database before criminals we hope Exclusive More than 600,000 sensitive files containing thousands of people's criminal histories, background checks, vehicle and property records were exposed to the internet in a non-password protected database belonging to data brokerage SL Data Services, according to a security researcher.

Published: 2024-11-27T18:00:08



The Register - Security

First-ever UEFI bootkit for Linux in the works, experts say

Bootkitty doesn't bite yet Security researchers say they've stumbled upon the first-ever UEFI bootkit targeting Linux, illustrating a key moment in the evolution of such tools.

Published: 2024-11-27T15:32:12



The Register - Security

Automating endpoint management

Addressing the challenges of patching and vulnerability remediation Webinar Managing endpoints efficiently has perhaps never been more important or more complex.

Published: 2024-11-27T14:53:11



The Register - Security

The workplace has become a surveillance state

Cracked Labs report explores the use of motion sensors and wireless networking kit to monitor offices Office buildings have become like web browsers they're full of tracking technology, a trend documented in a report out this week by Cracked Labs.

Published: 2024-11-27T08:31:08



The Register - Security

CrowdStrike still doesn't know how much its Falcon flame-out will cost

Thinks customers may have forgiven it after revenue hits a record CrowdStrike can't yet confidently predict the financial impact of the failed update to its Falcon software that crashed millions of computers around the world last July, but is confident its third quarter results show customers can't find a better security product.

Published: 2024-11-27T07:27:13



The Register - Security

Telco engineer who spied on US employer for Beijing gets four years in the clink

Provides insight to how China gets inside US systems, perhaps at Verizon and Infosys A 59 year-old Florida telco engineer was sentenced to 48 months in prison after he served as a spy for China and provided Beijing with details like his employer's cybersecurity, according to the US Department of Justice.

Published: 2024-11-27T05:30:13



The Register - Security

Man accused of hilariously bad opsec as alleged cybercrime spree detailed

Complaint claims he trespassed, gave himself discounts, and sorted CCTV access A Kansas City man who stands accused of having a disregard for basic opsec made his first court appearance on Friday over a series of alleged cybercrimes.

Published: 2024-11-26T20:33:06



The Register - Security

US senators propose law to require bare minimum security standards

In case anyone forgot about Change Healthcare American hospitals and healthcare organizations would be required to adopt multi-factor authentication (MFA) and other minimum cybersecurity standards under new legislation proposed by a bipartisan group of US senators.

Published: 2024-11-26T16:00:15



The Register - Security

Fortify your data

How cyber resilient storage hardware can defeat ransomware Sponsored Feature Ransomware is everywhere. The FBI and CISA just issued yet another advisory about it.

Published: 2024-11-26T14:52:06



The Register - Security

Bing Wallpaper app, now in Windows Store, accused of cookie shenanigans

Microsoft free tool snooping on users? Surely not! If you've been tempted to download the Bing Wallpaper app to spice up your Windows 11 desktop backgrounds, you may want to think twice.

Published: 2024-11-26T14:30:15



The Register - Security

Another 'major cyber incident' at a UK hospital, outpatients asked to stay away

Third time this year an NHS unit's IT systems have come under attack A UK hospital is declaring a "major incident," cancelling all outpatient appointments due to "cybersecurity reasons."

Published: 2024-11-26T11:36:39



The Register - Security

QNAP and Veritas dump 30-plus vulns over the weekend

Just what you want to find when you start a new week Updated Taiwanese NAS maker QNAP addressed 24 vulnerabilities across various products over the weekend.

Published: 2024-11-26T10:29:12



The Register - Security

Britain Putin up stronger AI defences to counter growing cyber threats

'Be in no doubt: the UK and others in this room are watching Russia' The government of the United Kingdom on Monday announced the formation of a Laboratory for AI Security Research (LASR) to make the nation more resilient to AI-powered cyber threats from Russia.

Published: 2024-11-26T06:29:13



The Register - Security

Supply chain management vendor Blue Yonder succumbs to ransomware

And it looks like major UK retailers that rely on it are feeling the pinch US-based supply chain SaaS vendor Blue Yonder has revealed a service disruption caused by ransomware, and its customers are reportedly struggling to get goods onto shelves as a result.

Published: 2024-11-26T01:27:10



The Register - Security

Security? We've heard of it: How Microsoft plans to better defend Windows

Did we say CrowdStrike? We meant, er, The July Incident... Ignite The sound of cyber security professionals spraying their screens with coffee could be heard this week as Microsoft claimed, "security is our top priority," as it talked up its Secure Future Initiative (SFI) once again and explained how Windows could be secured.

Published: 2024-11-25T19:15:11



The Register - Security

China has utterly pwned 'thousands and thousands' of devices at US telcos

Senate Intelligence Committee chair says his 'hair is on fire' as execs front the White House The Biden administration on Friday hosted telco execs to chat about China's recent attacks on the sector, amid revelations that US networks may need mass rebuilds to recover.

Published: 2024-11-25T13:15:05



The Register - Security

Google blocked 1,000-plus pro-China fake news websites from its search results

Beijing's propaganda buddies aren't just using social media Google's Threat Intelligence Group has blocked a network China-related firms from its search results for operating fake news services and websites.

Published: 2024-11-25T06:29:12



The Register - Security

Imagine a land in which Big Tech can't send you down online rabbit holes or use algorithms to overcharge you

China is trying to become that land, with a government crackdown on the things that make the internet no fun Internet echo chambers and nasty e-commerce tricks that analyze your behavior to milk you for more cash are set to be banned in China.

Published: 2024-11-25T05:29:08



The Register - Security

Russian spies may have moved in next door to target your network

Plus: Microsoft seizes phishing domains; Helldown finds new targets; Illegal streaming with Jupyter, and more Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve as a launching point for Russian cyber spies to compromise your network.

Published: 2024-11-25T01:30:15



The Register - Security

Volunteer DEF CON hackers dive into America's leaky water infrastructure

Six sites targeted for security clean-up, just 49,994 to go A plan for hackers to help secure America's critical infrastructure has kicked off with six US water companies signing up to let coders kick the tires of their computer systems and fix any vulnerabilities.

Published: 2024-11-24T15:27:12



The Register - Security

Trump taps border hawk to head DHS. Will Noem's 'enthusiasm' extend to digital domain?

Meanwhile, CISA chief Jen Easterly will step down prior to inauguration Analysis President-elect Donald Trump has announced several unorthodox nominations for his cabinet over the last two weeks, including South Dakota Governor Kristi Noem, whom he tapped to serve as Homeland Security Secretary.

Published: 2024-11-23T17:39:15



The Register - Security

Andrew Tate's site ransacked, subscriber data stolen

He'll just have to take this one on the chin The website of self-proclaimed misogynist and alleged sex trafficker and rapist Andrew Tate has been compromised and data on its paying subscribers stolen.

Published: 2024-11-22T22:38:07



The Register - Security

1,000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more Updated Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to remotely control the equipment as well as cryptocurrency miners and other malware.

Published: 2024-11-22T21:27:09



The Register - Security

How to master endpoint security

Get some advice from this discussion with a Kaseya expert Webinar Want to access the key takeaways from the recent "Secure Everything for Every Endpoint" webinar?

Published: 2024-11-22T11:14:34



The Register - Security

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking

Fledgling band of crooks says it stole 1.2 TB of data The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before leaking data.

Published: 2024-11-22T08:34:12



The Register - Security

Helpline for Yakuza victims fears it leaked their personal info

Organized crime types tend not to be kind to those who go against them, so this is nasty A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led to a leak of personal information describing 2,500 people who reached out to it for consultation.

Published: 2024-11-22T05:24:07



The Register - Security

Here's what happens if you don't layer network security or remove unused web shells

TL;DR: Attackers will break in and pwn you, as a US government red team demonstrated The US Cybersecurity and Infrastructure Agency often breaks into critical organizations' networks with their permission, of course to simulate real-world cyber attacks and thereby help improve their security. In one of those recent exercises conducted at a critical infrastructure provider, the Agency exploited a web shell left behind from an earlier bug bounty program, scooped up a bunch of credentials and security keys, moved through the network and ultimately pwned the org's domain and several sensitive business system targets.

Published: 2024-11-22T01:13:08



The Register - Security

DARPA-backed voting system for soldiers abroad savaged

VotingWorks, developer of the system, disputes critics' claims An electronic voting project backed by DARPA Uncle Sam's boffinry nerve center to improve the process of absentee voting for American military personnel stationed abroad has been slammed by security researchers.

Published: 2024-11-21T19:27:10



The Register - Security

Chinese ship casts shadow over Baltic subsea cable snipfest

Danish military confirms it is monitoring as Swedish police investigate. Cloudflare says impact was 'minimal' The Danish military has confirmed it is tracking a Chinese ship that is under investigation after two optical fiber internet cables under the Baltic Sea were damaged.

Published: 2024-11-21T17:20:09



The Register - Security

'Alarming' security bugs lay low in Linux's needrestart utility for 10 years

Update now: Qualys says flaws give root to local users, 'easily exploitable', default in Ubuntu Server Researchers at Qualys refuse to release exploit code for five bugs in the Linux world's needrestart utility that allow unprivileged local attackers to gain root access without any user interaction.

Published: 2024-11-21T15:03:05



The Register - Security

Now Online Safety Act is law, UK has 'priorities' but still won't explain 'spy clause'

Draft doc struggles to describe how theoretically encryption-busting powers might be used The UK government has set out plans detailing how it will use the new law it has created to control online platforms and social media with one telling exception.

Published: 2024-11-21T10:38:11



The Register - Security

Put your usernames and passwords in your will, advises Japan's government

Digital end of life planning saves your loved ones from a little extra anguish Japan's National Consumer Affairs Center on Wednesday suggested citizens start "digital end of life planning" and offered tips on how to do it.

Published: 2024-11-21T06:14:08



The Register - Security

Five Scattered Spider suspects indicted for phishing spree and crypto heists

DoJ also shutters allleged crimeware and credit card mart PopeyeTools The US Department of Justice has issued an indictment that names five people accused of stealing millions in cryptocurrency and we are told they are suspected members of cyber-gang Scattered Spider.

Published: 2024-11-21T01:29:13



The Register - Security

Chinese cyberspies, Musk's Beijing ties, labelled real risk to US security by senator

Meet Liminal Panda, which prowls telecom networks in South Asia and Africa A senior US senator has warned that American tech companies activities in China represent a national security risk, in a hearing that saw infosec biz CrowdStrike testify it has identified another cyber-espionage crew it believes is backed by Beijing.

Published: 2024-11-20T23:50:14



The Register - Security

Mega US healthcare payments network restores system 9 months after ransomware attack

Change Healthcare's $2 billion recovery is still a work in progress Still reeling from its February ransomware attack, Change Healthcare confirms its clearinghouse services are back up and running, almost exactly nine months since the digital disruption began.

Published: 2024-11-20T18:01:08



The Register - Security

Google's AI bug hunters sniff out two dozen-plus code gremlins that humans missed

OSS-Fuzz is making a strong argument for LLMs in security research Google's OSS-Fuzz project, which uses large language models (LLMs) to help find bugs in code repositories, has now helped identify 26 vulnerabilities, including a critical flaw in the widely used OpenSSL library.

Published: 2024-11-20T17:01:27



The Register - Security

D-Link tells users to trash old VPN routers over bug too dangerous to identify

Vendor offers 20% discount on new model, but not patches Owners of older models of D-Link VPN routers are being told to retire and replace their devices following the disclosure of a serious remote code execution (RCE) vulnerability.

Published: 2024-11-20T14:32:06



The Register - Security

Data is the new uranium incredibly powerful and amazingly dangerous

CISOs are quietly wishing they had less data, because the cost of management sometimes exceeds its value Column I recently got to play a 'fly on the wall' at a roundtable of chief information security officers. Beyond the expected griping and moaning about funding shortfalls and always-too-gullible users, I began to hear a new note: data has become a problem.

Published: 2024-11-20T07:15:09



The Register - Security

Healthcare org Equinox notifies 21K patients and staff of data theft

Ransomware scum LockBit claims it did the dirty deed Equinox, a New York State health and human services organization, has begun notifying over 21 thousand clients and staff that cyber criminals stole their health, financial, and personal information in a "data security incident" nearly seven months ago.

Published: 2024-11-20T00:30:07



The Register - Security

China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

No word on when or if the issue will be fixed Chinese government-linked snoops are exploiting a zero-day bug in Fortinet's Windows VPN client to steal credentials and other information, according to memory forensics outfit Volexity.

Published: 2024-11-19T23:02:13



The Register - Security

Russian suspected Phobos ransomware admin extradited to US over $16M extortion

This malware is FREE for EVERY crook ($300 decryption keys sold separately) A Russian citizen has been extradited from South Korea to the United States to face charges related to his alleged role in the Phobos ransomware operation.

Published: 2024-11-19T21:55:07



Security Latest

The US Army's Vision of Soldiers in Exoskeletons Lives On

Following decades of failed attempts and dashed dreams, the US Army is once again trying out powered exoskeletons to help soldiers haul munitions and equipment in the field.

Published: 2024-11-29T10:30:00



Security Latest

Emergency Vehicle Lights Can Screw Up a Car's Automated Driving System

Newly published research finds that the flashing lights on police cruisers and ambulances can cause “digital epileptic seizures” in image-based automated driving systems, potentially risking wrecks.

Published: 2024-11-26T12:00:00



Security Latest

Russia’s Ballistic Missile Attack on Ukraine Is an Alarming First

This is the first time Russia has used its so-called Oreshnik intermediate-range ballistic missile in combat. The launch also serves as a warning to the West.

Published: 2024-11-23T17:00:00



Security Latest

Andrew Tate’s ‘Educational Platform’ Was Hacked

Plus: The worst telecom hack in US history rolls on, iPhones are harder to break into, and more of the week’s top security news.

Published: 2024-11-23T11:30:00



Security Latest

The US Is Calling Out Foreign Influence Campaigns Faster Than Ever

The 2024 elections were a high-water mark for naming and shaming threat actors from foreign governments. There’s still work to be done, though, on how to attribute disinformation campaigns most effectively.

Published: 2024-11-22T20:36:33



Security Latest

Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Published: 2024-11-22T13:00:00



Security Latest

Meta Finally Breaks Its Silence on Pig Butchering

The company gave details for the first time on its approach to combating organized criminal networks behind the devastating scams.

Published: 2024-11-21T18:00:00



Security Latest

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online no questions asked.

Published: 2024-11-21T11:30:00



Security Latest

Inside the Booming ‘AI Pimping’ Industry

AI-generated influencers based on stolen images of real-life adult content creators are flooding social media.

Published: 2024-11-20T11:00:00



Security Latest

Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany

More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germany and the Pentagon is powerless to stop it.

Published: 2024-11-20T04:00:00



Security Latest

Immigration Police Can Already Sidestep US Sanctuary City Laws Using Data-Sharing Fusion Centers

Built to combat terrorism, fusion centers give US Immigration and Customs Enforcement a way to gain access to data that’s meant to be protected under city laws limiting local police cooperation with ICE.

Published: 2024-11-19T10:00:00



Security Latest

Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist

Plus: An “AI granny” is wasting scammers’ time, a lawsuit goes after spyware-maker NSO Group’s executives, and North Korea linked hackers take a crack at macOS malware.

Published: 2024-11-16T11:30:00



The Hacker News

Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested

A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law enforcement authorities in the country. According to a news report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of developing a malicious program designed to encrypt files and seek ransom in return for a decryption key. "At present,

Published: 2024-11-30T12:44:00



The Hacker News

AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections

A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence operation designed to turn public opinion against Ukraine and erode Western support since at least December 2023. The covert campaign undertaken by Social Design Agency (SDA) leverages videos enhanced using artificial intelligence (AI) and bogus websites impersonating reputable news sources

Published: 2024-11-29T18:47:00



The Hacker News

Protecting Tomorrow's World: Shaping the Cyber-Physical Future

The lines between digital and physical realms increasingly blur. While this opens countless opportunities for businesses, it also brings numerous challenges. In our recent webinar, Shaping the Cyber-Physical Future: Trends, Challenges, and Opportunities for 2025, we explored the different factors shaping the cyber-physical future. In an insightful conversation with industry experts, we discussed

Published: 2024-11-29T16:30:00



The Hacker News

Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks

Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to steal Microsoft 365 account credentials. "This campaign employs an AitM [adversary-in-the-middle] attack, allowing attackers to intercept user credentials and session cookies, which means that even users with multi-factor authentication (MFA)

Published: 2024-11-29T15:36:00



The Hacker News

Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks

Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including one that it said has been exploited in the wild. The vulnerability that has been tagged with an "Exploitation Detected" assessment is CVE-2024-49035 (CVSS score: 8.7), a privilege escalation flaw in partner.microsoft[.]com. "An

Published: 2024-11-29T15:04:00



The Hacker News

U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency

A 59-year-old U.S. citizen who immigrated from the People's Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the country and sharing sensitive information about his employer with China's principal civilian intelligence agency. Ping Li, 59, of Wesley Chapel, Florida, is said to have served as a cooperative contact for the Ministry of State

Published: 2024-11-29T11:01:00



The Hacker News

Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points Patch ASAP

Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges. "These vulnerabilities pose significant risks, allowing unauthenticated remote code execution with root privileges, thereby fully compromising the confidentiality,

Published: 2024-11-28T22:27:00



The Hacker News

The Future of Serverless Security in 2025: From Logs to Runtime Protection

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration. But here is

Published: 2024-11-28T17:00:00



The Hacker News

XML-RPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems. The package, named @0xengine/xmlrpc, was originally published on October 2, 2023 as a JavaScript-based XML-RPC

Published: 2024-11-28T16:18:00



The Hacker News

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. "Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware," Check Point said in a new analysis published Wednesday. "The technique

Published: 2024-11-28T14:59:00



The Hacker News

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These intrusion attempts "originated from a wireline provider's network that was connected to ours," Jeff Simon, chief security officer at T-Mobile, said in a statement. "We see no instances of prior attempts like

Published: 2024-11-28T10:07:00



The Hacker News

Researchers Discover "Bootkitty" First UEFI Bootkit Targeting Linux Kernels

Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed for Linux systems. Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use in real-world attacks. Also tracked as IranuKit, it was uploaded

Published: 2024-11-27T21:35:00



The Hacker News

Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers

A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the wild, according to findings from VulnCheck. The vulnerability, originally patched over a year-and-a-half ago as part of a commit pushed in May 2023 , was not officially made available until August 2024 with the release of version r1720. As of November 26, 2024,

Published: 2024-11-27T21:35:00



The Hacker News

Latest Multi-Stage Attack Scenarios with Real-World Examples

Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first step to building a solid defense strategy against them. Let's examine real-world examples of some of the most common multi-stage attack scenarios that are active right now. URLs and Other Embedded

Published: 2024-11-27T17:00:00



The Hacker News

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor. That's according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around August 2024. "In this attack,

Published: 2024-11-27T16:44:00



The Hacker News

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 malicious infrastructures and networks as part of a coordinated effort to disrupt cybercrime in the continent. Dubbed Serengeti, the law enforcement exercise took place between September 2 and October 31, 2024, and targeted criminals behind ransomware, business email

Published: 2024-11-27T12:50:00



The Hacker News

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet. "This operation serves as a comprehensive one-stop shop for scanning, exploiting vulnerabilities, deploying malware, and setting up shop kits, showcasing a

Published: 2024-11-27T10:51:00



The Hacker News

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0. They were addressed in versions

Published: 2024-11-26T18:53:00



The Hacker News

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

When CVEs go viral, separating critical vulnerabilities from the noise is essential to protecting your organization. That’s why Intruder, a leader in attack surface management, built Intel - a free vulnerability intelligence platform designed to help you act fast and prioritize real threats. What is Intel? Intel was created to fill a gap in the resources available for tracking emerging

Published: 2024-11-26T17:00:00



The Hacker News

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in Microsoft Windows, as part of attacks designed to deliver the eponymous backdoor on victim systems. "In a successful attack, if a victim browses a web page containing the exploit, an adversary can run arbitrary code without any user

Published: 2024-11-26T16:04:00



The Hacker News

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies.  Trend Micro, which described the hacking group as an aggressive advanced persistent threat (APT), said the intrusions also involved the use of another cross-platform backdoor dubbed

Published: 2024-11-26T15:49:00



The Hacker News

CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, tracked as CVE-2023-28461 (CVSS score: 9.8), concerns a case of missing authentication that

Published: 2024-11-26T10:33:00



The Hacker News

Google's New Restore Credentials Tool Simplifies App Login After Android Migration

Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android's Credential Manager API, the feature aims to reduce the hassle of re-entering the login credentials for every app during the handset replacement. "With Restore Credentials, apps can seamlessly onboard

Published: 2024-11-25T19:52:00



The Hacker News

PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot

The administrators of the Python Package Index (PyPI) repository have quarantined the package "aiocpa" following a new update that included malicious code to exfiltrate private keys via Telegram. The package in question is described as a synchronous and asynchronous Crypto Pay API client. The package, originally released in September 2024, has been downloaded 12,100 times to date. By putting the

Published: 2024-11-25T19:24:00



The Hacker News

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)

We hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on behind those words? This week’s cybersecurity news isn’t just about hackers and headlines it’s about how digital risks shape our lives in ways we might not even realize. For instance, telecom networks being breached isn’t just about stolen data it’s about power. Hackers are

Published: 2024-11-25T17:00:00



The Hacker News

Flying Under the Radar - Security Evasion Techniques

Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to bypass security measures. The Evolution of Phishing Attacks “I really like the saying that ‘This is out of scope’ said no hacker ever. Whether it’s tricks, techniques or technologies, hackers will do anything to evade detection and make sure their

Published: 2024-11-25T17:00:00



The Hacker News

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Styra's Open Policy Agent (OPA) that leverage dedicated, domain-specific languages (DSLs) to breach cloud platforms and exfiltrate data. "Since these are hardened languages with limited capabilities, they're supposed to be more

Published: 2024-11-25T16:54:00



The Hacker News

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections

Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver (BYOVD) to disarm security protections and ultimately gain access to the infected system. "This malware takes a more sinister route: it drops a legitimate Avast Anti-Rootkit driver (aswArPot.sys) and manipulates it to carry out its destructive agenda," Trellix

Published: 2024-11-25T14:46:00



The Hacker News

Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites

Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, telecommunications, and financial and legal services across the world, Microsoft said.

Published: 2024-11-23T17:40:00



The Hacker News

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn

The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a six-month period. These findings come from Microsoft, which said that multiple threat activity clusters with ties to the country have been observed creating fake profiles on LinkedIn, posing as both

Published: 2024-11-23T17:23:00



The Hacker News

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asyncshell. The attack campaign is said to have used Hajj-themed lures to trick victims into executing a malicious payload under the guise of a Microsoft Compiled HTML Help (CHM) file, the Knownsec 404 team said in an analysis published today. Mysterious Elephant, which is also known as

Published: 2024-11-22T22:29:00



The Hacker News

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future's Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0063, which, in turn, overlaps with APT28. The

Published: 2024-11-22T22:29:00



The Hacker News

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for follow-on information collection. "The attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a

Published: 2024-11-22T22:17:00



The Hacker News

Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?

Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This single-platform approach makes it easy for teams to connect and work efficiently, no matter where they are, enabling seamless digital transformation that’s both scalable and adaptable. As companies shift from traditional,

Published: 2024-11-22T17:00:00



The Hacker News

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams, fraud, and phishing attacks. To that end, Microsoft's Digital Crimes Unit (DCU) said it seized 240 fraudulent websites associated with an Egypt-based cybercrime facilitator named Abanoub Nady (aka MRxC0DER and mrxc0derii), who

Published: 2024-11-22T15:07:00



The Hacker News

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer. The packages, named gptplus and claudeai-eng, were uploaded by a user named "Xeroline" in November 2023, attracting

Published: 2024-11-22T11:45:00



The Hacker News

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India (461), followed by Thailand (80), Mexico (48), Indonesia

Published: 2024-11-21T21:52:00



The Hacker News

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor

The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That's according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023.

Published: 2024-11-21T21:20:00



The Hacker News

10 Most Impactful PAM Use Cases for Enhancing Organizational Security

Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on your IT team.  As an established provider of a PAM solution, we’ve witnessed firsthand how PAM transforms organizational security. In

Published: 2024-11-21T17:53:00



The Hacker News

North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs

Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme. "Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers' true origins and

Published: 2024-11-21T17:34:00



The Hacker News

Cyber Story Time: The Boy Who Cried "Secure!"

As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question. In this article, we’ll cover some common use cases and misconceptions of how people misuse

Published: 2024-11-21T17:00:00



The Hacker News

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online

New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third of the total exposures. The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.2% in South America,

Published: 2024-11-21T16:30:00



The Hacker News

5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars. All of the accused parties have been

Published: 2024-11-21T14:46:00



The Hacker News

Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects

Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library. "These particular vulnerabilities represent a milestone for automated vulnerability finding: each was found with AI, using AI-generated and enhanced fuzz targets,"

Published: 2024-11-21T12:43:00



The Hacker News

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads Manager accounts and harvest credit card data stored in web browsers. "They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement," Netskope Threat Labs researcher

Published: 2024-11-21T12:04:00



The Hacker News

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. "Criminals can now misuse Google Pay and Apple

Published: 2024-11-20T18:39:00



The Hacker News

NHIs Are the Future of Cybersecurity: Meet NHIDR

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take

Published: 2024-11-20T17:00:00



The Hacker News

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction. The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, necessitating that

Published: 2024-11-20T14:46:00



The Hacker News

Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity

Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability, as well as ensure that system integrity is not compromised. The idea, the tech giant said, is to avoid incidents like that of CrowdStrike's earlier this July, enable more apps and users to be run without admin privileges, add controls surrounding the use of unsafe apps and drivers, and offer

Published: 2024-11-20T12:30:00



The Hacker News

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection. Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications

Published: 2024-11-20T12:28:00



Security Affairs

Security Affairs newsletter Round 500 by Pierluigi Paganini INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. 15 SpyLoan Android apps found on Google Play had over 8 million installs Notorious ransomware programmer Mikhail Pavlovich […]

Published: 2024-12-01T12:37:14



Security Affairs

Hackers stole millions of dollars from Uganda Central Bank

Financially-motivated threat actors hacked Uganda ‘s central bank system, government officials confirmed this week. Ugandan officials confirmed on Thursday that the national central bank suffered a security breach by financially-motivated threat actors. The police’s Criminal Investigations Department and the Auditor General are investigating the incident. A senior government official at the finance ministry confirmed that […]

Published: 2024-12-01T00:49:07



Security Affairs

15 SpyLoan Android apps found on Google Play had over 8 million installs

McAfee researchers discovered 15 SpyLoan Android apps on Google Play with a combined total of over 8 million installs. 15 SpyLoan apps with a combined total of 8M+ installs were found on Google Play, targeting users in South America, Southeast Asia, and Africa. SpyLoan apps exploit social engineering to gain sensitive user data and excessive […]

Published: 2024-11-30T19:06:46



Security Affairs

Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia

Russian authorities arrested ransomware affiliate Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups. Russian authorities arrested a ransomware affiliate, Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin), and charged him for developing malware and his role in several hacking groups. The man was arrested in Kaliningrad, Russia, law […]

Published: 2024-11-30T07:29:57



Security Affairs

Phishing-as-a-Service Rockstar 2FA continues to be prevalent

Phishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass multi-factor authentication. Trustwave researchers are monitoring malicious activity associated with Phishing-as-a-Service (PaaS) platforms, their latest report focuses on a toolkit called Rockstar 2FA. Rockstar 2FA targets Microsoft 365 accounts and bypasses multi-factor authentication with adversary-in-the-middle (AitM) attacks. In AiTM phishing, threat […]

Published: 2024-11-29T15:36:24



Security Affairs

Zello urges users to reset passwords following a cyber attack

Zello urges customers with accounts created before November 2 to reset passwords following a potential security breach. Zello is warning customers who have an account created before November 2 to reset their passwords, a circumstance that suggests that the incident took place on November 2. Zello is a tech software company in Austin, Texas, U.S., known for the […]

Published: 2024-11-29T00:23:57



Security Affairs

A cyberattack impacted operations at UK Wirral University Teaching Hospital

UK’s Wirral University Teaching Hospital suffered a cyberattack that caused delays in appointments and procedures. Wirral University Teaching Hospital NHS Foundation Trust (WUTH) is an NHS Foundation Trust. It provides healthcare for people of the Wirral Peninsula and the surrounding areas of North West England and North Wales. The trust is responsible for Arrowe Park […]

Published: 2024-11-28T15:53:50



Security Affairs

T-Mobile detected network intrusion attempts and blocked them

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. The carrier is investigating reports that are linking it to “Salt Typhoon” cyberattacks tied […]

Published: 2024-11-28T14:20:07



Security Affairs

ProjectSend critical flaw actively exploited in the wild, experts warn

Researchers warn that a critical security flaw in ProjectSend open-source file-sharing application may be under active exploitation. VulnCheck researchers warn that ProjectSend vulnerability CVE-2024-11680 (CVSS score: 9.8) appears to have been exploited by attackers in the wild. The vulnerability is an improper authentication issue that impacts ProjectSend versions before r1720. Remote, unauthenticated attackers can exploit this flaw […]

Published: 2024-11-28T07:28:00



Security Affairs

Bootkitty is the first UEFI Bootkit designed for Linux systems

ESET discovered the first Unified Extensible Firmware Interface (UEFI) bootkit specifically designed for Linux systems, named Bootkitty. Cybersecurity researchers from ESET discovered the first UEFI bootkit designed to target Linux systems, called by its authors Bootkitty. The bootkit allows attackers to disable the kernel’s signature verification feature and to preload two as yet unknown ELF […]

Published: 2024-11-27T21:01:19



News Packet Storm

US Senators Propose Law To Require Bare Minimum Security Standards

Telco Engineer Who Spied On Employer For Beijing Gets 4 Years

New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases

Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets

Feds Seek To Grill Kansas City Man With Hacking Charges

ProjectSend Vulnerability Exploited In The Wild

Source Code Of macOS Banshee Stealer Leaked

CyberVolk Analysis Explores Ransomware, Hacktivism Connections

The Workplace Has Become A Surveillance State

Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack

Cyberattacks Cost British Businesses $55 Billion In Past 5 Years

How The ZX Spectrum Became A 1980s Icon

China Has Pwned Thousands And Thousands Of Telco Devices

Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells

Helpline For Yakuza Victims Fears It Leaked Their Personal Info

US Takes Down Stolen Credit Card Marketplace PopeyeTools

Microsoft Disrupts ONNX Phishing Service, Names Its Operator

Google's AI Powered Fuzzing Tool Discovers 26 New Vulns

Russian Women Stepping Up For Cybercrime Outfits

Five Scattered Spider Suspects Indicted For Phishing And Heists

Put Your Username And Passwords In Your Will, Advises Japan's Government

Ubuntu Affected By 10-Year-Old Flaws In needrestart Package

FBI And CISA Warn Of Continued Cyberattacks On US Telecoms

MITRE Updates List Of 25 Most Dangerous Software Vulnerabilities

North Korean Hackers Behind 2019 $42 Million Ethereum Heist

SecurityWeek

In Other News: OPPC Breach Impacts 1.7M, US Soldier Suspected in Snowflake Hack, Cloudflare Loses LogsIndustry Moves for the week of November 25, 2024 - SecurityWeek

T-Mobile Shares More Information on China-Linked Cyberattack

Microsoft Patches Exploited Vulnerability in Partner Network Website

ESET Flags Prototype UEFI Bootkit Targeting Linux

Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked

ProjectSend Vulnerability Exploited in the Wild

Bipartisan Legislation Seeks Stronger Healthcare Cybersecurity

New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products

Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets

Interpol Clamps Down on Cybercrime and Arrests Over 1,000 Suspects in Africa

CISA News

CISA Releases Venue Guide for Security Considerations

CISA Launches New Learning Platform to Enhance Training and Education U.S. Veterans and Other Stakeholders

Joint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructure

CISA Kicks Off Critical Infrastructure Security and Resilience Month 2024

Statement from CISA Director Easterly on the Security of the 2024 Elections

Joint ODNI, FBI, and CISA Statement

Joint Statement from CISA and EAC in Support of State and Local Election Officials

Joint ODNI, FBI, and CISA Statement on Russian Election Influence Efforts

CISA Releases Its First Ever International Strategic Plan

CISA Launches #PROTECT2024 Election Threat Updates Webpage

CISA Blog

Shop Safely Online This Holiday Season with Tips from Secure Our World

AI Red Teaming: Applying Software TEVV for AI Evaluations

New Resilient Power Guidance Added to the CISA Resilient Toolkit Portal

USDA Stops Credential Phishing with FIDO Authentication

CISA’s Vulnerability Management goes “Big” on Interns and the Results are Staggering!

CISA’s ScubaGear Tool Improves Security for Organizations Using M365 and Surpasses 30,000 Downloads

Engaging with Security Researchers: Embracing a “See Something, Say Something” Culture

A Message to Election Officials from CISA Director Jen Easterly

Region 8 Invites You to Secure Our World

CISA Director Jen Easterly Remarks at the Election Center 39th Annual National Conference in Detroit

All CISA Advisories

Hitachi Energy MicroSCADA Pro/X SYS600

Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 Safety PLCs

Schneider Electric PowerLogic PM55xx and PowerLogic PM8ECC

Schneider Electric PowerLogic P5

Hitachi Energy RTU500 Scripting Interface

CISA Releases Six Industrial Control Systems Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

OSCAT Basic Library

Schneider Electric Modicon M340, MC80, and Momentum Unity M1E

CISA Releases Seven Industrial Control Systems Advisories

Schneider Electric PowerLogic PM5300 Series

Automated Logic WebCTRL Premium Server

CISA Adds Three Known Exploited Vulnerabilities to Catalog

mySCADA myPRO Manager

CISA Releases Insights from Red Team Assessment of a U.S. Critical Infrastructure Sector Organization

Schneider Electric EcoStruxure IT Gateway

Schneider Electric Modicon M340, MC80, and Momentum Unity M1E

Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization

2024 CWE Top 25 Most Dangerous Software Weaknesses

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA and Partners Release Update to BianLian Ransomware Cybersecurity Advisory

USDA Releases Success Story Detailing the Implementation of Phishing-Resistant Multi-Factor Authentication

Apple Releases Security Updates for Multiple Products

Mitsubishi Electric MELSEC iQ-F Series

CISA Releases One Industrial Control Systems Advisory

CISA Adds Three Known Exploited Vulnerabilities to Catalog

Siemens SIPORT

Siemens SINEC NMS

Siemens Solid Edge

CISA Adds Two Known Exploited Vulnerabilities to Catalog

Exploit-DB.com RSS Feed

[webapps] SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)

[webapps] reNgine 2.2.0 - Command Injection (Authenticated)

[webapps] openSIS 9.1 - SQLi (Authenticated)

[webapps] dizqueTV 1.5.3 - Remote Code Execution (RCE)

[webapps] NoteMark < 0.13.0 - Stored XSS

[webapps] Gitea 1.22.0 - Stored XSS

[webapps] Invesalius3 - Remote Code Execution

[dos] Windows TCP/IP - RCE Checker and Denial of Service

[webapps] Aurba 501 - Authenticated RCE

[webapps] HughesNet HT2000W Satellite Modem - Password Reset

[webapps] Elber Wayber Analog/Digital Audio STL 4.00 - Device Config Disclosure

[webapps] Elber Wayber Analog/Digital Audio STL 4.00 - Authentication Bypass

[webapps] Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Device Config

[webapps] Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass

[webapps] Helpdeskz v2.0.2 - Stored XSS

[webapps] Calibre-web 0.6.21 - Stored XSS

[webapps] Devika v1 - Path Traversal via 'snapshot_path'

[local] Genexus Protection Server 9.7.2.10 - 'protsrvservice' Unquoted Service Path

[local] SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path

[local] Oracle Database 12c Release 1 - Unquoted Service Path

[webapps] Ivanti vADC 9.9 - Authentication Bypass

[local] Bonjour Service 'mDNSResponder.exe' - Unquoted Service Path Privilege Escalation

[webapps] Xhibiter NFT Marketplace 1.10.2 - SQL Injection

[webapps] Azon Dominator Affiliate Marketing Script - SQL Injection

[webapps] Microweber 2.0.15 - Stored XSS

[webapps] Customer Support System 1.0 - Stored XSS

[webapps] Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)

[webapps] SolarWinds Platform 2024.1 SR1 - Race Condition

[webapps] Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)

[webapps] Poultry Farm Management System v1.0 - Remote Code Execution (RCE)

[webapps] Boelter Blue System Management 1.3 - SQL Injection

[webapps] WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated)

[webapps] PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows)

[webapps] AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability.

[webapps] XMB 1.9.12.06 - Stored XSS

[webapps] Carbon Forum 5.9.0 - Stored XSS

[webapps] AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS)

[webapps] appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated)

[webapps] CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)

[webapps] WBCE CMS v1.6.2 - Remote Code Execution (RCE)

[webapps] Monstra CMS 3.0.4 - Remote Code Execution (RCE)

[webapps] Dotclear 2.29 - Remote Code Execution (RCE)

[webapps] Serendipity 2.5.0 - Remote Code Execution (RCE)

[webapps] Sitefinity 15.0 - Cross-Site Scripting (XSS)

[webapps] FreePBX 16 - Remote Code Execution (RCE) (Authenticated)

[webapps] Akaunting 3.1.8 - Server-Side Template Injection (SSTI)

[webapps] Check Point Security Gateway - Information Disclosure (Unauthenticated)

[webapps] Aquatronica Control System 5.1.6 - Information Disclosure

[webapps] changedetection < 0.45.20 - Remote Code Execution (RCE)

[webapps] ElkArte Forum 1.1.9 - Remote Code Execution (RCE) (Authenticated)

Full Disclosure

SEC Consult SA-20241127-0 :: Stored Cross-Site Scripting in Omada Identity (CVE-2024-52951)

SEC Consult SA-20241125-0 :: Unlocked JTAG interface and buffer overflow in Siemens SM-2558 Protocol Element, Siemens CP-2016 & CP-2019

Re: Local Privilege Escalations in needrestart

APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1

Local Privilege Escalations in needrestart

APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2

APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1

APPLE-SA-11-19-2024-2 visionOS 2.1.1

APPLE-SA-11-19-2024-1 Safari 18.1.1

Reflected XSS - fronsetiav1.1

XXE OOB - fronsetiav1.1

St. Poelten UAS | Path Traversal in Korenix JetPort 5601

St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro

Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionOS/watchOS)

SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)

Open Source Security

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

Re: Local Privilege Escalations in needrestart

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

Re: Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

stalld: unpatched fixed temporary file use and other issues

Re: tuned: local root exploit in D-Bus method instance_create and other issues in tuned >= 2.23 (CVE-2024-52336, CVE-2024-52337)

Linux: Race can lead to UAF in net/bluetooth/sco.c: sco_sock_connect()

CVE-2024-52338: Apache Arrow R package: Arbitrary code execution when loading a malicious data file

Re: tuned: local root exploit in D-Bus method instance_create and other issues in tuned >= 2.23 (CVE-2024-52336, CVE-2024-52337)

tuned: local root exploit in D-Bus method instance_create and other issues in tuned >= 2.23 (CVE-2024-52336, CVE-2024-52337)

Multiple vulnerabilities in Jenkins and Jenkins plugins

WebKitGTK and WPE WebKit Security Advisory WSA-2024-0007

Ethical Hacking News

The Dark Side of Cryptocurrency: The Rise and Fall of Bitcoin Fog's Money Laundering Empire


Roman Sterlingov, 36, a dual Russian-Swedish national, has been sentenced to 12 years and six months in prison for his role in facilitating money laundering activities between 2011 and 2021 through his cryptocurrency mixing service, Bitcoin Fog.

Published: Sat Nov 9 00:58:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Advises Securing PAN-OS Interface Amid Potential Remote Code Execution Vulnerability Concerns



Palo Alto Networks has issued an alert warning customers of a potential remote code execution (RCE) vulnerability in its PAN-OS management interface. This vulnerability, tracked as CVE-2024-5910 with a CVSS score of 9.3, poses significant risks to network security and requires immediate attention from users. Organizations are advised to take proactive steps to secure their networks by following best practices outlined by Palo Alto Networks and staying informed about the latest developments in cybersecurity threats.

Published: Sat Nov 9 02:06:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Election Integrity Under Fire: The Dark Side of Far-Right Militias and Cyber threats

Election Integrity Under Fire: The Dark Side of Far-Right Militias and Cyber threats

In recent weeks, a disturbing trend has emerged from the far-right militia movement in the United States. Documents have revealed a history of voter intimidation plans, which pose a significant threat to the integrity of American elections. This article explores the dark side of far-right militias and cyber threats, shedding light on their tactics, impact, and the urgent need for a comprehensive national strategy to safeguard US elections.

Published: Sat Nov 9 06:26:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Frontier in Smartphone Security: Apple's Inactivity Reboot Feature Sparks Concerns Over Law Enforcement Access


A new iOS 18 security feature has been introduced, making it significantly more difficult for law enforcement to access data on iPhones that have not been unlocked in a certain period of time. The feature, which has been dubbed "inactivity reboot," causes iPhones to restart and enter a secure state after a four-day period of inactivity, thereby limiting the ability of forensic experts to extract data from these devices.

Published: Sat Nov 9 11:45:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cops Face New Hurdle as Apple Tightens iPhone Security with iOS 18.1 Update

Apple has introduced an update to its iOS operating system that includes a new security feature designed to prevent unauthorized access to iPhones and other devices. The update, which was rolled out recently, introduces an "inactivity reboot" mechanism that restarts a device after approximately four days being in a locked state. This change has significant implications for law enforcement agencies, who rely on iPhones as a critical tool for conducting investigations and gathering evidence.

Published: Sat Nov 9 11:58:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fractured Legacy of Halo: An Examination of the Series' Current State

Can Halo overcome its current struggles and reclaim its place as one of gaming's top franchises? Only time will tell.

Published: Sat Nov 9 13:11:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Ransomware Tactics: Unpacking the Frag Ransomware Attack

Ransomware groups continue to evolve and adapt their tactics, with the latest Frag ransomware attack highlighting the use of LOLBins as a key component of its strategy. As security teams must stay one step ahead of these threats, the importance of vigilance and proactive defense cannot be overstated.

Published: Sat Nov 9 13:42:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious PyPI Package Steals AWS Credentials from Over 37,000 Developers



A malicious Python package has been found on the Python Package Index (PyPI), which has stolen over 37,000 times. The 'fabrice' package exploits typosquatting tactics to obtain AWS credentials using a legitimate SDK for Amazon Web Services. By understanding this threat and taking preventative measures, developers can protect themselves against future attacks.


Published: Sat Nov 9 14:51:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Fake Emergency Data Requests: A Growing Concern for Cybersecurity


The FBI has issued an alert warning of a significant spike in hacked police emails and fake subpoenas, highlighting the need for increased security measures to protect email systems. Fake emergency data requests have become a pressing concern for cybersecurity experts, law enforcement agencies, and technology companies worldwide.

Published: Sat Nov 9 15:05:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mazda Connect Flaws Exposed: A Vulnerability Nightmare for Vehicle Owners

Security experts at Security Affairs have exposed critical vulnerabilities in Mazda's infotainment system, dubbed "Mazda Connect". The findings have left vehicle owners wondering about their safety and the potential consequences of such a vulnerability being exploited. Read more to learn about the critical vulnerabilities identified by Pierluigi Paganini.

Published: Sat Nov 9 17:30:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Alert: Salt Typhoon Hack Impacts Telco Providers and Raises Concerns for Employee Phone Use


The U.S. agency has issued an alert warning employees to limit their phone use due to a sophisticated cyber attack on major telco providers known as the Salt Typhoon hack. The hackers gained access to sensitive data, including customer information and proprietary business records, posing significant risks to national security.

Published: Sun Nov 10 05:01:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Evolves with Increasing Sophistication: A Review of Recent Threats and Vulnerabilities

Recent threats and vulnerabilities have highlighted the ongoing threat posed by cybercrime, including APT groups, phishing campaigns, and supply chain attacks.

Published: Sun Nov 10 07:29:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Security Breaches and Vulnerabilities: A Global Landscape of Threats

Security breaches and vulnerabilities are a persistent threat in today's digital landscape. From Mazda Connect flaws to ransomware attacks on critical infrastructure, this article highlights the importance of prioritizing security when handling sensitive user information and staying up-to-date with software patches.

Published: Sun Nov 10 07:56:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Take Advantage of Ticketmaster Data Breach: A Growing Concern for Concertgoers

Hackers are taking advantage of Ticketmaster's data breach by stealing tickets from users' accounts, leaving fans feeling vulnerable and anxious about their tickets. The company has implemented some security measures to address the issue, but more needs to be done to protect users' sensitive information.

Published: Sun Nov 10 13:15:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Leverage ZIP File Concatenation to Evade Detection in Phishing Attacks


Hackers are using a new technique to evade detection in phishing attacks by concatenating ZIP files. This approach exploits the different ways that various ZIP parsers handle concatenated ZIP files, making it challenging for security solutions to detect these types of attacks. By understanding this technique and taking steps to defend against it, individuals and organizations can reduce their risk of falling victim to these sophisticated attacks.

Published: Sun Nov 10 18:30:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Mastermind Behind a Massive Snowflake Breach is Busted by Canadians


A mastermind behind a massive Snowflake breach has been arrested in Canada, bringing an end to his reign of cyber terror. Alexander "Connor" Moucka is believed to be connected to the compromise of at least 165 Snowflake customers, including prominent names such as AT&T and Ticketmaster. The arrest serves as a significant development in the case, highlighting the importance of implementing robust security measures to prevent similar breaches in the future.

Published: Sun Nov 10 21:57:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Leverage Microsoft Excel Exploit to Spread Fileless Remcos RAT Malware via Phishing Campaign


A new phishing campaign exploits a known remote code execution flaw in Microsoft Office to spread fileless variants of the notorious Remcos RAT malware. The attack leverages purchase order-themed lures to trick recipients into opening malicious Excel attachments, highlighting the ongoing evolution of sophisticated cybersecurity threats.

Published: Mon Nov 11 01:14:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Convergence of Cyber Threats: Pro-Russia Actors Intensify Attacks on South Korea Amidst North Korean Troop Deployment


South Korea is facing an intensification of distributed denial-of-service (DDoS) attacks from pro-Russian hacktivist groups, targeting public and private websites. This surge in cyberattacks comes following the decision to monitor North Korean troops in Ukraine, which has raised concerns about potential escalation of conflicts involving multiple nations. The South Korean government plans to enhance cyber threat preparedness through monitoring and ongoing collaboration among relevant agencies.

Published: Mon Nov 11 02:52:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dawn of Autonomous Gun Systems: A Revolutionary Counter-Drone Defense


The US Army has unveiled the Bullfrog, an AI-powered turret capable of precise engagement of airborne targets with minimal ammunition expenditure. This cutting-edge technology marks a significant milestone in the evolution of modern warfare, sparking debates about its potential implications on future military operations.

Published: Mon Nov 11 05:13:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Severe Security Flaws in Popular Machine Learning Toolkits Expose Organizations to Server Hijacks and Privilege Escalation


A recent analysis by JFrog has uncovered nearly two dozen security vulnerabilities in popular machine learning (ML) toolkits, exposing organizations to server hijacks and privilege escalation attacks. The most significant vulnerability, CVE-2024-7340, was discovered in the Weave ML toolkit, while others were identified in the Deep Lake AI-oriented database, Vanna.AI library, and Mage AI framework. The severity of these vulnerabilities cannot be overstated, as they can lead to a severe breach of sensitive data and operations.

Published: Mon Nov 11 05:32:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

HPE Urges Swift Patching of Critical Aruba Access Point Vulnerabilities to Prevent Remote Code Execution


Hewlett Packard Enterprise (HPE) has released critical security patches to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The patches aim to prevent remote code execution by mitigating these high-severity vulnerabilities.

Published: Mon Nov 11 05:54:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Web's Crypto Laundry Kingpin Falls: A Case Study of Bitcoin Fog's Demise

A Russian-Swedish national has been sentenced to 12 years and six months in US prison for operating one of the longest-running money laundering machines on the dark web. Bitcoin Fog's demise marks a significant blow to those who facilitate criminal activity on the dark web, but experts note that other services will likely fill the gap.

Published: Mon Nov 11 07:16:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Wave of Cyber Threats: A Comprehensive Analysis of Emerging Malware and Exploits


A new wave of sophisticated cyber threats has emerged, with AndroxGh0st malware integrating with the Mozi botnet, ToxicPanda targeting banks in Europe and Latin America, VEILDrive exploiting Microsoft services, and CRON#TRAP spreading across Windows systems. These exploits underscore the need for increased vigilance and proactive measures to protect against emerging threats.

Published: Mon Nov 11 07:33:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Impact of Automated Security Validation on Cybersecurity Leaders: A Success Story

DTCC's implementation of Automated Security Validation has shown significant benefits for the organization, including improved productivity, reduced risk, and enhanced employee retention. This success story highlights the importance of embracing automation in cybersecurity and explores the key considerations for securing a budget for secure validation.

Published: Mon Nov 11 07:49:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Halliburton's Ransomware Nightmare: A $35 Million Price Tag for a Cybersecurity Breach

Halliburton has revealed that an August ransomware attack led to $35 million in losses after the breach caused the company to shut down IT systems and disconnect customers. The RansomHub ransomware gang was responsible for the attack, which stole data from Halliburton's network.

Published: Mon Nov 11 09:31:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Wave of Fileless Malware Threatens Global Security: The Rise of Remcos RAT

A new variant of the commercial RAT tool known as Remcos has been discovered in a phishing campaign, posing significant risks due to its stealthy and fileless nature. As threat actors continue to evolve their tactics, it is essential for organizations to stay vigilant and implement robust cybersecurity measures.

Published: Mon Nov 11 09:49:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Halliburton's $35 Million Ransomware Loss Exposes the Industry's Reliance on Cybersecurity


Halliburton has revealed that a ransomware attack in August 2024 resulted in a $35 million loss, exposing the industry's reliance on cybersecurity. The attack, attributed to the RansomHub ransomware gang, forced the company to shut down its IT infrastructure and disconnect customers' systems. The incident highlights the importance of robust cybersecurity measures and incident response planning for organizations operating in high-risk industries.

Published: Mon Nov 11 11:04:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Emergency Data Requests: A Growing Concern for Cybersecurity


The FBI has issued a warning about the growing trend of crooks stealing data using government emails, specifically through emergency data requests (EDRs). This phenomenon has been on the rise since August 2023, with a significant increase in fraudulent requests being sent to US businesses and law enforcement agencies. As cybercriminals become more sophisticated in their tactics, it is essential for organizations to stay vigilant and proactive in mitigating risks. The FBI recommends developing a close relationship with local field offices, reviewing incident response plans, and adopting critical thinking when receiving EDRs.

Published: Mon Nov 11 11:13:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Sophisticated Malware Campaigns: GootLoader's Latest Targeting of Innocent Users



A new malware campaign known as GootLoader has been identified by Sophos researchers, targeting innocent users who search for specific information on search engines. The campaign uses SEO poisoning tactics to deliver a loader for other malware families, including GootKit, an information stealer and remote access trojan (RAT). This latest development highlights the ongoing evolution of cyber threats and the need for users to be vigilant when searching online.



Published: Mon Nov 11 12:52:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

AAmazon Data Breach: A Cautionary Tale of Vendor Vulnerabilities

Amazon confirms employee data breach after vendor hack, highlighting the ongoing struggle between robust security protocols and vulnerabilities in third-party systems.

Published: Mon Nov 11 14:12:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Mysterious Data Breach Exposes Amazon Employee Contact Information: A Cautionary Tale of Cybersecurity Vulnerabilities

A major tech company has confirmed that a data breach occurred, exposing the personal contact information of its employees. The breach, which appears to be related to a security vulnerability discovered last year, raises concerns about the company's ability to prevent data breaches and highlights the ongoing threat of cyberattacks.

Published: Mon Nov 11 15:19:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revolutionizing Human Perception: The Breakthrough Haptic Patch Technology


Revolutionizing Human Perception: The Breakthrough Haptic Patch Technology

Scientists at Northwestern University have developed a revolutionary new patch that can transmit sensations to the skin, allowing people to feel tactile information even when they are blindfolded. This technology has far-reaching implications for virtual reality, gaming, and assistive devices for individuals with vision impairments. Learn more about this groundbreaking innovation and its potential impact on our daily lives.

Published: Mon Nov 11 15:33:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Ymir Ransomware Family Partners with RustyStealer to Spread Malicious Operations


The emergence of Ymir ransomware marks a significant development in the collaboration between malware families used by cybercrime groups. Partnering with RustyStealer, Ymir has evolved into an even more potent threat due to its advanced evasion techniques and use of information stealers as access brokers. With this partnership, users must ensure their security measures are updated to counter the evolving landscape of ransomware attacks.

Published: Mon Nov 11 17:03:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hot Topic Data Breach Exposes 57 Million Customers' Personal Information


A massive data breach has exposed 57 million Hot Topic customers' personal information. The incident is believed to have occurred in October 2024 and includes sensitive data such as email addresses, phone numbers, physical addresses, and partial credit card details. Follow our article to learn more about the breach, its possible causes, and how you can protect yourself.


Published: Mon Nov 11 17:09:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Threat Landscape: Cybercrime on the Rise

Amazon's recent data breach highlights the growing threat of zero-day exploits and the need for organizations to prioritize cybersecurity measures. The incident, which exposed over 2.8 million records containing employee data, underscores the increasing sophistication and frequency of cybercrimes.

Published: Mon Nov 11 17:36:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks



The Ymir ransomware variant has emerged as a significant development in contemporary cyber threats, leveraging memory management functions to evade detection and increase its stealth capabilities. With the rise of new variants like AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services and VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware, organizations must prioritize robust cybersecurity defenses against emerging threats. Staying informed about these evolving risks is crucial for maintaining the security of corporate networks.



Published: Tue Nov 12 02:04:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Age of Inescapable Surveillance: How to Protect Yourself from a Trump-Driven America

As Donald Trump takes the reins of power in America, the prospect of government overreach and technological snooping becomes an ever-present concern. Learn how to protect yourself from this tidal wave of surveillance with these expert-recommended strategies for safeguarding your digital privacy.

Published: Tue Nov 12 05:45:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Masked Protester: A Looming Threat to Free Speech

The mask ban at protests has sparked heated debates among civil rights advocates, law enforcement officials, and lawmakers, with some arguing that such measures are necessary to hold protesters accountable, while others contend that they will only serve to chill free speech and open protesters up to harassment by political opponents.

Published: Tue Nov 12 06:08:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Behavioral Analytics: The New Frontier in Incident ResponseThe Hacker News


Behavioral Analytics is Back: How It's Revolutionizing Incident Response and SOC Investigation
The use of behavioral analytics in cybersecurity has seen a resurgence in recent years, as organizations look for ways to improve their incident response processes. Once primarily used for threat detection, it is now being reimagined as a powerful post-detection technology that enhances the accuracy, efficiency, and impact of Security Operations Center (SOC) investigations. This article will explore five key ways behavioral analytics is revolutionizing incident response, helping security teams respond with greater speed and precision.


Published: Tue Nov 12 06:31:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Security Feature Raises Concerns: Apple's "Inactivity Reboot" Feature Automatically Reboots Locked Devices

Apple's "inactivity reboot" feature raises concerns over security and law enforcement in forensic analysis settings where iPhones await examination. The feature aims to enhance data security by erasing sensitive information from memory, but its potential impact on current tools used for forensic analysis is a pressing issue that requires immediate attention.

Published: Tue Nov 12 07:05:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Stealthy Threat Emerges: The Ymir Ransomware


A new stealthy threat has emerged in the form of the Ymir ransomware, a malware family that has been making waves in the cybercrime world. This article provides an in-depth look at the Ymir ransomware, its detection-evasion features, and the evolving nature of cybercrime threats.

Published: Tue Nov 12 07:26:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Chapter in the History of Cybersecurity: The MOVEit Vulnerability and its Devastating Consequences

A major data breach has occurred at Amazon, exposing employee information from various organizations, including Amazon itself. The breach is linked to the MOVEit vulnerability, a critical bug discovered in 2023. The level of detail provided by the breach raises concerns about potential security threats and highlights the importance of keeping software up-to-date and patching vulnerabilities in a timely manner.

Published: Tue Nov 12 09:09:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Erosion of Personal Privacy: How Technology is Compromising Our Most Fundamental Rights


The use of technology has led to a significant erosion of personal privacy, with smartphones, cryptocurrencies, and digital payment systems posing a threat to individuals' right to anonymity. As law enforcement agencies become increasingly sophisticated in their ability to track and analyze data, experts are urging individuals to take steps to protect themselves, including using alternative forms of payment or specialized tools like Faraday bags.

Published: Tue Nov 12 09:24:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Citrix Vulnerability Exposed: Misconfigured MSMQ Allows RCE via BinaryFormatter


A recent discovery has exposed a critical vulnerability in Citrix Virtual Apps and Desktops that could be exploited to achieve unauthenticated remote code execution (RCE) through misconfigured MSMQ instances. The issue highlights the importance of ensuring sensitive services are properly secured and not exposed unnecessarily. Organizations must take immediate action to address this vulnerability and secure their systems against potential attacks.

Published: Tue Nov 12 09:32:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns: A Threat to Cybersecurity

A new phishing tool called GoIssue has emerged, targeting GitHub developers in bulk email campaigns. The threat actor behind the tool claims it offers precision and power for reaching specific audiences or expanding outreach. As a result, there is an increased risk of successful breaches, data theft, and compromised projects among thousands of developers.

Published: Tue Nov 12 09:40:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers Utilize Flutter-Embedded Malware to Infiltrate Apple macOS Devices


North Korean hackers have successfully embedded malware within Flutter applications, marking a new tactic in their efforts to infiltrate Apple macOS devices. The malicious code was identified by Jamf Threat Labs, which noted that the threat actors are using social engineering techniques to achieve their objectives. This discovery highlights the evolving threat landscape of cybersecurity and underscores the importance of staying vigilant and adopting proactive measures to protect against emerging threats.

Published: Tue Nov 12 10:00:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI, CISA, and NSA Unveil Most Exploited Vulnerabilities of 2023: A Wake-Up Call for Organizations Worldwide


FBI, CISA, and NSA Unveil Most Exploited Vulnerabilities of 2023: A Wake-Up Call for Organizations Worldwide

A joint advisory from the FBI, CISA, and NSA has highlighted the most exploited vulnerabilities of 2023, serving as a stark reminder to organizations worldwide to prioritize patch management and bolster their defenses against increasingly sophisticated cyber threats. Learn more about the top 15 vulnerabilities and what organizations can do to stay ahead of emerging threats.

Published: Tue Nov 12 12:12:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Revival of the KV-Botnet: A Rebuilding Effort by Chinese State-Sponsored Hacking Group Volt Typhoon Following FBI Disruption

Chinese state-sponsored hacking group Volt Typhoon has successfully rebuilt its KV-Botnet malware botnet following a disruption by law enforcement, posing a significant threat to global cybersecurity. The rebuilding effort indicates that the Chinese hackers remain determined in their pursuit of infiltrating critical networks and maliciously exploiting vulnerable devices.

Published: Tue Nov 12 12:21:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers' Sophisticated Attack on macOS Security: A New Frontier in Malware Development


North Korean hackers have been using Flutter-based apps to bypass the security features of Apple's macOS operating system. The attacks were discovered through analysis of six malicious applications built with Google's Flutter framework. This revelation marks a new frontier in malware development, as it showcases the level of sophistication and creativity employed by nation-state actors.

Published: Tue Nov 12 12:32:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix Virtual Apps and Desktops Vulnerability: A Serious Security Threat to Enterprise Networks


Citrix's Virtual Apps and Desktops solution has been hit with a new security vulnerability that allows attackers to gain unauthorized access to sensitive data and escalate privileges on the system. The vulnerability, identified as CVE-2024-8068, is considered serious and organizations should take immediate action to patch their systems.

Published: Tue Nov 12 12:44:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Managing Third-Party Risks in Complex IT Environments: A Crucial Step Towards Ensuring Organizational Security


A recent webinar by SailPoint aims to provide actionable insights into securing an organization's data and systems against third-party access threats. By adopting best practices for managing third-party risks, IT managers and security professionals can reduce the likelihood of data breaches and minimize financial losses.

Published: Tue Nov 12 12:51:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Threats on the Rise: A Global Landscape of Attacks and Breaches

As the threat landscape continues to evolve, organizations must take proactive steps to protect themselves against emerging threats. With an estimated $6 trillion in global costs expected by 2023, it is clear that cybercrime poses a significant challenge for governments and individuals alike.

Published: Tue Nov 12 13:19:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

November 2024 Patch Tuesday Security Update Roundup: Four Zero-Days Fixed


November 2024 Patch Tuesday has addressed a total of 91 security vulnerabilities, including four critical zero-day exploits. The update aims to fix multiple flaws in various Windows components and services, including the SMBv3 client and server, Windows Task Scheduler, and Windows Telephony Service. Learn more about the patches included in this month's update.



Published: Tue Nov 12 15:10:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ahold Delhaize's US Grocery Chain Embroiled in Widespread Cybersecurity Crisis Amid Ongoing Outages


Ahold Delhaize, a multinational retail company that operates grocery stores under various brand names across the United States, has been experiencing a prolonged cybersecurity crisis. The situation has resulted in outages at numerous locations, with varying degrees of impact on services and operations. With nearly 2,000 stores affected and an estimated 1,000 belonging to Food Lion alone, this incident underscores the ongoing vulnerability of retail operations in the digital age.

Published: Tue Nov 12 15:29:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ahold Delhaize Cyber Incident: A Complex Web of Consequences for the Multinational Retail Giant

Ahold Delhaize, a multinational retail giant, has faced a significant cyber incident affecting several of its US brands, including Giant Food, Hannaford, pharmacies, and e-commerce services. The company has acknowledged the impact of the incident but assures customers that all brand stores remain open and serving customers. Ahold Delhaize is taking proactive measures to assess and mitigate the problem and protect its customers from potential cyber threats.

Published: Tue Nov 12 15:50:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's November 2024 Patch Tuesday: A Multifaceted Threat Landscape

Microsoft has released its November 2024 Patch Tuesday with fixes for at least 89 security vulnerabilities in Windows operating systems and other software. The update includes patches for two zero-day vulnerabilities already being exploited by attackers, highlighting the ongoing importance of staying up-to-date with security patches.

Published: Tue Nov 12 17:13:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Shadowy Snowflake Hackers: A Web of Deceit and Data Exploitation

Two Canadian and American hackers have been indicted on 20 counts of conspiracy, computer fraud and abuse, wire fraud, and aggravated identity theft in connection with a high-profile cyber attack on multiple organizations' Snowflake-hosted cloud environments. The alleged hackers exploited vulnerabilities to steal sensitive data and extort ransoms from their victims, with at least three paying $2.5 million to have their data returned.

Published: Tue Nov 12 17:21:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Guard Discord Leaker Receives Lenient Sentence Despite Compromising National Security

Jack Teixeira, a former Air National Guard member, has been sentenced to 15 years in prison for leaking classified military information on Discord. The case highlights the dangers of unchecked access to sensitive information and the need for vigilance in protecting national security.

Published: Tue Nov 12 18:37:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Security Breach of Epic Proportions: The Case of Jack Teixeira, a 22-Year-Old Air National Guardsman

A former Air National Guardsman has been sentenced to 15 years in prison for leaking classified American military secrets on Discord, highlighting the importance of adhering to protocols regarding sensitive information and the need for vigilance in safeguarding national security.

Published: Tue Nov 12 18:49:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Patch Tuesday: A Gauntlet of Vulnerabilities for Windows Users

Microsoft has released 89 patches for various security vulnerabilities, including two currently under active attack, as part of its latest Patch Tuesday. Users are advised to address these issues promptly to prevent potential security breaches.

Published: Tue Nov 12 20:05:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Volt Typhoon's Resurgence: A New Wave of Chinese Cyber Espionage Threatens Global Critical Infrastructure


China's Volt Typhoon crew has resurfaced with a vengeance, compromising critical infrastructure networks and launching devastating cyberattacks. A new wave of Chinese cyber espionage threatens global critical infrastructure, highlighting the need for organizations to prioritize cybersecurity and stay vigilant in the face of evolving threats.

Published: Tue Nov 12 20:16:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT PATCH TUESDAY SECURITY UPDATES: TWO ACTIVELY EXPLOITED ZERO-DAYS FIXED IN NOVEMBER 2024

Microsoft Patch Tuesday security updates for November 2024 fix two actively exploited zero-days in Android devices and Linux clients. These vulnerabilities allow attackers to gain unauthorized access to sensitive information, including user IP addresses.

Published: Tue Nov 12 20:36:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT UNVEILS 90 NEW SECURITY PATCHES, INCLUDING ACTIVELY EXPLOITED NTLM AND TASK SCHEDULER VULNERABILITIES


Microsoft has released 90 new security patches, including actively exploited vulnerabilities in NTLM and Task Scheduler. The update addresses a range of critical vulnerabilities, including remote code execution flaws and elevation of privilege vulnerabilities. Organizations are advised to prioritize patching these vulnerabilities as soon as possible to prevent potential exploitation.

Published: Wed Nov 13 02:08:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Hackers Employ "Dream Job" Lures to Wreak Havoc on Aerospace Industry with SnailResin Malware

TA455, a Iranian threat actor believed to be affiliated with the Islamic Revolutionary Guard Corps (IRGC), has been linked to a series of targeted attacks on aerospace industry professionals using fake job opportunities and the SnailResin malware. This campaign marks a significant escalation in the group's activities and highlights the need for organizations in the industry to enhance their security measures.

Published: Wed Nov 13 03:24:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution



A recent security analysis has uncovered 10 vulnerabilities in the OvrC platform, exposing IoT devices to remote attacks and code execution. The discovery highlights the need for greater vigilance and cooperation among manufacturers, cloud service providers, and regulatory agencies to secure these vulnerable platforms.



Published: Wed Nov 13 06:07:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Surveillance State: ICE's Mass Deportation Plan Takes Shape

ICE is expanding its surveillance apparatus to monitor millions of non-detained individuals awaiting deportation hearings, sparking concerns about civil liberties, data collection, and individual freedoms. The agency's plan, outlined in a recent notice, seeks contractors to deploy technology and personnel to monitor these individuals under the new Release and Reporting Management (RRM) program.

Published: Wed Nov 13 07:32:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Roadmap for Building a Strong Browser Security Program


In an era where cybersecurity threats are becoming increasingly sophisticated and prevalent, it is imperative for organizations to adopt proactive measures to safeguard their digital assets. A comprehensive browser security program is essential to address the growing threat landscape and mitigate emerging risks. This article provides a detailed roadmap for CISOs and security teams to establish effective browser security programs.

Published: Wed Nov 13 07:41:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New ShrinkLocker Ransomware Decryptor: A Breakthrough in Restoring BitLocker Passwords

New ShrinkLocker ransomware decryptor: A breakthrough in restoring BitLocker passwords has been made possible by researchers at Bitdefender, giving victims a new hope of recovering their data from the malware.

Published: Wed Nov 13 08:52:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Forecast 2025: Navigating the Evolving Threat Landscape with Caution


Google Cloud's Cybersecurity Forecast 2025 Report Reveals Emerging Threats to Expect in the Coming Year
The report highlights key trends and threats that organizations can anticipate facing in the year ahead, including the increasing use of AI for sophisticated attacks and the growing threat of ransomware and multifaceted extortion.


Published: Wed Nov 13 09:00:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NordPass Black Friday Deal: A Comprehensive Guide to Cybersecurity Savings


In a major move, NordPass is offering an unbeatable Black Friday deal that promises to revolutionize cybersecurity for millions of users worldwide. With discounts up to 44% off the regular price, individuals can secure a Premium subscription to NordPass or bundle it with NordVPN at an unprecedented low cost. Don't miss out on this incredible opportunity to elevate your digital security!

Published: Wed Nov 13 10:20:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hamas-Affiliated Group Expands Malicious Activities to Disrupt Israeli Entities


A Hamas-affiliated group known as WIRTE has expanded its malicious activities beyond espionage to carry out disruptive attacks against Israeli entities, targeting other countries in the region. The threat actor's use of sophisticated malware tools, including the SameCoin wiper, highlights the need for increased vigilance and cooperation between countries to counter these types of threats.

Published: Wed Nov 13 10:33:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShrinkLocker Ransomware: A New Threat to Data Protection


In a recent development that has sent shockwaves through the cybersecurity community, Romanian cybersecurity company Bitdefender has released a free decryptor for victims of the ShrinkLocker ransomware. This malicious software was designed to be simple yet effective, using Microsoft's native BitLocker utility to encrypt files as part of extortion attacks targeting Mexico, Indonesia, and Jordan.

Published: Wed Nov 13 10:43:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zoom Addresses High-Severity Vulnerabilities in Video Conferencing Platform


Zoom addressed two high-severity issues in its platform that could allow remote attackers to escalate privileges or leak sensitive information, including a buffer overflow issue and an improper input validation issue.



Published: Wed Nov 13 11:10:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Most Insecure Passwords: A Glimpse into Humanity's Laziness


A recent study by a prominent password manager has shed light on some of the most commonly used – and therefore least secure – passwords in use worldwide, revealing a concerning trend that highlights humanity's propensity for laziness when it comes to protecting personal information. In this article, we will delve into the findings of this study and explore the implications of these results.


Published: Wed Nov 13 12:33:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Snowflake Saboteurs: A Complex Web of Cybercrime and Deceit


Two Snowflake hackers have been indicted by US authorities for extorting $2.5 million from three victims through a complex web of cybercrime and deceit. The indictment, which was unsealed last month, reveals the sophisticated tactics employed by Connor Riley Moucka and John Erin Binns to breach over 165 organizations using Snowflake cloud storage services. The case highlights the complexities of modern cybercrime and the importance of collaboration between law enforcement agencies worldwide.

Published: Wed Nov 13 14:12:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability in End-of-Life D-Link NAS Devices Exposed: A Growing Security Threat

End-of-life D-Link NAS devices are being targeted by attackers due to a newly discovered critical vulnerability. Users of affected devices must take immediate action to secure their systems and protect against exploitation.

Published: Wed Nov 13 14:27:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Embargo Ransomware Operation: A New Player in the US Healthcare Cybercrime Scene

Embargo ransomware operation has claimed responsibility for a high-profile breach at American Associated Pharmacies (AAP), allegedly stealing sensitive data from the US pharmacy network. The group's demands, which include payment of $1.3 million for decryption and an additional $1.3 million to keep leaked documents off the web, have sparked concerns about the potential scale and scope of the breach.

Published: Wed Nov 13 15:07:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Task Manager Fix: A Glimpse into the World of Automated Testing and Quality Improvements

Microsoft has recently addressed two long-standing issues plaguing Windows 11 24H2 and Windows Server 2025, including a fix for the Task Manager issue that was introduced in the October 2024 non-security preview update. The fixes were included in KB5046617 and are part of Microsoft's ongoing efforts to improve its quality control processes.

Published: Wed Nov 13 15:18:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking Apple's Location-Based Hearing Aid Restrictions: A New Frontier in Digital Security

Three Indian researchers have successfully hacked around Apple's location-based restrictions on its hearing aid features in AirPods Pro 2 earbuds, allowing them to bypass geolocation checks and enable the feature in countries where it is not yet available. The breakthrough comes at a time when Apple's hearing aid features are gaining popularity globally.

Published: Wed Nov 13 15:27:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resurgence of China's Volatile Threat Actor: Unpacking the Volt Typhoon Botnet


The VoltyTyphoon botnet has re-emerged, employing the same core infrastructure and techniques that first came to light in May 2023. The group's activities pose a significant threat to U.S. critical infrastructure networks, highlighting the need for continued vigilance and proactive measures to counter these threats.

Published: Wed Nov 13 15:50:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Government Officials' Communications Compromised in Recent Telecom Hack: A Growing Concern for Cybersecurity

The US government has confirmed that Chinese hackers have compromised the private communications of a limited number of government officials in recent telecom hack. The breach highlights the growing concern over cybersecurity threats emanating from China and underscores the need for robust measures to protect sensitive information.

Published: Wed Nov 13 17:19:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great B2B Data Breach: Unraveling the Mystery Behind DemandScience's 122 Million Records


The world of business-to-business (B2B) data aggregation has been rocked by a massive breach of 122 million records linked to DemandScience. What led to this incident, and what steps will be taken to rectify the situation? Read on to find out more about the impact of this breach and how it affects individuals and organizations.

Published: Wed Nov 13 17:34:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Error Messages on Bleeping Computer: Understanding SQL Server Issues

Summary: A recent visit to Bleeping Computer revealed a concerning trend regarding the Driver Server Level Error, which is attributed to issues with the SQL server used by the host. Users are advised to contact their host immediately to address this problem and prevent further complications.

Published: Wed Nov 13 17:40:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Broad and Significant Cyber Espionage Campaign: China-Backed Groups Infiltrate US Telcos


The US government has confirmed a significant cyber espionage campaign was conducted by Chinese-backed groups against multiple American telecommunications providers' networks, compromising private communications and stealing customer call records data. This marks an escalation in cyber attacks targeting US telcos and underscores the ongoing threat from China-backed groups that can compromise critical infrastructure with relative ease.

Published: Wed Nov 13 22:12:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Bitdefender's ShrinkLocker Ransomware Decryptor: A Breakthrough in Cybersecurity

Bitdefender has released a free decryption tool designed to unlock data encrypted by the notorious ShrinkLocker ransomware, providing victims with a chance to recover their files and regain control over their digital assets.

Published: Wed Nov 13 22:28:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Broker's Data Breach: 100M+ Records Stolen and Put Up for Sale



A recent data breach has exposed over 100 million records of people's contact details and employment information, which have been stolen or obtained from a data broker and put up for sale by a miscreant. The data includes corporate email addresses, physical addresses, phone numbers, names of employers, job titles, and links to LinkedIn and other social media profiles.

The breach raises questions about the security measures in place to protect sensitive information and the potential consequences for individuals whose personal data has been compromised. This article provides a detailed analysis of the incident, highlighting the importance of data protection and the need for organizations to prioritize transparency, accountability, and robust security measures to prevent similar breaches in the future.



Published: Wed Nov 13 22:45:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Swatter in the Shadows: Unmasking the Teen Behind Hundreds of Swatting Attacks


A 18-year-old teenager from Lancaster, California has pleaded guilty to federal charges for making hundreds of fake threats against schools, places of worship, and government buildings across the United States, as part of a nationwide spree of swatting attacks that left police scrambling to respond to numerous false reports of violence.

Published: Wed Nov 13 22:54:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShrinkLocker Ransomware: A Novel Approach to Encrypting Windows Systems


The ShrinkLocker ransomware has been identified as a novel approach to encrypting Windows systems using BitLocker configurations. Developed by Bitdefender researchers, a decryptor for this strain of malware provides potential relief for victims of these attacks. Understanding the threat posed by ShrinkLocker is crucial in helping organizations protect themselves against future outbreaks.

Published: Wed Nov 13 23:17:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Zero-Day Exploited to Deploy RAT Malware via NTLM Flaw



New Zero-Day Exploited to Deploy RAT Malware via NTLM Flaw
A newly discovered security flaw in Windows NT LAN Manager (NTLM) was exploited as a zero-day by suspected Russian actors as part of cyber attacks targeting Ukraine. A detailed analysis reveals how this vulnerability was used to deploy the open-source Spark RAT malware and highlights the evolving threat landscape in the cybersecurity world.



Published: Thu Nov 14 01:45:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The 15 Most Exploited Flaws: A Wake-Up Call for Organizations to Prioritize Patching and Security


The 15 most exploited flaws have been revealed by Five Eyes nations, highlighting a concerning trend of increased attacks on zero-day exploits. To stay ahead of cyber threats, organizations must prioritize patching and security measures.

Published: Thu Nov 14 03:17:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Replacement of Asda's Security Chief Amidst Walmart Tech Divorce: A Tale of IT Transformation and Restructuring

Asda's CISO departure amidst Walmart tech divorce highlights the challenges and complexities of IT transformation programs in retail. Will Asda succeed in its efforts to separate its IT systems from those of its parent company, or will it face continued struggles in this area?

Published: Thu Nov 14 04:34:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadows of Cybersecurity: A Post-Biden Administration Era


A new era of cybersecurity under Donald Trump promises to reshape the nation's approach to digital threats, with far-reaching implications for industries ranging from finance to healthcare. As the Trump administration prepares to roll back some of Biden's most ambitious initiatives, policymakers must navigate a complex web of competing priorities and interests in order to safeguard national security and protect American citizens from the ever-evolving threat landscape.

Published: Thu Nov 14 04:46:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Attack Vector: RustyAttr Malware Exploits macOS Weaknesses Through Extended Attribute Abuse


A new malware campaign dubbed RustyAttr has been discovered targeting macOS systems through extended attribute abuse. With its sophisticated techniques and decoy mechanisms, this threat vector poses significant challenges to security professionals. Understanding the implications of this attack and implementing necessary measures to protect against it is vital for maintaining effective cybersecurity defenses.

Published: Thu Nov 14 04:58:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Breach Hits Children's Shoemaker Start-Rite: A Repeated Offense Against Customer Trust

Start-Rite, a children's shoemaker, has been embroiled in yet another cybersecurity breach, exposing customer payment card details. This marks the company's second significant lapse in eight years, raising questions about the effectiveness of its security measures and the need for heightened vigilance among customers to protect themselves from potential fraud.

Published: Thu Nov 14 06:37:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NatWest's Bold Move: Blocking Bevy of Messaging Apps to Enhance Cybersecurity

NatWest, a prominent British banking and insurance giant, has taken a proactive step towards bolstering its cybersecurity by formally banning a wide array of messaging apps on company-issued devices. The move comes as a surprise to many, given the growing concern over the use of such communication channels for discussing sensitive business matters.

Published: Thu Nov 14 06:58:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Five BCDR Oversights That Leave Your Business Vulnerable to Ransomware Attacks

Don't let these five BCDR oversights leave your business vulnerable to devastating ransomware attacks. Learn how to develop a comprehensive disaster recovery plan and stay one step ahead of evolving threats in this expert guide.

Published: Thu Nov 14 07:07:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

TikTok Pixel Privacy Nightmare: A Case Study of Data Breach Lurking Behind a Misconfigured Third-Party Partner


A recent case study reveals how a well-intentioned but misconfigured third-party partner led to a GDPR breach on an online travel marketplace, showcasing the importance of adhering to data protection regulations and implementing proactive security measures. The incident highlights the risks associated with misconfigured tracking pixels and the need for companies to stay vigilant in protecting user data.

Published: Thu Nov 14 07:15:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes

Google has issued a stern warning to its users regarding the growing threat of cloaking scams, AI-driven fraud, and cryptocurrency schemes. The tech giant has revealed that bad actors are leveraging advanced techniques such as landing page cloaking to impersonate legitimate sites and conduct scams by creating a sense of urgency among users.

Published: Thu Nov 14 09:53:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Web Extortionist Brought to Justice: A Glimpse into the Sinister World of Cybercrime

A 45-year-old man has been sentenced to ten years in prison for hacking at least 19 organizations in the United States, stealing personal data of over 132,000 people, and making multiple extortion attempts.

Published: Thu Nov 14 11:23:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Leverage macOS Extended File Attributes to Evade Detection: A New Twist on Malware Delivery


Hackers have found a novel way to evade detection by exploiting macOS extended file attributes, hiding malicious code within custom file metadata. Researchers attribute this technique to the Lazarus Group, a well-known North Korean threat actor. This new approach is particularly effective against detection, making it essential for users to stay vigilant and keep their systems up-to-date with the latest security patches.

Published: Thu Nov 14 11:36:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New 'Sitting Ducks' Attack Scheme Leaves Thousands of Legitimate Domains Exposed to Malicious Actors

Experts at Infoblox have revealed that nearly 800,000 vulnerable registered domains have been identified over the past three months, with approximately 9% (70,000) of these domains being hijacked by malicious actors using the "Sitting Ducks" attack scheme. This alarming finding highlights the vulnerability of legitimate domains to exploitation by cybercriminals and the importance of continuous monitoring to detect and prevent such attacks.

Published: Thu Nov 14 14:14:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy World of Chinese Cyber Espionage: A Threat to National Security


A recent breach by China-linked threat actors has compromised multiple telecos and spied on a limited number of U.S. government officials, raising significant concerns about national security. The FBI and CISA are investigating the breach, which is believed to be linked to the Salt Typhoon group. This incident highlights the ongoing threat of Chinese cyber espionage and underscores the need for proactive measures to protect against these types of attacks.

Published: Thu Nov 14 14:33:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Glove Stealer Malware Bypasses Chrome's Cookie Encryption


Glove Stealer, a new information-stealing malware, has been discovered by security researchers for its ability to bypass Google Chrome's Application-Bound encryption and steal sensitive browser cookies. This threat highlights the ongoing evolution of cybersecurity risks and underscores the importance of staying vigilant against emerging threats.


Published: Thu Nov 14 15:43:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrook Behind Bars: A 10-Year Sentence for a Serial Hacker's Crimes

A notorious cybercrook has been sentenced to 10 years in prison for his numerous crimes against medical facilities and individuals. The sentence marks an important milestone in the fight against cybercrime, highlighting the ongoing struggle against cyber threats.

Published: Thu Nov 14 15:57:04 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Additional Palo Alto Networks Vulnerabilities Exploited in Wild Attacks



CISA Warns of Additional Palo Alto Networks Vulnerabilities Exploited in Wild Attacks

Recently, the United States Cybersecurity and Infrastructure Security Agency (CISA) released a statement informing the public about two additional critical security vulnerabilities found in Palo Alto Networks' Expedition migration tool. This alarming news comes as part of CISA's ongoing efforts to educate the nation on the current cybersecurity landscape.

The first vulnerability allows attackers to inject arbitrary commands into unpatched systems running the Expedition migration tool, while the second vulnerability enables attackers to access sensitive information such as usernames, cleartext passwords, device configurations, and even API keys of PAN-OS firewalls.

In light of this new information, it is crucial for organizations to take immediate action to patch their systems and protect themselves from these vulnerabilities.



Published: Thu Nov 14 17:27:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fortinet VPN Flaw: A Privilege Escalation Vulnerability with Devastating Consequences


A critical vulnerability has been discovered in Fortinet's FortiClient VPN application, which could potentially allow a low-privilege rogue user or malware to gain higher privileges from another user, execute code and possibly take over the box. The bug, tracked as CVE-2024-47574, earned a 7.8 out of 10 CVSS severity rating.

Published: Thu Nov 14 17:37:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking the Unpatched: The Looming Threat of CVE-2024-10914 on D-Link NAS Devices

Hackers are now exploiting a critical vulnerability in legacy D-Link NAS devices that was recently disclosed. The CVE-2024-10914 flaw allows remote OS command injection, making it a potential threat to millions of devices worldwide.

Published: Thu Nov 14 19:04:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resurgence of a Notorious Hacker: An Exclusive Interview with Mikhail "Mike" Shefel, aka Rescator


The Resurgence of a Notorious Hacker: An Exclusive Interview with Mikhail "Mike" Shefel, aka Rescator
In an exclusive interview, KrebsOnSecurity reveals the truth behind the identity of the notorious hacker known as Rescator, who was responsible for stealing payment card data from Target and Home Depot in 2013. Meet Mikhail "Mike" Shefel, a Russian cybercriminal with a troubled past and a penchant for evading detection.


Published: Thu Nov 14 23:25:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Active Exploitation of Two Vulnerabilities in Palo Alto Networks Expedition Firewalls


CISA has issued a warning about the active exploitation of two vulnerabilities in Palo Alto Networks Expedition firewalls. The vulnerabilities have been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, which requires Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates by December 5, 2024. Following an initial alert about a third vulnerability, this latest warning underscores the ongoing importance of staying up-to-date with security patches and the need for proactive risk mitigation strategies in network security.

Published: Fri Nov 15 00:38:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Millions of Sensitive Data Exposed: The Unintended Consequences of Misconfigured Microsoft Power Pages

Millions of sensitive data have been exposed to the public internet due to misconfigurations in Microsoft's Power Pages platform, a website creation service used by numerous organizations. This reveals significant security vulnerabilities and raises concerns about personal identifiable information.

Published: Fri Nov 15 01:50:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables


A high-severity flaw in PostgreSQL allows hackers to exploit environment variables, potentially leading to code execution or information disclosure. This vulnerability has been addressed in recent updates to the software, but organizations must take steps to mitigate its impact and prevent exploitation by hackers.

Published: Fri Nov 15 02:01:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Justice Has Been Served: Ilya Lichtenstein Sentenced to 5 Years for Role in Notorious Bitfinex Hack


In a significant development, Ilya Lichtenstein has been sentenced to 5 years in prison for his role in the notorious Bitfinex hack. The conviction marks a major milestone in the ongoing saga, which saw nearly $10.5 billion in bitcoin stolen from the platform. Read more about this case and its implications on financial crime prevention.

Published: Fri Nov 15 02:36:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Active Exploitation of Two Critical Palo Alto Networks Flaws


CISA has issued an alert warning of the active exploitation of two critical vulnerabilities in Palo Alto Networks Expedition software, CVE-2024-9463 and CVE-2024-9465. These vulnerabilities have been added to CISA's Known Exploited Vulnerabilities (KEV) catalog and require Federal Civilian Executive Branch agencies to apply the necessary updates by December 5, 2024. Users of Palo Alto Networks software should take immediate action to ensure that their systems are protected against these newly discovered threats.

Published: Fri Nov 15 02:53:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds Palo Alto Networks Expedition Bugs to its Known Exploited Vulnerabilities Catalog: A Comprehensive Analysis of the Exploited Vulnerabilities and Their Implications

U.S. CISA adds four vulnerabilities in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities catalog, highlighting the critical importance of patching vulnerability management for organizations utilizing PAN-OS firewalls.

Published: Fri Nov 15 04:21:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Identity Access Management: How Artificial Intelligence is Revolutionizing Cybersecurity

Artificial intelligence is transforming Identity Access Management, enabling enhanced monitoring, smarter anomaly detection, and adaptive access governance. Learn how AI is revolutionizing cybersecurity in our in-depth article on The Evolution of Identity Access Management: How Artificial Intelligence is Revolutionizing Cybersecurity.

Published: Fri Nov 15 05:50:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Exchange Server Security Update Stopped in Its Tracks: A Cautionary Tale of Testing Practices

Microsoft's latest security update for its Exchange server has hit a snag, with the company pausing its rollout due to unexpected issues related to transport rules and data loss protection. The pause is a cautionary tale about the importance of thorough testing practices when deploying major updates.

Published: Fri Nov 15 07:18:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft's "White House Offer": A Business Strategy Wrapped in Security Rhetoric

Microsoft's "White House Offer" was a calculated business strategy that used security rhetoric to drive revenue growth and increase its dominance in cybersecurity. A ProPublica investigation found that the company effectively locked federal customers into its products, undermining future competitions and increasing its market share.

Published: Fri Nov 15 07:37:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Vertex AI ML Platform Exposed to Privilege Escalation Risks: A Wake-Up Call for Cloud Security

Google's Vertex AI ML platform has been compromised by two significant security flaws, allowing malicious actors to escalate privileges and exfiltrate sensitive data from the cloud. This incident highlights the importance of robust cloud security measures and strict control over model deployments, emphasizing the need for organizations to stay vigilant and proactive in addressing potential vulnerabilities.

Published: Fri Nov 15 07:48:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mastering Certificate Management: Embracing Crypto Agility and Best Practices to Mitigate Revocation Disruptions

Mastering Certificate Management: Embracing Crypto Agility and Best Practices to Mitigate Revocation Disruptions

Learn how DigiCert's exclusive webinar can equip your organization with the knowledge to handle revocations like a pro, ensuring seamless continuity in operations and mitigating the risks associated with certificate management.

Published: Fri Nov 15 07:57:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Stealer Malware Emerges: Threat Actors from Vietnam Target Europe and Asia with PXA Stealer

A new piece of malware has emerged, targeting government and education entities in Europe and Asia with the PXA Stealer tool. This Python-based information-stealing malware targets sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software.

Published: Fri Nov 15 08:05:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Five Eyes Alliance Reveals the Top 15 Most Exploited Software Flaws of 2023



The Five Eyes nations have released their list of the top 15 most exploited software flaws of 2023, highlighting the importance of patching routine initial exploitation of zero-day vulnerabilities. The list includes several well-known companies, such as Citrix and Microsoft, that were targeted by attackers due to unpatched vulnerabilities.

In order to stay safe in today's digital world, it is essential for individuals and organizations alike to take proactive measures to protect themselves against cyber threats. This includes regularly updating software and systems with the latest security patches, using secure-by-design products, and being vigilant with vulnerability management.

By staying informed about the most exploited vulnerabilities and taking steps to patch them promptly, individuals and organizations can significantly reduce their risk of being compromised by malicious actors. The Five Eyes nations' list serves as a reminder that cybersecurity is an ongoing effort that requires constant attention and vigilance.



Published: Fri Nov 15 09:47:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT PULLS EXCHANGE SECURITY UPDATES OVER MAJOR MAIL DELIVERY ISSUES

Microsoft pulls November 2024 Exchange security updates over major mail delivery issues, with some admins reporting that email delivery has stopped altogether on servers using custom mail flow rules. The company is continuing the investigation into this issue and working on a permanent fix.

Published: Fri Nov 15 09:56:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Warns of Critical RCE Zero-Day Exploitation in Attacks


Palo Alto Networks Warns of Critical RCE Zero-Day Exploitation in Attacks
A critical zero-day vulnerability has been discovered in the Next-Generation Firewalls management interface, with threat activity currently exploiting it. To protect your network, take immediate action and secure your devices using the suggested mitigations.



Published: Fri Nov 15 10:08:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Simplifying Endpoint Security: A Unified Approach to Mitigate Complexities

Discover how unified endpoint management can transform your organization's security posture and reduce operational complexities. Register now for the upcoming webinar on November 20th to learn more about consolidating security tools into a single platform.

Published: Fri Nov 15 10:18:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Bitcoin Heist: A Five-Year Sentence for Ilya Lichtenstein


The Bitcoin heist mastermind Ilya Lichtenstein has been sentenced to five years in prison for his role in stealing close to 120,000 Bitcoin worth around $69 million. This high-profile case serves as a stark reminder of the risks associated with cryptocurrency transactions and highlights the need for improved cybersecurity measures among financial institutions.

Published: Fri Nov 15 10:53:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Security Concerns: The Pegasus Spyware Scandal and the Rise of Cyber Espionage


The NSO Group's Pegasus spyware has been at the center of several high-profile scandals in recent years, highlighting the risks of cyber espionage and the exploitation of vulnerable technologies. As the company continues to face scrutiny over its role in deploying the software, critics argue that its involvement is far more sinister than claimed by the company itself.

Published: Fri Nov 15 18:34:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Botnet Exploits GeoVision Zero-Day Vulnerability to Install Mirai Malware, Wreaking Havoc on IoT Devices

A critical zero-day vulnerability has been exploited by a botnet to install the notorious Mirai malware on 17,000 GeoVision devices, compromising their functionality and potentially leading to widespread disruption.

Published: Fri Nov 15 18:53:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unyielding Consequences of Cryptocurrency Crime: A 5-Year Sentence for a Bitfinex Hacker

Bitfinex hacker Ilya Lichtenstein has been sentenced to five years in prison for stealing 119,754 Bitcoins in a 2016 hack on the Bitfinex cryptocurrency exchange. The sentence marks a significant development in the ongoing efforts to combat cryptocurrency-related crimes and highlights the importance of robust cybersecurity measures.

Published: Fri Nov 15 19:05:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cryptocurrency Caper: A Tale of Money Laundering, Dark Web Deceit, and the Unraveling of a Cybercrime Empire

A 41-year-old Ohio man has been sentenced to three years in prison for his involvement in a complex cryptocurrency money-laundering scheme, which laundered an estimated $311 million in Bitcoin. The case highlights the challenges posed by cryptocurrency and dark web markets, and the importance of cooperation between government agencies, financial institutions, and other stakeholders in disrupting and dismantling such operations.

Published: Fri Nov 15 19:17:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of AI-Driven Robots: A Growing Concern for Robot Safety



A recent study has raised concerns about the vulnerability of AI-driven robots to jailbreaking, a process where malicious actors can trick a model into performing actions that are detrimental to its intended purpose. The researchers warn that this could have significant implications for robot safety, particularly in proprietary systems that may not have robust safety mechanisms in place. As the use of AI-driven robots becomes more widespread, it is essential that we address these concerns and develop effective measures to prevent their compromise.

Published: Fri Nov 15 19:30:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Firewalls Hit with Critical 0-Day Vulnerability, Exploitation Underway


Palo Alto Networks firewalls have been hit with a critical 0-day vulnerability that allows an unauthenticated attacker to remotely execute code. The company has issued urgent advice on how to secure networks and has announced plans to release patches and threat prevention signatures to help mitigate this threat.

Published: Fri Nov 15 19:58:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Shadow Looms: 171,000 AnnieMac Customers Exposed to Data Breach

171,000 AnnieMac customers exposed to data breach, with sensitive customer data including names and social security numbers compromised.

Published: Fri Nov 15 20:07:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of WezRat: Unveiling the Iranian Malware Threat


A new type of malware known as WezRat has been detected by cybersecurity company Check Point. Developed by Iranian state-sponsored actors, the malware is designed to conduct reconnaissance and execute malicious commands on compromised endpoints. With its sophisticated features and evasion techniques, WezRat poses a significant threat to organizations worldwide. Read more about this emerging threat in our latest article.

Published: Fri Nov 15 20:17:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Glove Stealer: A Sophisticated Malware Exploiting Chrome's App-Bound Encryption to Steal Cookies

Glove Stealer, a sophisticated .NET-based information stealer, has been discovered by researchers at Gen Digital. This malware targets browser extensions and locally installed software to steal sensitive data from infected systems. The malware could harvest a vast trove of data, including cookies, autofill, cryptocurrency wallets, 2FA authenticators, password managers, and email client information.

Published: Fri Nov 15 20:40:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Bitfinex Hack: A Cautionary Tale of Cryptocurrency Theft and Betrayal


The Bitfinex hack: A recent reminder of the dangers lurking within the world of cryptocurrency, Ilya Lichtenstein's case serves as a cautionary tale for those tempted by its allure. With his 5-year prison sentence, he sets an example that should be remembered by all those in this space.

Published: Fri Nov 15 21:07:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware via Swiss Postal Service: A Novel Vector for Cybercrime

Switzerland's National Cyber Security Centre (NCSC) has issued an alert about a novel vector of cybercrime, where malware is being spread through the country's postal service. Recipients have been tricked into downloading a malicious app that contains a variant of the Coper trojan. This attack highlights the evolving nature of threats and the need for vigilance among individuals and organizations.

Published: Sat Nov 16 03:32:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

PAN-OS Firewall Vulnerability Under Active Exploitation: A Growing Concern for Cybersecurity Professionals


Palo Alto Networks has confirmed that a new zero-day vulnerability in its PAN-OS firewall management interface is under active exploitation. This critical vulnerability allows for unauthenticated remote command execution on compromised devices, posing significant security risks to networks and systems. Experts recommend taking immediate action to secure firewall management interfaces and applying patches as soon as available.

Published: Sat Nov 16 03:48:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Uncovering the DeepDATA Malware: A Threat to Fortinet Users and the Unpatched Vulnerability

DeepDATA malware exploits unpatched vulnerability in Fortinet's VPN client on Windows, posing a significant threat to users who rely on unpatched software. Volexity reported the flaw to Fortinet in July 2024 but the company has yet to address the issue. The lack of transparency from Fortinet raises concerns among cybersecurity experts.

Published: Sat Nov 16 03:56:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Imperative of Crypto Agility: Navigating the Turbulent Landscape of Certificate Management

The Imperative of Crypto Agility: Navigating the Turbulent Landscape of Certificate Management

Published: Sat Nov 16 04:02:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Alternative to Rust: Fil-C, a Memory-Safe Flavor of C

Fil-C, a memory-safe variant of C, offers a compelling alternative to Rust by providing a 100% compatible solution for improved memory management without requiring significant changes to existing codebases.

Published: Sat Nov 16 05:13:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of High-Stakes Cybercrime: A Global Landscape of Intrigue and Exploitation



A new landscape of high-stakes cybercrime has emerged, with sophisticated hackers and cybercriminals using increasingly sophisticated methods to infiltrate secure systems and steal sensitive information. The Bitfinex hacker, who made off with approximately 120,000 bitcoin valued at around $71 million in August 2016, remains at large despite a five-year prison sentence for his accomplice. Meanwhile, AI-powered scams are being turned on their head by a new "AI granny" developed by British telecoms firm Virgin Media and its mobile operator O2, while a lawsuit has been filed against NSO Group's founders and executives over alleged hacking crimes. As cryptocurrency continues to grow in popularity, it is essential that individuals and organizations take proactive steps to protect themselves from these types of threats.

Published: Sat Nov 16 06:33:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Security Surveillance Firm NSO Group Found to Have Exceeded Control Over Customer-Operated Spyware


In a shocking revelation, court filings have revealed that NSO Group had minimal control over customers' use of its spyware, contradicting prior claims by the Israeli firm. A recent lawsuit between Meta-owned WhatsApp and NSO Group has shed light on the complex relationship between these two entities, revealing new insights into the nature of modern espionage.

Published: Sat Nov 16 06:55:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious GitHub Commits: A Smear Campaign Against Researchers and Open-Source Projects

Malicious GitHub commits have been used to frame researcher Mike Bell, while also infecting other open-source projects like Exo Labs and yt-dlp. Researchers must remain vigilant in their cybersecurity efforts to protect against such threats.

Published: Sat Nov 16 10:33:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

T-Mobile Telecoms Breach: A Growing Concern for Personal Data Security

T-Mobile confirms that it was hacked in a recent wave of telecom breaches conducted by Chinese threat actors known as Salt Typhoon, resulting in the theft of sensitive customer information. The breach is the ninth T-Mobile suffered since 2019 and highlights the need for robust security measures to be put in place.

Published: Sat Nov 16 12:44:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Confirms Active Exploitation of Recently Disclosed Zero-Day Vulnerability

Palo Alto Networks has confirmed that its PAN-OS firewall management interface has been actively exploited in the wild by threat actors who are using a zero-day vulnerability. To mitigate this risk, customers should restrict access to their management interface to specific internal IPs only.

Published: Sat Nov 16 13:08:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Sophisticated Botnet Attack: Unveiling the GeoVision Zero-Day Exploit


A sophisticated cyber attack has been carried out on a global scale, utilizing zero-day exploits to compromise high-value devices, including those no longer supported by their manufacturers. The attack, attributed to a botnet, has demonstrated its ability to target multiple geographic regions and organizations across various sectors. This article delves into the intricacies of the attack, exploring its potential motivations, methods, and impact on the global security landscape.

Published: Sun Nov 17 08:22:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cyber Wars: A Decade-Long Struggle for Digital Supremacy

A new decade of cyber warfare has begun, with nation-states, organized crime groups, and individual hackers continually adapting their tactics to evade detection and achieve their objectives. Researchers have discovered a zero-click Facebook account takeover, while a new SPIKEDWINE APT group is targeting officials in Europe.

Published: Sun Nov 17 10:36:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of Emerging Cyber Threats: Insights from the Frontlines

A growing number of IoT devices are being compromised by malicious actors, highlighting the need for increased security measures in this sector. Meanwhile, Apple has introduced a new feature designed to prevent exploitation of idle devices, while vulnerabilities continue to plague various platforms.

Published: Sun Nov 17 10:57:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

SVGs in Phishing: The Evolving Threat Landscape


SVGs have become a new tactic used by threat actors to evade detection when it comes to phishing emails. These Scalable Vector Graphics attachments are being used to create the illusion of legitimate emails from trusted sources, often with devastating consequences for users and organizations. Learn more about this emerging threat and how you can protect yourself in our latest article.

Published: Sun Nov 17 12:06:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in WordPress's Really Simple Security Plugin Exposes Millions of Websites to Hackers


A critical security flaw in a widely used WordPress plugin has left millions of websites vulnerable to hackers. The Really Simple Security (RSS) plugin, which provides important security features like SSL configuration and two-factor authentication, has been found to have a critical vulnerability that can be exploited en masse by remote attackers. With the potential for large-scale website takeover campaigns, it is essential for website administrators to take immediate action to secure their sites.



Published: Sun Nov 17 12:15:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Passwords: Will Passkeys Replace Them?


The future of passwords is a topic of much debate among security experts. With the rise of passkeys as a potential alternative, will traditional passwords become obsolete? Read on to find out how passkeys are changing the game in cybersecurity.

Published: Sun Nov 17 13:30:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Call to Arms: The Rise of Swatting and the Threats it Poses to Public Safety

A teenage cybercriminal has been caught for making hundreds of false emergency calls to law enforcement agencies across the US, putting lives at risk and causing widespread disruption. The case highlights the dangers of swatting, a tactic used by cybercriminals to extort money and cause harm to individuals.

Published: Sun Nov 17 19:05:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Authentication Bypass Vulnerability Exposes Over 4 Million WordPress Sites

A critical authentication bypass vulnerability has been disclosed in the Really Simple Security plugin for WordPress, exposing over 4 million sites to a potential security breach. The vulnerability allows unauthenticated attackers to login as arbitrary users, including administrators, when two-factor authentication is enabled.

Published: Sun Nov 17 23:16:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of WhatsApp: How NSO Group Used Zero-Day Flaws and Exploits to Install Pegasus Spyware, Despite WhatsApp's Best Efforts to Counter the Threat


NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit Reveals New Details on Israeli Spyware Vendor's Tactics


Published: Mon Nov 18 01:40:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability Exposes 4 Million WordPress Sites to Remote Attack


Critical Really Simple Security plugin flaw impacts 4M+ WordPress sites, allowing attackers to remotely gain full admin access. This is one of the most critical WordPress vulnerabilities ever discovered, with a CVSS score of 9.8. The vulnerability affects Really Simple Security, formerly known as Really Simple SSL, installed on over 4 million websites, and allows an attacker to bypass authentication and gain access to arbitrary accounts on sites running the plugin. Security updates were released on November 12 for Pro users and November 14 for free users. WordPress.org coordinated force updates for most users, but admins should verify they are on the latest version.



Published: Mon Nov 18 03:13:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

GDPR Enforcement: A Global Perspective - Strengthening Data Security in an Era of Increased Scrutiny


Increased GDPR Enforcement Highlights the Need for Data Security: A Global Perspective
As governments around the world intensify their scrutiny on data protection, companies are facing increasing pressure to comply with stringent data privacy laws. The recent case involving Uber serves as a powerful reminder of the severe consequences for non-compliance, and highlights the need for stronger data security measures.


Published: Mon Nov 18 04:36:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Landscape of Cybersecurity Threats: A Comprehensive Analysis



The cybersecurity threat landscape is constantly evolving, with new vulnerabilities and exploits emerging on a daily basis. In this article, we will delve into the recent developments in the world of cybersecurity, highlighting the most pressing threats, tools, and practices that organizations must adopt to stay ahead of the game. From the exploitation of unpatched Fortinet's FortiClient for Windows to the "Sitting Ducks" attack scheme, we'll explore it all and provide valuable guidance on how to stay ahead of emerging threats.

Published: Mon Nov 18 06:22:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Frontier in Email Security: Google's Shielded Email Feature and the Battle Against Spam

Google has introduced its latest innovation – Shielded Email – allowing users to create unique, single-use email addresses that forward messages to their primary account, thus eliminating the need for divulging one's real email address. This feature is part of a broader trend by tech companies to enhance online security and privacy measures.

Published: Mon Nov 18 06:30:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Necessity of Year-Round Network Pen Testing: A Case for Automated Solutions


The importance of year-round network pen testing cannot be overstated, as hackers do not wait for compliance schedules to strike. In this article, we will delve into the world of automated network penetration testing and explore its benefits, challenges, and advantages over traditional methods.

Published: Mon Nov 18 06:41:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information: A Threat Actor's Cunning Scheme

Black Friday has become a haven for scammers and cybercriminals looking to hijack shopper information. Fake discount sites are using various tactics to deceive visitors into providing sensitive information, posing a significant threat to consumer safety. Learn more about this scheme and how to protect yourself from falling victim to these malicious attacks.

Published: Mon Nov 18 06:52:18 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious Exploitation of Microsoft 365 Admin Portal's Personal Message Field: A Vulnerability to Sextortion Scams


Microsoft 365 Admin Portal has been found vulnerable to abuse by scammers, who use its Personal Message feature to send extortion-themed emails to unsuspecting users. These scams can bypass email security filters due to a limit of 1,000 characters in personal messages, which can be circumvented using browser developer tools. As Microsoft takes steps to prevent such incidents, it is essential for users to remain cautious and report any suspicious activity.

Published: Mon Nov 18 09:46:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Staying Ahead of the Threats: The Importance of Linux Security in a Rapidly Evolving Landscape


Join Red Hat for the State of Linux Security Symposium 2024 on December 10th at 10am PT/1pm ET. Gain a deeper understanding of Linux security and take proactive steps in securing your infrastructure.

Published: Mon Nov 18 09:54:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Permissioning in the Modern Era: A Shared Responsibility Model for Developers and Security Teams

The use of permissions can become an overwhelming task, especially in complex systems like Amazon Web Services or GitHub. The lack of clear documentation and communication between developers and security teams can lead to security breaches and exposed secrets. In this article, we'll explore the challenges of permissioning in modern software development and propose a shared responsibility model for developers and security teams to ensure seamless collaboration.

Published: Mon Nov 18 10:04:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Breach of Trust: A Glimpse into the World of Cyber Espionage and the Library of Congress


A recent breach has exposed sensitive information held by the respected institution of The Library of Congress. An alleged foreign adversary gained access to email communications between congressional offices and some library staff, highlighting the importance of cybersecurity and the need for proactive measures to protect institutions from cyber threats.

Published: Mon Nov 18 10:27:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

SSweden Unveils Comprehensive Crisis and War-Survival Guide Amid Escalating Global Tensions


Sweden has released an updated guide to help its citizens prepare for various types of crisis situations or wartime, including armed conflicts, terrorism, cyberattacks, and extreme weather events. With NATO membership and increasing global tensions, this comprehensive guide is a crucial step towards securing the country's independence and democracy.

Published: Mon Nov 18 11:45:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Wake-Up Call: VMware vCenter Server RCE Bug Exploited in Attacks

VMware vCenter Server RCE bug exploitation highlights the need for timely patching and robust security controls as threat actors increasingly target critical vulnerabilities in enterprise environments.

Published: Mon Nov 18 13:14:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Stealthy Malware Loader Spotted: BabbleLoader Delivers WhiteSnake and Meduza Stealers


A new stealthy malware loader called BabbleLoader has been spotted delivering WhiteSnake and Meduza stealers, making it a significant threat to cybersecurity professionals and organizations. According to Intezer researchers, the loader is designed to bypass antivirus and sandbox environments with ease, using a range of evasion techniques to evade detection.

Published: Mon Nov 18 13:28:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exposé Revealed: A Glimpse into the Shadows of Corporate Espionage - Maxar's Employee Data Breach

Maxar Space Systems, a leading US space tech giant, has disclosed a significant employee data breach, exposing personal information of its employees. The breach highlights the need for vigilance and proactive measures in securing one's digital footprint and serves as a poignant reminder of the ever-present dangers lurking within the realm of cyber threats.

Published: Mon Nov 18 16:23:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Patches Critical Firewall Zero-Days: A Warning to Enterprise Networks


Palo Alto Networks has issued critical security updates to address two actively exploited zero-day vulnerabilities in its PAN-OS management web interface. The patches aim to mitigate the risk of remote attackers exploiting these flaws to gain unauthorized access to firewall systems.

Published: Mon Nov 18 16:35:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phobos Ransomware Gang Administrator Faces Serious Cybercrime Charges in US Indictment


US charges Phobos ransomware admin after South Korea extradition: A major blow to the global cybercrime community, a US indictment alleges that Evgenii Ptitsyn, a Russian national and suspected administrator of the Phobos ransomware operation, was extradited from South Korea and is facing serious cybercrime charges in the United States. The Phobos ransomware gang has been linked to breaches of over 1,000 public and private entities worldwide, resulting in significant financial losses for victims and cementing its position as a major player in the global cybersecurity threat landscape.

Published: Mon Nov 18 16:42:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical VMware vCenter RCE Bug Exploited After Broadcom's Patch Fumble

Critical VMware vCenter RCE Bug Exploited After Broadcom's Patch Fumble: A Stark Reminder of the Risks Associated with Third-Party Software

Published: Mon Nov 18 17:03:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

T-Mobile US Caught Up in Industry-Wide Cyber Espionage Campaign

US telcos including T-Mobile US are under attack by a sophisticated Chinese hacking group known as Salt Typhoon, with potential implications for national security and data protection. As the situation unfolds, it's clear that cybersecurity threats must be taken very seriously.

Published: Mon Nov 18 17:22:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exploitation of VMware vCenter Server Vulnerabilities: A Growing Concern for Cybersecurity



Recently disclosed VMware vCenter Server bugs are actively exploited in attacks, prompting a call to action for organizations to prioritize their cybersecurity efforts. The vulnerabilities, CVE-2024-38812 and CVE-2024-38813, have been actively exploited by threat actors, emphasizing the need for immediate attention from organizations that rely on vCenter Server.



Published: Mon Nov 18 17:47:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Hackers' Exploitation of Fortinet VPN Zero-Day: A Threat to Corporate Networks

Chinese hackers have exploited a zero-day vulnerability in Fortinet's FortiClient Windows VPN client to steal sensitive credentials, leaving many organizations on high alert. This vulnerability was first discovered by Volexity researchers earlier this summer but remains unfixed despite being reported to Fortinet. The implications of this vulnerability are significant, and it is essential for users and organizations to take proactive steps to protect against this threat.

Published: Mon Nov 18 18:59:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ford Motor Company Hit by Alleged Data Breach, Employee Records Stolen and Dumped on Cyber Crime Forum



Ford Motor Company has reportedly been hit by a data breach, with attackers claiming to have stolen an internal database containing 44,000 customer records. The incident is believed to have occurred in the past month, with the attackers allegedly using the IntelBroker moniker, another well-known BreachForums participant. Maxar Space Systems has also been affected, with attackers claiming to have stolen personal data from employees. These incidents highlight the growing threat of cybercrime and emphasize the importance of robust cybersecurity measures.



Published: Mon Nov 18 19:21:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shifting Landscape of Cybersecurity: As Vulnerabilities Emerge, CISA Sounds the Alarm

Cybersecurity leaders must stay informed about actively exploited vulnerabilities in prominent platforms such as Progress Kemp LoadMaster and VMware vCenter Server. CISA has issued warnings regarding these threats, emphasizing the importance of remediation by December 9, 2024. Organizations must prioritize proactive risk management strategies to mitigate potential breaches.

Published: Tue Nov 19 01:24:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Firewall Vulnerability Under Active Exploitation: A Critical Alert for Cybersecurity Professionals


In a critical alert, Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS firewall management interface that is currently being actively exploited. This vulnerability allows an attacker with network access to gain administrator privileges on the firewall, thereby gaining control over its configuration and operation.

Published: Tue Nov 19 01:39:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apple's Secret iOS 18 Reboot Feature: A Game-Changer for Cybersecurity

Apple's latest mobile operating system, iOS 18, has a secret security feature that reboots devices after three days of inactivity. This feature has significant implications for anyone trying to access data on Apple's hardware, and raises questions about how such a sophisticated security measure was implemented without official announcement from the company.

Published: Tue Nov 19 03:03:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Widespread Cyber Espionage Campaign Targeting U.S. Telecoms: A Threat to National Security?



A sophisticated cyber espionage campaign targeting major U.S. telecom companies has been linked to Chinese threat actors known as Salt Typhoon or Earth Estries. The attack, which has been ongoing for several months, aims to harvest cellphone communications of high-value intelligence targets. As the investigation into the extent of the compromise continues, it is crucial to understand the tactics, techniques, and procedures employed by these threat actors to prevent future attacks.



Published: Tue Nov 19 03:20:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Active Exploitation of Critical Vulnerabilities: A Warning for Enterprise Security

Recent updates from CISA highlight critical vulnerabilities in VMware vCenter Server and Progress Kemp LoadMaster that have come under active exploitation. Organizations must prioritize patching and monitoring systems to protect against these threats.

Published: Tue Nov 19 03:38:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The U.S. CISA Adds Progress Kemp LoadMaster, Palo Alto Networks PAN-OS, and Expedition Bugs to Its Known Exploited Vulnerabilities Catalog



The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, which includes CVE-2024-1212, CVE-2024-0012, and CVE-2024-9474. These vulnerabilities pertain to the Progress Kemp LoadMaster, Palo Alto Networks PAN-OS, and Expedition software respectively, and pose significant security risks to organizations handling sensitive data or operating critical infrastructure. Organizations are advised to review the catalog and address these vulnerabilities by December 5, 2024.

Published: Tue Nov 19 04:02:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of the Great Plains Regional Medical Center Ransomware Attack: A Cautionary Tale for Healthcare Organizations

Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals, exposing sensitive information. A recent data breach has highlighted the need for healthcare organizations to prioritize their cybersecurity posture to protect patient data.

Published: Tue Nov 19 04:22:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

SANS Institute Launches 2024 Holiday Hack Challenge: A Festive Cybersecurity Extravaganza

The SANS Institute launches its highly anticipated 2024 Holiday Hack Challenge, offering a unique format and inclusive design to test participants' skills in a series of progressive gamified cyber challenges.

Published: Tue Nov 19 05:46:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Insidious Role of Fusion Centers in Undermining Sanctuary City Protections: A National Security Threat in Disguise

ICE Can Already Sidestep Sanctuary City Laws Through Data-Sharing Fusion Centers

Published: Tue Nov 19 05:59:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems: A Growing Concern for Cybersecurity


New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems: A Growing Concern for Cybersecurity

A new ransomware variant, Helldown, has been expanding its attacks to include VMware and Linux systems. This development comes as part of an evolving trend of ransomware groups diversifying their capabilities. The threat landscape continues to evolve at an unprecedented pace, with new ransomware groups emerging and diversifying their capabilities. Stay informed about the latest developments in the field and adapt your strategies accordingly to protect against such threats.



Published: Tue Nov 19 06:35:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT UNVEILS ZERO DAY QUEST: A MAJOR INVESTMENT IN ARTIFICIAL INTELLIGENCE SECURITY RESEARCH

Microsoft has launched Zero Day Quest, a major new initiative aimed at improving AI security through collaboration with top security researchers and providing substantial rewards for discoveries. With an additional $4 million in potential awards, the event is expected to have far-reaching benefits for both Microsoft and its customers.

Published: Tue Nov 19 08:13:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils New Windows Resiliency Initiative to Mitigate Future Security Incidents

Microsoft has unveiled a new Windows Resiliency Initiative aimed at improving the operating system's security and reliability in response to a recent high-profile incident involving CrowdStrike. The initiative includes several key features, including Quick Machine Recovery, enhanced deployment practices from security vendors, and improved resiliency measures within Windows itself.

Published: Tue Nov 19 08:33:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Zero Day Quest: A $4 Million Hacking Event to Fortify Cloud and AI Security


Microsoft has launched its latest initiative, Zero Day Quest, a $4 million hacking event designed to fortify the security of Microsoft's cloud and AI products and platforms. With the backing of Microsoft's Secure Future Initiative, this ambitious program brings together security researchers and experts from around the world to tackle emerging threats.

Published: Tue Nov 19 08:55:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Navigating Third-Party Risks: A Critical Security Imperative for Modern Organizations

Navigating Third-Party Risks: A Critical Security Imperative for Modern Organizations

As organizations increasingly rely on third-party contractors, vendors, and service providers to deliver critical services and support, the security risks associated with these external relationships have become a top priority. Learn how to identify vulnerable access points, implement effective access controls, and establish a culture of compliance and security in this special webinar hosted by SailPoint.

Published: Tue Nov 19 09:03:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A BEC Scheme of Unparalleled Cunning: A $250,000 Heist that Highlighted the Perils of Wire Transfers


A Business Email Compromise (BEC) scheme targeted iLearningEngines, an e-learning automation platform provider for educational institutions, resulting in a $250,000 loss. This incident highlights the perils of wire transfers and underscores the importance of robust cybersecurity measures, vigilant employee awareness, and effective incident response protocols.

Published: Tue Nov 19 09:17:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nsioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices: A Growing Threat to Cybersecurity



The Nsioweb botnet has been found to fuel a notorious residential proxy service called NSOCKS, which is being used to exploit vulnerable IoT devices and compromise user privacy. With its arsenal of vulnerabilities and zero-days, the malware poses a significant threat to cybersecurity, highlighting the need for increased vigilance and proactive measures to protect against cyber threats.

Published: Tue Nov 19 09:26:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Uncovering the Dark Web: A Threat Landscape Reborn



A new wave of threats has emerged, targeting unsuspecting organizations worldwide with a range of vulnerabilities including two actively exploited Palo Alto flaws, a malicious campaign using Jupyter Notebooks to stream pirated sports broadcasts, and a range of other security vulnerabilities. As the threat landscape continues to evolve at an ever-present pace, it is essential for organizations to stay vigilant and proactive in addressing these risks.



Published: Tue Nov 19 09:34:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Threats Requires a New Approach to Privileged Access Security


The Evolving Threat Landscape: Why Privileged Access Security Must Be a Top Priority
As cyber threats continue to evolve and become increasingly sophisticated, organizations must recognize the critical importance of securing privileged access to their systems and data. A new report highlights the limitations of traditional Privileged Access Management (PAM) solutions and emphasizes the need for a comprehensive security-first approach to protecting sensitive assets.



Published: Tue Nov 19 09:42:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Helldown Ransomware Operation: A Growing Concern for Corporate Networks


The Helldown ransomware operation has been making headlines for its exploits against corporate networks through vulnerabilities in Zyxel firewalls, allowing attackers to steal data and encrypt devices. With 31 victims listed on its recently-renewed extortion portal as of November 7, 2024, this group is growing concern for corporate networks, highlighting the need for vigilance and proactive measures to prevent attacks.

Published: Tue Nov 19 11:42:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Disrupting the Shadows: The Crackdown on Ngioweb's Residential Proxy Botnet


A major breakthrough in the fight against cybercrime has been achieved with the disruption of Ngioweb's residential proxy botnet. Lumen's Black Lotus Labs successfully tracked the botnet's operations, identifying key components and disrupting its ability to operate. The incident highlights the need for improved security measures in proxy services and serves as a stark reminder of the importance of cybersecurity awareness.



Published: Tue Nov 19 12:02:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Empowering Gemini: A Paradigm Shift in Malware Analysis with Code Interpreter and Google Threat Intelligence

Google's latest advancements in Gemini, a cutting-edge malware analysis tool, now empowers autonomous interpretation of obfuscated elements and contextualization of external references. By integrating Code Interpreter and GTI function calling, Gemini significantly enhances its capabilities to address complex samples, marking a paradigm shift in threat intelligence automation.

Published: Tue Nov 19 12:13:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacked Testimony from Accusers of Matt Gaetz: A Shocking Revelation



In a shocking revelation, an unknown hacker has obtained a copy of testimony from a woman who was 17 years old when she allegedly had sex with Matt Gaetz in 2017. The hacked documents include corroborating evidence and potentially damaging testimony against Gaetz, raising questions about the validity of his nomination as Attorney General. As the situation unfolds, experts warn that the leaked information could have far-reaching consequences for Gaetz's career and reputation.

Published: Tue Nov 19 12:24:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Amazon Shaves 62% Off Blink Outdoor 4 Home Security Cameras Bundle on Black Friday


Amazon has launched its Black Friday sales with significant discounts across various categories, including a substantial price cut on Blink Outdoor 4 Home Security Cameras. For just $99, users can get a three-camera bundle for an astonishing 62% off the regular retail price of $260, making this an excellent opportunity to upgrade or enhance home security systems.

Published: Tue Nov 19 12:32:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Patches Critical Firewall-Busting Zero-Day Vulnerabilities

Palio Alto Networks has patched two critical firewall-busting zero-days that have been used in conjunction with each other to gain superuser access, highlighting the need for customers to take urgent action to protect their networks.

Published: Tue Nov 19 12:44:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exploitation of America's Digital Surveillance Machine: A Threat to Sanctuary City Laws and Civil Liberties


The Trump administration's plans to crack down on immigration are likely to exacerbate the exploitation of fusion centers by ICE, leading to a further erosion of sanctuary city laws and civil liberties. As the country grapples with the implications of this revelation, it is essential that lawmakers take action to address the problem and protect the rights of all Americans.

Published: Tue Nov 19 12:53:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Shadows: Unraveling the DeepData Malware Campaign



A recent discovery has shed light on a sophisticated cybercrime campaign involving China-linked threat actors. The DeepData malware, a custom post-exploitation toolkit, exploits a zero-day vulnerability in FortiClient VPN software to steal sensitive information from infected systems. This incident highlights the need for vigilance and awareness among individuals and organizations in the face of emerging threats.



Published: Tue Nov 19 13:21:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness Ignited: Ford Investigates Alleged Data Breach After 44,000 Customer Records Leaked on Hacking Forum


Ford Motor Company is under investigation after 44,000 customer records were leaked on a hacking forum. The leaked dataset contains sensitive information about Ford customers, and the company is taking steps to mitigate the risks associated with this potential data exposure.


Published: Tue Nov 19 14:54:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Oracle Warns of Exploited Agile PLM File Disclosure Flaw: A Critical Security Alert for Business and Enterprise Customers


Oracle has issued a critical security alert warning its business customers about an actively exploited file disclosure flaw in its Agile Product Lifecycle Management (PLM) software. The vulnerability, tracked as CVE-2024-21287, was discovered by CrowdStrike researchers Joel Snape and Lutz Wolf, and it has been found to be actively exploited in attacks. Oracle urges its customers to install the latest version of the software as soon as possible. The discovery highlights the growing threat landscape in enterprise software vulnerabilities and underscores the importance of regular software updates and proactive cybersecurity measures.

Published: Tue Nov 19 15:06:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Hotpatch Technology for Windows 11 24H2 and Windows 365

Microsoft has announced that hotpatching technology is now available in preview on Windows 11 24H2 and Windows 365 devices. This new feature allows security updates to be downloaded and installed without requiring a reboot, resulting in improved system performance and enhanced security.

Published: Tue Nov 19 15:13:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Third of America's Drinking Water Systems Lacking Basic Cybersecurity Measures

A third of America's drinking water systems are failing to meet basic cybersecurity standards, leaving millions of people vulnerable to cyber threats. The Environmental Protection Agency has acknowledged the issues and promised to take action, but more needs to be done to protect the nation's critical infrastructure.

Published: Tue Nov 19 15:44:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zero-Day Vulnerabilities Exposed: Apple Takes Swift Action to Protect Intel-Based Mac Users


Apple has fixed two zero-day vulnerabilities in its operating systems, CVE-2024-44308 and CVE-2024-44309, which were exploited in attacks on Intel-based Mac systems. The company has released emergency security updates for macOS Sequoia 15.1.1, iOS 17.7.2, and iPadOS 17.7.2, addressing the vulnerabilities in both its operating systems and other Apple products.

Published: Tue Nov 19 17:29:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Issues Warning: Progress Kemp LoadMaster Flaw Exploited in Wild Attacks

Progress Kemp LoadMaster flaw exploited in wild attacks, according to a recent warning issued by the US Cybersecurity & Infrastructure Security Agency (CISA). The critical OS command injection vulnerability allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Published: Tue Nov 19 17:49:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Zero-Day Exploit in Fortinet's Windows VPN Client: Implications for Global Security

A critical zero-day vulnerability has been discovered in Fortinet's Windows VPN client, allowing a China-linked group called BrazenBamboo to steal sensitive information. The bug remains unresolved, leaving users vulnerable to attacks until a patch is issued by Fortinet.

Published: Tue Nov 19 18:09:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Ringleader Evgenii Ptitsyn Extradited to US, Facing Over a Century Behind Bars for Extortion Scheme

Russian citizen Evgenii Ptitsyn has been extradited from South Korea to the United States on charges related to his alleged role in the Phobos ransomware operation. He faces over a century behind bars if convicted, including 13 crimes such as wire fraud conspiracy and computer extortion.

Published: Tue Nov 19 18:27:28 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Cybercrime: A Global Threat to National Security and Economic Stability

Phobos Ransomware admin faces cybercrime charges as global threats to cybersecurity continue to mount, with state-sponsored attacks on telecom firms like T-Mobile demonstrating the growing need for international cooperation and robust cybersecurity measures.

Published: Tue Nov 19 18:45:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Finastra Data Breach: The Alleged Theft of Sensitive Financial Information by a Sophisticated Cybercriminal

Finastra, a leading fintech company, is investigating a large-scale data breach allegedly carried out by a sophisticated cybercriminal known as abyss0. The breach involves sensitive financial information stolen from Finastra's internal file transfer platform, and the company has implemented alternative solutions to mitigate any impact on its customers. As this story continues to develop, it will be essential to evaluate the scope and severity of the incident and its potential long-term consequences.

Published: Tue Nov 19 20:01:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach at Equinox: A Case Study in Cybersecurity Failures


Equinox, a New York State health and human services organization, has been hit with a high-profile data breach. The incident, which occurred nearly seven months ago on April 29, has left the organization with no choice but to notify over 21 thousand clients and staff of the theft of their sensitive information. To read more about this incident and its implications for healthcare organizations, please see our in-depth article on Equinox's data breach.

Published: Tue Nov 19 20:10:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unregulated Data Brokers Pose a Clear Threat to National Security: The Unseen Surveillance State



A new form of espionage has emerged, one that utilizes unregulated commercial data brokers to gather sensitive information about US servicemembers. A recent investigation has revealed that US defense officials have been aware of this threat since at least 2016 but have failed to take adequate action to address it. The industry poses a clear threat to national security and more needs to be done to protect the personal data of brave members of the armed forces who serve in harms' way around the world.

Published: Tue Nov 19 22:41:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Double Blow to Apple's Security: Two Actively Exploited Zero-Day Flaws Patches



Apple has released security updates for iOS, iPadOS, macOS, visionOS, and Safari to address two actively exploited zero-day flaws. The vulnerabilities were identified as CVE-2024-44308 and CVE-2024-44309 and have been attributed to highly-targeted government-backed or mercenary spyware attacks. Users are advised to update their devices to the latest version to minimize potential threats.



Published: Tue Nov 19 23:54:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Oracle Warns of High-Severity PLM Vulnerability Under Active Exploitation

Oracle has warned that a high-severity security flaw in its Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild, allowing attackers to leak sensitive information. The vulnerability, tracked as CVE-2024-21287 with a CVSS score of 7.5, is considered remotely exploitable and can be attacked over a network without requiring authentication credentials.

Published: Wed Nov 20 00:05:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data: The Double-Edged Sword of Organizational Growth


The world of big data has become increasingly complicated, with organizations struggling to manage their digital assets. The shift in perspective from "data is the new oil" to recognizing the challenges associated with concentrated data poses significant implications for organizational security posture.

Published: Wed Nov 20 02:16:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

China-Linked Cyber Espionage: Liminal Panda Threats Telecom Networks Across South Asia and Africa

China-linked cyber espionage group Liminal Panda targets telecom networks across South Asia and Africa, compromising networks through exploited protocols and weak passwords. Experts warn of increasing vulnerabilities in telecommunications infrastructure due to the growing threat from state-sponsored actors.

Published: Wed Nov 20 02:25:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exploitation of Unsecured JupyterLab and Jupyter Notebooks Servers: A Threat to Cybersecurity and Data Integrity



Uncovering the Exploitation of Unsecured JupyterLab and Jupyter Notebooks Servers for Illegal Streaming of Sports Events: A Threat to Cybersecurity and Data Integrity

The recent discovery by security firm Aqua highlights a previously unknown vulnerability in unsecured JupyterLab and Jupyter Notebook servers, which have been exploited by threat actors to hijack environments, deploy streaming tools, and illegally redistribute live sports broadcasts. This article delves into the details of this newly revealed threat, exploring its implications for cybersecurity, data integrity, and the potential risks faced by organizations utilizing these platforms.



Published: Wed Nov 20 02:46:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Decades-Old Security Vulnerabilities Exposed: Needrestart Package Left Unpatched for Years


A recently discovered security vulnerability in the needrestart package on Ubuntu Server poses a significant risk to system integrity and security. The five flaws found in the needrestart package are trivial to exploit and could allow a local attacker to gain root privileges without requiring user interaction. Update now to ensure your systems remain secure.


Published: Wed Nov 20 03:59:26 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Underbelly of Social Media: How AI-Generated Influencers Are Disrupting the Lives of Human Creators

AI-generated influencers are flooding social media platforms like Instagram, stealing videos from real models and adult content creators, and monetizing their bodies with links to dating sites and AI apps. The phenomenon, known as "AI pimping," raises serious questions about the future of social media and the impact on human creators.

Published: Wed Nov 20 05:39:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Navigating the Complex Landscape of Non-Human Identity Detection and Response (NHIDR) for Enhanced Cybersecurity


Non-human identities have become a significant vulnerability in modern cybersecurity, with attackers exploiting them to move laterally across systems and compromise sensitive data. To address this growing threat, Entro has developed Non-Human Identity Detection and Response (NHIDR), a cutting-edge technology that empowers organizations to proactively detect and respond to NHIDR breaches.

Published: Wed Nov 20 05:46:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Alice in Wonderland: The Double Exploitation of Zero-Day Vulnerabilities by Apple


Apple has released security updates to address two actively exploited zero-day vulnerabilities in its operating systems and browser software. These vulnerabilities, identified by researchers from Google's Threat Analysis Group, have been used to exploit users' devices for malicious purposes. By updating their software to the latest versions, users can protect themselves against these threats.

Published: Wed Nov 20 06:07:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ford Investigates Alleged Customer Data Leak Following Breach on Hacking Forum

Ford Motor Company is investigating allegations of a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. The leaked data contained sensitive information about Ford customers, including their names, physical locations, purchase details, dealer information, and record timestamps. While the exposure is not considered extremely severe, it still poses risks to individuals whose personal information was compromised.

Published: Wed Nov 20 07:49:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Ghost Tap Malware: A New Vector for Cybercriminals to Cash Out Stolen Funds via Mobile Payments


Cybercriminals are exploiting NFC technology to cash out stolen funds via mobile payments using a new malware campaign dubbed "Ghost Tap." This attack vector leverages legitimate research tools to relay NFC traffic, allowing cybercriminals to bypass anti-fraud mechanisms and make large-scale fraudulent transactions. Experts warn that this campaign poses significant challenges for financial institutions and retailers alike, highlighting the need for robust security measures to prevent such attacks.

Published: Wed Nov 20 08:06:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Unveils Comprehensive Windows Resiliency Initiative to Enhance Security and System Integrity

Microsoft has launched a comprehensive Windows Resiliency Initiative aimed at bolstering the security and reliability of its Windows operating system. The initiative includes new features such as Quick Machine Recovery, hardware-backed security baselines, and support for passkeys in Windows Hello.

Published: Wed Nov 20 08:23:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

D-Link Issues Urgent Warning: Replace Vulnerable Routers or Risk Being "Pwnage," Experts Say

D-Link has issued a warning to its customers, advising them to replace their vulnerable VPN routers due to a serious remote code execution (RCE) vulnerability. The company is urging its customers to upgrade to new devices or retire and replace their old routers altogether in order to avoid being targeted by malicious actors.

Published: Wed Nov 20 09:44:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Breaches Confidential Documents Tied to Matt Gaetz's Sexual Misconduct Allegations


Matt Gaetz's reputation is under scrutiny once again as a hacker allegedly obtained confidential documents tied to sexual misconduct allegations against him. The breach highlights the importance of maintaining robust security measures to protect sensitive information from unauthorized access.



Published: Wed Nov 20 11:04:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resilience of Change Healthcare: A Nine-Month Odyssey to Restore Clearinghouse Services

Change Healthcare, a leading healthcare clearinghouse services provider, has successfully restored its clearinghouse services after an unprecedented nine-month ordeal following a devastating ransomware attack. The organization's remarkable recovery story is a testament to the resilience of healthcare providers and highlights the critical importance of robust cybersecurity measures in protecting sensitive data.

Published: Wed Nov 20 13:12:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's AI-Powered Bug Hunting Project Identifies 26 Vulnerabilities in Code Repositories

Google's AI-powered bug hunting project, OSS-Fuzz, has identified 26 vulnerabilities in code repositories, including a critical flaw in OpenSSL. The use of large language models (LLMs) has proven to be highly effective in identifying bugs that humans would have otherwise missed.

Published: Wed Nov 20 13:22:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Charges Five Suspects Linked to Scattered Spider Cybercrime Gang: A Sophisticated Threat Actor Group Exploiting Vulnerabilities in Corporate Networks


US Charges Five Suspects Linked to Scattered Spider Cybercrime Gang
The US Justice Department has charged five suspects with conspiracy to commit wire fraud, wire fraud conspiracy, and aggravated identity theft in connection with their alleged involvement in the financially motivated Scattered Spider cybercrime gang. The group is known for its sophisticated social engineering attacks, phishing/smishing attacks, and SIM swap tactics, which have targeted dozens of individuals and companies worldwide.

Published: Wed Nov 20 14:54:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Finastra's Fiasco: A Cautionary Tale of SFTP Security

A recent data breach on Finastra's SFTP system has raised concerns about customer data security, highlighting the need for robust cybersecurity measures in today's digital landscape. As the investigation continues, experts will be watching closely to see how Finastra responds and takes steps to prevent similar breaches in the future.

Published: Wed Nov 20 16:30:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Data Breach Exposed: The Ford Motor Company's Third-Party Supplier Mishap


In a shocking revelation, Ford Motor Company was recently at the center of a high-profile data breach incident. According to reports, threat actors IntelBroker and EnergyWeaponUser claimed to have stolen sensitive customer information from Ford's systems. The breach appears to involve a third-party supplier, highlighting the complexities of modern supply chain vulnerabilities.

Published: Wed Nov 20 16:49:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Web of Influence: How Microsoft's White House Offer Shaped the Government's Cybersecurity Landscape

A ProPublica investigation has revealed that Microsoft's White House Offer, a $150 million technical services deal with the federal government, was more than just a public relations victory for the Biden administration. The agreement, which provided free cybersecurity upgrades to federal agencies, was a carefully crafted business maneuver designed to increase Microsoft's market share and profit from its dominance in the IT industry.

Published: Wed Nov 20 18:03:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The National Security Risks of US Tech Companies' Activities in China: A Growing Concern



The recent warning from Senator Richard Blumenthal (D-CT) that American tech companies’ activities in China represent a national security risk is not an isolated incident. The senator's statement, made during a hearing titled "Big Hacks & Big Tech: China’s Cybersecurity Threat", highlights the dangers of extensive economic ties between the US and China, which can be exploited by Beijing to compromise American security.

Blumenthal's warning is particularly timely given the increasing reliance of the Pentagon on SpaceX services. Tesla makes half of its cars and as much as a third of its sales in China, with Elon Musk pledging to uphold "core socialist values" in China. This has raised concerns about the potential for Chinese espionage to influence American policy.

The recent warning from Senator Richard Blumenthal highlights a growing concern about the national security risks posed by US tech companies' activities in China. It also underscores the need for greater scrutiny of these companies' ties to Beijing and their potential role in compromising American security.

Published: Wed Nov 20 18:18:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Five Suspects Behind the Scattered Spider Ransomware Attack: A Web of Deception and Cybercrime

The United States Department of Justice has issued an indictment against five individuals accused of masterminding a sophisticated phishing campaign that stole millions in cryptocurrency. The suspects, believed to be part of notorious cyber-gang Scattered Spider, have been charged with various counts of conspiracy, wire fraud, and aggravated identity theft.

Published: Wed Nov 20 20:17:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack at French Hospital Exposes Sensitive Health Data: A Threat to Patient Confidentiality


A cyberattack at a French hospital has exposed the sensitive health data of over 750,000 patients, highlighting the vulnerabilities of healthcare systems to digital threats and the importance of robust cybersecurity measures in protecting patient confidentiality. In this article, we will delve into the details of the breach, its causes, and the potential consequences for those affected.



Published: Wed Nov 20 21:30:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Japan's National Consumer Affairs Center Urges Citizens to Include Passwords in Their Wills



Japan's National Consumer Affairs Center has issued a call-to-action urging citizens to include their usernames and passwords in their wills as part of a broader initiative on digital end-of-life planning. The center notes that recent incidents where individuals struggled to cancel subscriptions due to a lack of knowledge about login credentials have highlighted the need for more effective strategies to manage our digital legacies after we're gone.



Published: Thu Nov 21 00:53:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaigns Exploit Facebook, Steal Credit Card Data, and Lure Users into Compromising Their Security


A new wave of phishing campaigns has emerged that not only exploits Facebook but also lures users into compromising their security by utilizing the ClickFix technique. These campaigns target Facebook business accounts, potentially leading to financial losses for individuals and businesses, while also stealing credit card data stored in web browsers. The use of Telegram as a vector for data exfiltration further solidifies this threat. Users must be vigilant when interacting with links or attachments from unknown sources and take necessary precautions to protect themselves from these emerging threats.

Published: Thu Nov 21 01:13:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's AI-Powered OSS-Fuzz Tool Discovers 26 Vulnerabilities in Open-Source Projects

Google's AI-powered OSS-Fuzz tool has discovered 26 vulnerabilities in open-source projects, highlighting the importance of leveraging artificial intelligence (AI) and machine learning techniques to enhance software security. This groundbreaking finding underscores the potential of innovative solutions like OSS-Fuzz in identifying and addressing security threats.

Published: Thu Nov 21 02:27:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Decade-Old Vulnerabilities in Ubuntu's needrestart Package Expose Enterprises to Severe Risks


Ubuntu's needrestart package has been found to contain decade-old Local Privilege Escalation (LPE) bugs that could allow local attackers to gain root privileges without user interaction. This discovery highlights the importance of regular security audits and updates, as well as proactive security measures to mitigate potential vulnerabilities. Organizations must take swift action to address these vulnerabilities and implement robust security measures to protect themselves against severe risks such as unauthorized data access, malware, and operational disruptions.

Published: Thu Nov 21 02:46:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ford Rejects Breach Allegations, Claims Customer Data Not Impacted

Ford Motor Company denies allegations of a data breach that was reported on a hacking forum earlier this week, claiming that customer data was not impacted.

Published: Thu Nov 21 04:03:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Web of Deceit: Unraveling the Sophisticated Cybercrime Scheme of Scattered Spider



A complex web of deceit has been unraveled by law enforcement, exposing a group of skilled cybercriminals known as Scattered Spider. Their phishing scheme targeted companies across the globe, resulting in significant financial losses for numerous individuals and organizations. This article provides an in-depth exploration of their modus operandi, highlighting the devastating consequences of falling prey to such sophisticated scams.

Published: Thu Nov 21 04:19:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Controversial UK Online Safety Act: Balancing Security with Privacy


The UK Online Safety Act has been passed, sparking controversy over its potential impact on user privacy and security. The new law sets out priorities for regulating online platforms and social media, but critics argue that it does not adequately address concerns about the government's ability to compel services to undermine end-to-end encryption.

Published: Thu Nov 21 06:14:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

China's Surveillance State Exposes its Citizens' Personal Data as a Commodity

China's surveillance state is selling its citizens' personal data on the black market, with insiders able to rent out their access to sensitive information for significant sums of money. The revelations have significant implications for the security and privacy of individuals in China, highlighting the need for greater transparency and accountability within the government's surveillance apparatus.

Published: Thu Nov 21 06:27:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs: A Global Cybercrime Scheme Exposed


North Korea's network of IT workers is impersonating U.S.-based companies to fund its missile programs. A recent cybercrime scheme has been exposed, where threat actors are using forged identities to obtain employment at various companies in the U.S. and elsewhere, and send back a huge portion of their wages back to the Hermit Kingdom. This sophisticated operation highlights a deliberate and evolving strategy that leverages the global digital economy to fund state activities, including weapons development.

Published: Thu Nov 21 06:44:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Threat Landscape: Remediation is Not a One-Time Fix

A recent article on The Hacker News (THN) highlights the importance of remediation in cybersecurity, but also underscores the need for continuous vigilance and testing to ensure that vulnerabilities have been fully addressed.

Published: Thu Nov 21 06:52:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Infrastructure Vulnerabilities on the Rise: A Growing Concern for Cybersecurity Experts

Recent research has revealed that a staggering 145,000 industrial control systems across 175 countries have been exposed online, highlighting the growing concern for cybersecurity experts worldwide.

Published: Thu Nov 21 07:02:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Mediboard Data Breach: A French Hospital's Electronic Patient Record System Compromised by a Rogue Actor


A recent cyber attack on an unnamed French hospital has resulted in the exposure of sensitive healthcare data, compromising the electronic patient record system (EPR) used by multiple healthcare organizations. Over 758,000 patients were affected by the breach, with stolen data including name, first name, date of birth, gender, address, city, postal code, phone number(s), and email.

Published: Thu Nov 21 07:24:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Sophisticated Phishing Scheme of Scattered Spider: A Web of Deceit and Exploitation



In recent months, a shocking web of deceit has been unraveled by federal prosecutors, revealing one of the most sophisticated phishing schemes ever seen. A group of five defendants, known as Scattered Spider, have allegedly stolen tens of millions of dollars' worth of intellectual property and proprietary information, compromising hundreds of companies nationwide in the process.



Published: Thu Nov 21 09:12:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

'Alarming' Ubuntu Server Vulnerabilities Linger for Decade, Leaving Millions at Risk

A long-standing vulnerability in the needrestart utility of Ubuntu Server has been re-exposed by Qualys researchers, leaving millions of users worldwide at risk due to the potential for unprivileged attackers to gain root access without any user interaction. Despite being introduced over a decade ago, these vulnerabilities were not addressed until now, highlighting the importance of regular security audits and updates.

Published: Thu Nov 21 09:30:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Privileged Access Management: A Game-Changer for Cybersecurity


Recent reports have highlighted the ongoing threats posed by Chinese hackers exploiting T-Mobile and other U.S. telecoms in a broader espionage campaign, emphasizing the importance of privileged access management (PAM) for organizations seeking to strengthen their cybersecurity posture. By implementing a comprehensive PAM strategy, companies can gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on their IT teams.

Published: Thu Nov 21 09:45:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Scattered Spider Cybercrime Gang: A New Era in Dark Web Organized Crime


The US Department of Justice has charged five alleged members of the Scattered Spider cybercrime gang for their involvement in various high-profile hacking incidents. The charges, announced on November 21, 2024, mark a significant development in the ongoing efforts to dismantle and prosecute organized crime groups operating in the dark web.

In this article, we will delve into the details of the Scattered Spider cybercrime gang, their alleged crimes, and the implications of these charges for the global cybersecurity landscape. We will also examine the broader context in which these allegations have been made, including recent trends in cybercrime and law enforcement efforts to combat it.



Published: Thu Nov 21 10:13:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Revolutionary Shift in Mobile Security: Cape, the Ultra-Secure Phone Carrier Redefining Privacy for High-Risk Individuals

A new ultra-secure phone carrier called Cape promises to provide high-risk individuals with unparalleled security features, making it harder for companies to track users and serve targeted ads. With its pre-configured Android phone and advanced privacy features, Cape is redefining the conversation around mobile security, offering a tailored solution for those who require an elevated level of protection.

Published: Thu Nov 21 13:34:20 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Shift in BianLian Ransomware's Tactics: Data Theft Now Takes Center Stage


The U.S. Cybersecurity & Infrastructure Security Agency (CISA), FBI, and Australian Cyber Security Centre (ACSC) have issued an updated advisory warning of a shift in tactics employed by the BianLian ransomware group, marking a departure from its traditional data extortion methods towards exclusively focusing on data theft.

Published: Thu Nov 21 13:56:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Seizes 240 Domains Used by ONNX Phishing-as-a-Service Operation

Microsoft has seized 240 domains used by the ONNX phishing-as-a-service operation, a significant step in its efforts to combat phishing attacks and protect customers from cybercriminals.

Published: Thu Nov 21 14:16:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Seizes PopeyeTools Cybercrime Marketplace, Charges Administrators

US Seizes PopeyeTools Cybercrime Marketplace, Charges Administrators: In a significant move in the fight against cybercrime, the US Department of Justice has seized the notorious PopeyeTools marketplace and charged its administrators with various crimes. The seizure marks a major milestone in the DOJ's efforts to disrupt and dismantle online criminal networks.

Published: Thu Nov 21 14:24:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

DARPA's Voting System Backlash: Security Researchers Sound Alarm Over Proposed "MERGE" Protocol

DARPA's Voting System Backlash: Security Researchers Sound Alarm Over Proposed "MERGE" Protocol

Published: Thu Nov 21 14:33:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow Over the Baltic: A Global Conundrum Unfolds Amidst Deliberate Cable Interference

China has denied involvement in the deliberate interference with two undersea internet cables in the Baltic Sea, but the incident has raised concerns about the vulnerability of critical infrastructure and the potential for sabotage by malicious actors.

Published: Thu Nov 21 14:44:34 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

'Alarming' Security Bugs Laid Low: A Decade-Old Linux Utility Vulnerability Reaches the Forefront



Qualys has disclosed a set of alarming security bugs in the Linux needrestart utility that pose significant risks to system integrity and security. The bugs allow unprivileged local attackers to gain root access without any user interaction, with versions before 3.8 being particularly vulnerable. While upgrading to version 3.8 or later can mitigate this issue, it is still important for system administrators to prioritize their software updates.



Published: Thu Nov 21 14:53:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pig Butchering Scams: The Dark World of Organized Crime on Social Media

Pig Butchering Scams: The Dark World of Organized Crime on Social Media

Pig butchering scams have been a growing concern for law enforcement agencies and social media platforms alike. These devastating scams, which involve forced labor compounds and online exploitation, have generated significant revenue for organized crime syndicates worldwide. In this article, we explore the complex world of pig butchering scams and the efforts being made to combat them.

Published: Thu Nov 21 15:20:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Vulnerability: Over 2,000 Palo Alto Networks Devices Compromised in Ongoing Attack Campaign


Over 2,000 Palo Alto Networks devices have been compromised in a recent attack campaign exploiting newly disclosed security flaws. This alarming incident highlights the urgent need for organizations to bolster their cybersecurity posture and ensure swift application of latest patches.

Published: Thu Nov 21 15:33:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Threats Emerge: Chinese APT Actors Target Linux Systems with Advanced Exploits


A new Chinese advanced persistent threat (APT) actor known as Gelsemium has emerged with a series of sophisticated attacks targeting Linux systems in East and Southeast Asia. Gelsemium's malware exploits have been observed using two new backdoors: WolfsBane and FireWood, which are designed to maintain persistent access and execute commands stealthily. To stay ahead of this threat, organizations must prioritize ongoing security awareness training for their personnel and invest in cutting-edge security solutions.

Published: Thu Nov 21 15:51:42 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

WolfsBane: A New Linux Malware Used by Chinese Hackers to Target Linux Systems

Chinese hackers have been using a new Linux malware called WolfsBane to target Linux systems, with the malware featuring a dropper, launcher, and backdoor. The discovery highlights the growing threat landscape for Linux systems and underscores the need for robust security measures to protect these platforms from sophisticated malware tools.

Published: Thu Nov 21 20:08:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Massive Cybersecurity Breach: Over 2,000 Palo Alto Firewalls Compromised by Hackers Exploiting Recently Patched Zero-Day Vulnerabilities


Over 2,000 Palo Alto firewalls compromised by hackers exploiting recently patched zero-day vulnerabilities. The attack highlights the ongoing threat landscape in cybersecurity and emphasizes the importance of timely patching and secure deployment practices.

Published: Thu Nov 21 20:19:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unintended Consequences of Inadequate Network Security: A Cautionary Tale from the US Cybersecurity and Infrastructure Agency

US Cybersecurity and Infrastructure Agency's (CISA) recent exercise highlights the critical need for robust network security measures to prevent cyber threats. The operation demonstrates how quickly an attacker can gain control of sensitive systems and exploit vulnerabilities to steal data or disrupt operations.

Published: Thu Nov 21 20:37:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Strikes Japan's Anti-Organized Crime Agency: A Wake-Up Call for Cybersecurity


A recent phishing attack on Japan's anti-organized crime agency has compromised personal information of over 2,500 individuals. The incident highlights the importance of cybersecurity awareness and the need for organizations to adapt to evolving digital threats.

Published: Fri Nov 22 00:24:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Malicious Supply Chain Attack: The Rise of JarkaStealer and the Enduring Threat of Software Vulnerabilities



A malicious supply chain attack has been uncovered, where two packages impersonated popular AI models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer. The packages were uploaded to the PyPI repository, which was downloaded by thousands of users worldwide.



Published: Fri Nov 22 01:41:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lack of Cybersecurity Measures Leaves Thousands of Firewalls Vulnerable to Exploitation

Thousands of Palo Alto Networks firewalls have been compromised due to recently patched zero-day vulnerabilities, leaving organizations vulnerable to exploitation by malicious actors. The incident highlights the importance of prioritizing cybersecurity measures and staying up-to-date with the latest software patches.

Published: Fri Nov 22 02:09:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

SafePay Ransomware Gang Claims Attack on UK's Microlise, Stolen 1.2 TB of Data


The SafePay ransomware gang has claimed responsibility for the attack on UK-based telematics company, Microlise, which resulted in the theft of approximately 1.2 terabytes of sensitive data. The incident highlights the growing threat posed by emerging ransomware gangs and underscores the need for organizations to prioritize cybersecurity measures.

Published: Fri Nov 22 03:35:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Crackdown on Cybercrime and Fraud: A New Era for Online Security



In a major crackdown, Microsoft, Meta, and the U.S. Department of Justice (DoJ) have launched a coordinated effort to disrupt and dismantle cybercrime and fraudulent networks. The operation has resulted in the seizure of 240 fraudulent websites associated with an Egypt-based cybercrime facilitator, as well as the shutdown of PopeyeTools, an online marketplace that sold stolen credit cards and other tools for carrying out financial fraud. This marks a significant shift in the global response to these threats and highlights the growing recognition that cybercrime is not just an isolated issue affecting individual companies or countries but rather a transnational threat that requires a collective response.

Published: Fri Nov 22 04:44:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mastering Endpoint Security: A Comprehensive Approach to Protecting Modern Endpoints

As endpoint diversity grows, a centralized, automated solution could prove essential for reducing risk and boosting efficiency. Learn how Kaseya's platform can help organizations secure every endpoint effectively in our latest article.

Published: Fri Nov 22 05:55:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: U.S. CISA Issues Warning on Exploited Vulnerabilities


In light of CISA's latest update, security experts are emphasizing the need for proactive cybersecurity measures to bolster defenses against emerging threats. The addition of Apple, Oracle Agile PLM, Ivanti EPMM, Palo Alto Networks Expedition, Android, CyberPanel, Nostromo nhttpd, and Progress Telerik Report Server to CISA's Known Exploited Vulnerabilities catalog underscores the imperative need for vigilance in the face of increasingly sophisticated cyber threats.

Published: Fri Nov 22 06:44:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Spies' Wi-Fi Hacking Technique: A New Era in Cyber Espionage

Russian spies have developed a new technique to breach high-value targets via Wi-Fi, using compromised laptops or devices as relay points. The "nearest neighbor attack" technique has been linked to Russia's APT28 hacking group and poses significant risks for organizations focused on Ukraine and other sensitive areas.

Published: Fri Nov 22 08:06:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Hybrid Warfare Strategy: A Growing Threat to Global Security


Russian hackers have been linked to a sophisticated cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. The group, dubbed TAG-110, is believed to be connected to Russia and has been utilizing custom-made malware tools to carry out its operations. This growing threat highlights the evolving nature of Russia's cyber espionage strategy and underscores the importance of prioritizing cybersecurity awareness and investment in advanced threat detection systems.

Published: Fri Nov 22 08:23:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Data Resilience: How the 3-2-1-1-0 Rule is Revolutionizing Backup Best Practices


In a rapidly changing cybersecurity landscape, organizations must stay ahead of the curve to protect their critical data. The evolution of the 3-2-1 backup rule has brought about the 3-2-1-1-0 rule, providing an even stronger layer of security and verification. With its emphasis on redundancy, immutability, and multiple formats, this updated rule is poised to revolutionize backup best practices and ensure that organizations can recover their data quickly and efficiently in the event of a breach.

Published: Fri Nov 22 08:55:12 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT-K-47's Hajj-Themed Phishing Campaign: Unveiling the Advanced Asyncshell Malware

APT-K-47's latest phishing campaign has used Hajj-themed lures and Asyncshell malware to deliver a powerful attack on Pakistani entities, highlighting the importance of robust cybersecurity defenses in today's threat landscape. Learn more about this emerging threat and how organizations can protect themselves.

Published: Fri Nov 22 12:11:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

China-Linked TAG-112 Nation-State Group Embarks on Cobalt Strike Espionage Campaign Targeting Tibetan Media and Universities

China-Linked Nation-State Group Embarks on Cobalt Strike Espionage Campaign Targeting Tibetan Media and Universities

A recent attack by TAG-112 has highlighted the growing threat of cyber espionage targeting Tibetan media outlets and universities. Using advanced tactics, including Cobalt Strike post-exploitation toolkit, this malicious campaign aims to facilitate information collection through remote access and other follow-on attacks. As threats continue to evolve, it is essential that organizations prioritize proactive measures aimed at mitigating their exposure to such attacks.

Published: Fri Nov 22 12:20:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Most Heinous Breach of U.S. Telecommunications: China's Salt Typhoon Hack Exposes Millions



In a shocking revelation, Chinese hackers have breached the United States' telecommunications infrastructure, compromising millions of Americans' phone calls and text messages. The breach, known as Salt Typhoon, has left officials scrambling to address this critical vulnerability and raises serious questions about the effectiveness of the country's cybersecurity measures.

Published: Fri Nov 22 13:31:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking Beyond Borders: The "Nearest Neighbor Attack" That Exposed a US Firm's Vulnerabilities

Russian state hackers APT28 used a novel technique called "nearest neighbor attack" to breach a US firm's enterprise WiFi network while being thousands of miles away. The attack highlights the importance of treating WiFi corporate networks with the same care as any other remote access service, emphasizing the need for MFA and awareness of one's surroundings in preventing such attacks.

Published: Fri Nov 22 14:54:46 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

'Alarming' Security Bugs Laid Low for Decade: Qualys Discovers Five Vulnerabilities in Linux's Needrestart Utility



Qualys has disclosed five severe security bugs in Linux's needrestart utility that could be exploited by attackers to gain root access without user interaction. The vulnerabilities were introduced over a decade ago and relate to environment variables used by Python, Ruby, Perl, and other interpreters within the utility. While Qualys has refused to release exploit code for these bugs, they have urged admins to apply recommended fixes promptly. Organizations affected are advised to upgrade to version 3.8 or later of needrestart or modify its configuration to disable interpreter heuristic to mitigate the issue. This serves as a reminder of the ongoing importance of prioritizing vulnerability management and staying vigilant in cybersecurity efforts.

Published: Fri Nov 22 15:16:40 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Attribution Conundrum: Unpacking the Complexities of Foreign Influence Campaigns in the 2024 US Elections

The 2024 US election cycle saw a surge in naming and shaming foreign influence campaigns, sparking a renewed debate about the efficacy and limitations of attribution. Researchers from the Atlantic Council's Digital Forensic Research Lab shed light on the complexities surrounding this issue, highlighting the need for a balanced approach to attribute disinformation campaigns effectively.

Published: Fri Nov 22 15:24:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Data Heist: Andrew Tate's Real World Website Compromised, Subscriber Data Stolen

Andrew Tate's website, The Real World, has been breached, compromising the personal data of over 900,000 subscribers. The attack highlights the importance of online security and the need for regular software updates and security checks.

Published: Fri Nov 22 17:08:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Thousands of Palo Alto Networks Firewalls Hijacked by Critical Exploits, Vendor Denies Awareness of Compromised Devices

Thousands of Palo Alto Networks firewalls have been compromised by critical exploits, leaving customers wondering about the extent of the breach and what actions to take next. Follow this story for updates as more information becomes available.

Published: Fri Nov 22 17:22:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unparalleled Sophistication: The "Nearest Neighbor Attack" Exposes Vulnerabilities in High-Value Targets

The "Nearest Neighbor Attack" – a sophisticated hacking operation that exploits vulnerabilities in high-value targets by compromising Wi-Fi networks in physically adjacent locations. Learn more about this attack and its implications for network security.

Published: Fri Nov 22 20:55:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Ghost in the Machine: Uncovering the Nearest Neighbor Attack

Discover how a Russian APT group used nearby Wi-Fi networks to breach multiple organizations in close proximity. Read the full investigation to learn more about the "Nearest Neighbor" attack technique and its implications for network security.

Published: Sat Nov 23 02:23:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Threats Emerge as Data Broker Hacks Andrew Tate's Educational Platform

US companies that collect digital ad data are enabling Chinese hackers to track American military and intelligence personnel, as part of the worst telecom breach in US history.

Published: Sat Nov 23 05:51:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ONNX Phishing Service: A Rise of Sophisticated Cyber Attacks

Microsoft has seized 240 sites used by the ONNX phishing service, a sophisticated cyber attack that uses Adversary-in-the-Middle (AiTM) phishing attacks to bypass MFA protections. The operation was disrupted after an Egyptian man named Abanoub Nady was identified as its operator.

Published: Sat Nov 23 06:11:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Web of Deceit: The Exposé on GLASSBRIDGE, a Pro-China Influence Network of Fake News Sites


A new report by Google's Threat Intelligence Group (TAG) has exposed a pro-China influence operation called GLASSBRIDGE, which uses fake news sites and newswire services to spread propaganda and disinformation globally. The operation, known as Storm-2077, has been linked to several cyber attacks on government agencies and industries worldwide, highlighting the dangers of misinformation in the digital age.

Published: Sat Nov 23 07:22:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's AI-Driven Scams and Malware on LinkedIn: A $10 Million Heist


North Korea's AI-Driven Scams and Malware on LinkedIn have resulted in a staggering $10 million heist, with Microsoft exposing a sophisticated group known as Sapphire Sleet. The group's use of AI-driven tools to create convincing profiles and messages has left victims vulnerable to social engineering attacks, highlighting the need for international cooperation in combating state-sponsored hacking groups.



Published: Sat Nov 23 07:38:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Linux-based Malware: China-linked APT Gelsemium's New Backdoor, WolfsBane

China-linked APT Gelsemium has deployed a new Linux backdoor dubbed WolfsBane in attacks targeting East and Southeast Asia, including Singapore. The malware is similar to another Linux version used by Gelsemium called Gelsevirine, which has been in use for several years. This latest development highlights the evolving threat landscape of Linux-based malware as APT groups adapt to enhanced Windows defenses.

Published: Sat Nov 23 08:04:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Alarming First-Use of Intermediate-Range Ballistic Missile: A Warning to the West


Russia's recent launch of an Oreshnik intermediate-range ballistic missile in combat marks a significant escalation in the conflict between Russia and Ukraine. The attack serves as a stark warning to the West, highlighting the increasing tensions and military aggression exhibited by Moscow. As the international community closely watches developments in Ukraine and Russia, it is clear that this situation has become increasingly complex and volatile.



Published: Sat Nov 23 11:22:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trump's Unorthodox Nomination of Kristi Noem as DHS Secretary: A Potential Shift in US Cybersecurity Policy

Trump has nominated Kristi Noem as Homeland Security Secretary, bringing her experience in cybersecurity and border control to the role. As she takes over, it's unclear how she will approach cybersecurity policy, particularly given the Trump administration's stated priorities for CISA.

Published: Sat Nov 23 12:39:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cyberattack on IGT Brings Disruption to the Gaming Industry

A major cyberattack on International Game Technology (IGT) has brought significant disruption to the gaming industry, with certain systems taken offline as the company investigates the cause of the attack. While the details remain scarce, experts speculate that it may have been a ransomware attack, highlighting the need for companies to prioritize cybersecurity and take proactive measures to protect themselves against threats.

Published: Sat Nov 23 14:02:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Vulnerable Avast Anti-Rootkit Driver to Disable Security Defenses


Hackers have recently discovered a new attack that leverages an old and vulnerable version of the Avast Anti-Rootkit driver. This malicious campaign uses the legitimate but outdated anti-rootkit driver to disable security components on targeted systems, allowing the malware to take control of the system. Stay informed about such threats by staying up-to-date with your operating system and software.

Published: Sat Nov 23 15:09:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Web Marketplaces: PopeyeTools Seizure and the Rise of Cybercrime

The U.S. Department of Justice seized a major dark web marketplace called PopeyeTools, charging its administrators with various cybercrime-related offenses. The seizure marks a significant step in the fight against cybercrime and highlights the growing concern of this issue.

Published: Sun Nov 24 06:13:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

DEF CON's Cybersecurity Crusade: A New Era of Public-Private Partnerships to Secure America's Critical Infrastructure

DEF CON's Cybersecurity Crusade: In a bold move, DEF CON hackers are teaming up with US water companies to tackle the growing threat of cybersecurity breaches in America's drinking water systems. With over 91 percent of community water systems serving fewer than 10,000 people, this initiative is a crucial step towards securing critical infrastructure.

Published: Sun Nov 24 10:40:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Overview of the Current Cybersecurity Landscape: A Malware-Infested World

A comprehensive overview of the current state of malware-related incidents has been provided in this article. From sophisticated APTs to phishing attacks, malware has become an integral part of our digital lives. The article highlights several notable incidents involving malware, including a cyberattack on Omni Hotels & Resorts and a data breach at City of Hope.

Published: Sun Nov 24 11:17:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Complex Web of Cyber Threats: A Comprehensive Analysis of the Latest Security Breaches and Vulnerabilities


In this comprehensive analysis, we delve into the latest security breaches and vulnerabilities revealed by Security Affairs Round 499. From credit card marketplaces to data centers, our article uncovers the complex web of cyber threats that pose significant risks to individuals, organizations, and nations alike.

Published: Sun Nov 24 11:53:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Cyber Espionage Tactics Exploited by APT28: A Novel Attack Vector Against Network Security

Russian cyber spies have successfully exploited a novel attack vector known as the "nearest neighbor attack" to target network security, compromising multiple organizations with offices near their target. This tactic allows attackers to gain access to the target's network by breaching neighboring organizations and using stolen credentials. Organizations are advised to review their security protocols and take immediate action to protect themselves against similar attacks.

Published: Sun Nov 24 20:15:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era for Internet Freedom: China's Bold Attempt to Tackle Big Tech Misbehavior


In a significant shift towards greater transparency and regulation, China has launched a nationwide campaign to crack down on Big Tech companies' misbehavior. The Cyberspace Administration aims to curb the practice of recommending algorithms that create "information cocoons" or echo chambers, which can perpetuate online misinformation and hinder the free flow of information.

Published: Mon Nov 25 00:36:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the BYOVD Malware Campaign: A Threat to Antivirus Protections


New Malware Campaign Uncovered: BYOVD Technique Used to Bypass Antivirus Protections
A recent discovery by cybersecurity researchers has shed light on a sophisticated malware campaign that leverages the Bring Your Own Vulnerable Driver (BYOVD) technique to bypass antivirus protections and gain unauthorized access to infected systems. This technique, which involves exploiting pre-existing vulnerabilities in drivers to carry out malicious actions, is a relatively new addition to the arsenal of threat actors. In this article, we will delve into the details of this malware campaign and explore the implications for individuals and organizations.



Published: Mon Nov 25 04:11:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia-linked APT TAG-110: The Shadowy Threat Actor Exploiting Europe and Asia



Russia-linked threat actors, identified as TAG-110, have been employed custom malware tools to target organizations in Asia and Europe. The campaign, which primarily focused on government entities, human rights groups, and educational institutions in Central Asia, East Asia, and Europe, has raised concerns about the sophistication of Russian cyber espionage capabilities. This article provides a detailed analysis of TAG-110's tactics, techniques, and procedures, highlighting the complexity and persistence of their campaigns.

Published: Mon Nov 25 04:42:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Cyber Warfare Threats: A Growing Concern for Global Security

Russia-linked threat actors are preparing cyberattacks against the UK and its allies with the intention of undermining support for Ukraine, says a senior UK minister. This warning comes as tensions between Russia and the West are already high, and the prospect of a large-scale cyber conflict is becoming increasingly plausible. The implications of this warning are far-reaching and could have significant consequences for global security.

Published: Mon Nov 25 05:07:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Battle for Cybersecurity: A Global Threat Landscape Erupts


In a rapidly evolving cybersecurity landscape, organizations and individuals face increasing threats from sophisticated cyber attacks, exploits, and vulnerabilities. The latest data highlights a surge in state-sponsored hacking groups, AI-powered phishing campaigns, and zero-day exploits, which could compromise sensitive information, disrupt operations, and put lives at risk. Get the latest insights on how to protect yourself against these growing threats.

Published: Mon Nov 25 06:35:48 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Lure of Surveillance: A Mother's Quest for Control in a Chaotic World

The mother's decision to use surveillance as a means of reassurance reveals the intricacies of the human need for control in an uncertain world.

Published: Mon Nov 25 08:11:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

China's Stealthy Cyber Assault on US Telcos: A Threat to National Security


China's recent cyber attacks on US telco networks have raised concerns about national security and the scope of these attacks is still unclear. The severity of the situation has been underscored by news that T-Mobile US is monitoring its own network for signs of Chinese "industry-wide attack" following a recent security breach. In light of this information, it is imperative that policymakers and cybersecurity experts work together to develop effective strategies for countering these threats.

Published: Mon Nov 25 08:20:16 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Landscape of Phishing Attacks: A Cybersecurity Nightmare


Phishing attacks have transformed significantly over the years, from simple methods to sophisticated evasion techniques that continue to evade detection. With attackers adapting their tactics in a cat-and-mouse game with defenders, cybersecurity professionals must stay vigilant to protect themselves and their organizations from these increasingly complex threats.

Published: Mon Nov 25 08:31:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks


New Cybersecurity Vulnerability Discovered: Cloud Platforms Compromised via IaC and PaC Tools
A recent discovery by cybersecurity researchers has exposed a new vulnerability in infrastructure-as-code (IaC) and policy-as-code (PaC) tools, allowing attackers to breach cloud platforms and exfiltrate data. The newly identified attack technique targets the supply chain, utilizing dedicated, domain-specific languages (DSLs) to compromise these IaC and PaC tools.

Published: Mon Nov 25 08:38:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware Abuses Flawed Avast Anti-Rootkit Driver: A Sophisticated Threat to Global Cybersecurity


Threat actors have recently employed a sophisticated method of compromising systems by abusing a flawed Avast Anti-Rootkit driver. This malicious campaign has garnered significant attention from cybersecurity experts and researchers, who are now sounding the alarm about the potential risks this poses to global cybersecurity. Organizations should implement BYOVD protections and expert rules to detect and block vulnerable drivers based on their unique signatures or hashes to prevent such attacks.

Published: Mon Nov 25 09:02:41 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enduring Ambivalence of Modern Parenthood: A Reflection on Surveillance and Intuition


In an era where digital surveillance is increasingly prevalent, a new mother reflects on the complex interplay between technology and intuition in her journey to care for her child. Through her candid account, we explore the tension between the instinctual and the rational in modern parenthood.

Published: Mon Nov 25 10:14:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy World of Salt Typhoon: A Sophisticated Hacking Group Targeting Telecommunications and More



In a world where cybersecurity threats are evolving at an unprecedented pace, Salt Typhoon's GhostSpider backdoor has emerged as a sophisticated tool for espionage operations. This article delves into the methods, tools, and motivations of this state-sponsored hacking group, exploring its impact on telecommunications and other high-profile targets.

Published: Mon Nov 25 10:59:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's New Restore Credentials Tool Streamlines App Login Process After Android Migration

Google has introduced a new feature called Restore Credentials to simplify the process of accessing third-party apps on a new Android device, streamlining the experience while enhancing user privacy and security.

Published: Mon Nov 25 11:09:35 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cybersecurity Crisis: Malicious Software Strikes PyPI and Exposes Endless Threats to Cryptocurrency Users


A recent discovery has revealed that a Python package named "aiocpa" was found to be exfiltrating private keys via Telegram. The incident serves as a stark warning to users about the ongoing threat of software supply chain attacks, highlighting the importance of monitoring package source codes prior to download.

Cybersecurity experts are now urging users to remain vigilant and to prioritize their cybersecurity measures in light of this attack. With the ever-evolving landscape of cyber threats, it's essential for individuals and organizations alike to stay informed and take proactive steps to protect themselves from these types of attacks.

Follow us on Twitter for more updates on this developing story.

Published: Mon Nov 25 11:19:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Amazon Fire TV 50-Inch Deal: A Black Friday Bargain Like No Other

Get ready to binge-watch your favorite shows or play the latest games in stunning 4K Ultra-HD quality with the Amazon Fire TV 50-Inch at an unbeatable price of $280. With its seamless Alexa integration, impressive gaming capabilities, and stunning visuals, this deal is not to be missed.

Published: Mon Nov 25 13:04:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

DOJ: Man Hacked into Computer Networks to Pitch Cybersecurity Services

DOJ: Man Hacked into Computer Networks to Pitch Cybersecurity Services

A recent indictment by the Department of Justice reveals a case of cybercrime where an individual used their unauthorized access to computer systems to promote their own cybersecurity services. The incident highlights the creative ways some individuals resort to in order to gain access to sensitive information and underscores the need for robust cybersecurity measures, law enforcement agencies to investigate and prosecute cybercrimes more aggressively.

Published: Mon Nov 25 14:42:55 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Secure Future Initiative: A New Era for Windows Security

Microsoft has unveiled its Secure Future Initiative (SFI), a comprehensive plan to improve the security of its Windows operating system. With initiatives like the Windows Resiliency Initiative and Safe Deployment Practices, SFI aims to make it easier for users to protect themselves from cyber threats.

Published: Mon Nov 25 14:50:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Blue Yonder Ransomware Attack: A Disruptive Affair in the Grocery Store Supply Chain

Blue Yonder ransomware attack disrupts global supply chain operations, affecting over 3,000 customers, including major organizations like DHL and Tesco. The company has implemented defensive protocols but no specific timeline for complete restoration has been shared.

Published: Mon Nov 25 16:49:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zyxel Firewalls Targeted in Recent Ransomware Attacks: A Growing Concern for Cybersecurity

Recent ransomware attacks targeting Zyxel firewalls have highlighted the growing concern for cybersecurity in recent months. Cybersecurity experts warn of the importance of keeping software up-to-date and implementing robust measures to prevent such threats.

Published: Mon Nov 25 17:13:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Blue Yonder's Supply Chain Snafu: A Cautionary Tale of Ransomware

Blue Yonder's recent ransomware attack highlights the growing threat of cyber attacks on supply chain management vendors, leaving its customers to deal with significant disruptions to their operations. The incident serves as a reminder of the importance of robust cybersecurity measures in protecting critical infrastructure and raises questions about the preparedness and resilience of companies like Blue Yonder to deal with such attacks.

Published: Mon Nov 25 20:44:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Critical Array Networks Vulnerability: A Global Security Threat


A critical security flaw in Array Networks AG's secure access gateways has emerged as a major concern for IT administrators worldwide, highlighting the need for robust threat intelligence and patch management practices. Organizations are advised to apply the patches by December 16, 2024, to secure their networks against ongoing attacks.

Published: Tue Nov 26 00:00:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Britain Unveils High-Profile AI Warfare Initiative to Counter Russia's Growing Cyber Threats


The UK government has announced the formation of LASR, a high-profile laboratory dedicated to enhancing AI security research and countermeasures against Russian cyber threats. This ambitious initiative represents a pivotal moment in Britain's efforts to bolster its national security capabilities and confront the growing threat landscape posed by state-sponsored actors.

Published: Tue Nov 26 01:27:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Thai Police Arrest Chinese Hackers Behind Global SMS Blaster Attacks

Thai police have arrested Chinese hackers involved in a global string of SMS blaster attacks. This marks a significant development in the fight against cybercrime syndicates and highlights the importance of international cooperation in combating online threats.

Published: Tue Nov 26 01:49:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cybersecurity Landscape: Threats, Vulnerabilities, and Countermeasures

Stay up-to-date on the latest cybersecurity threats and solutions by following BleepingComputer.com for expert advice and news.

Published: Tue Nov 26 05:40:36 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Third Cyber Incident in a Year: NHS Faces Cybersecurity Crisis

The NHS has declared a "major cyber incident" for the third time this year, with the Wirral University Teaching Hospital NHS Trust cancelling all outpatient appointments due to "cybersecurity reasons." The trust is dealing with the fallout as of Tuesday morning, and officials remain tight-lipped about the specifics of the attack.

Published: Tue Nov 26 05:48:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

QNAP and Veritas Disclose Multiple Vulnerabilities Over Weekend Patch Cycle



QNAP and Veritas have disclosed multiple high-severity vulnerabilities in their products, including critical bugs that could allow attackers to execute arbitrary code or gain control of affected systems. Learn more about these recent security disclosures and how organizations can take steps to mitigate the risk of cyber threats.


Published: Tue Nov 26 06:00:08 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Research Reveals Alarming Vulnerability in Autonomous Vehicle Systems

Researchers have discovered a critical vulnerability in autonomous vehicle systems that could pose significant risks to drivers relying on these systems. The flashing lights of emergency vehicles can cause "digital epileptic seizures," leading to reduced accuracy and potentially catastrophic consequences. This alarming finding highlights the need for manufacturers to prioritize the development of robust software patches like "Caracetamol" to mitigate this risk.

Published: Tue Nov 26 06:09:49 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Modern Cyber Threats: A Comprehensive Look at Emerging Vulnerabilities and Advanced Malware


Recent weeks have witnessed a surge in sophisticated cyber threats targeting various sectors across Europe and Asia. This article provides an in-depth look at the latest vulnerabilities and malware variants, as well as emerging solutions to combat modern cyber threats.

Published: Tue Nov 26 06:46:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Sophisticated Malware Operation: RomCom's Zero-Day Exploitation Campaign

Romanian-speaking hackers known as RomCom, believed by some to be linked to Russia, have exploited zero-day flaws in Firefox and Windows to deliver a custom-made malware payload on compromised systems.

Published: Tue Nov 26 07:02:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Shadowy World of Earth Estries: A Sophisticated Chinese Cyber Espionage Threat


A highly sophisticated Chinese cyber espionage group known as Earth Estries has been linked to a series of attacks targeting telecommunications companies across over a dozen countries. The group utilizes an arsenal of advanced malware tools, including the previously undocumented GHOSTSPIDER backdoor, to breach networks and conduct sustained cyber espionage activities. With its sophistication and reach, Earth Estries represents a significant threat to organizations worldwide and serves as a stark reminder that no security posture is ever truly secure.

Published: Tue Nov 26 07:12:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of the Internet: Banshee Stealer Malware-as-a-Service Shuts Down After Source Code Leak



The source code of Banshee Stealer, a notorious MacOS Malware-as-a-Service (MaaS) infostealer, was leaked online. This leak not only exposed the malicious software's inner workings but also led to its operators shutting down their operations. In this article, we will delve into the details of Banshee Stealer and explore the implications of its source code leak.



Published: Tue Nov 26 07:39:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Adds Array Networks AG and vxAG ArrayOS Flaw to its Known Exploited Vulnerabilities Catalog: A Cautionary Tale of Cybersecurity Negligence

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Array Networks AG and vxAG ArrayOS flaw CVE-2023-28461 (CVSS score: 9.8) to its Known Exploited Vulnerabilities catalog, urging federal agencies to address the vulnerability by December 16, 2024. This incident highlights the ongoing struggle against cyber threats and emphasizes the importance of proper cybersecurity governance.

Published: Tue Nov 26 08:04:39 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unparalleled Significance of the MITRE ATT&CK Evaluations: A Game-Changer for Cybersecurity Leaders

The MITRE ATT&CK Evaluations offer a rigorous assessment of cybersecurity vendors' ability to detect and respond to real-world threats, providing security leaders with valuable insights into the performance of competing solutions. By leveraging these evaluations, organizations can refine their defenses and bolster their resilience against emerging threats.

Published: Tue Nov 26 09:54:56 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Critical Vulnerability in Array Networks SSL VPN Products: A Growing Concern for Cybersecurity

Hackers exploit critical bug in Array Networks SSL VPN products, putting over 5,000 customers at risk of remote code execution and data breaches.

Published: Tue Nov 26 10:10:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The US Senate Proposes Historic Legislation Mandating Multi-Factor Authentication and Encryption in Healthcare


The US Senate has proposed a groundbreaking law to mandate multi-factor authentication and encryption in all healthcare organizations. The legislation aims to enhance the security of sensitive health information and prevent similar cyber threats in the future.

Published: Tue Nov 26 10:23:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Resistant Storage: IBM's Cutting-Edge Solution to Defeat Cyber Threats


Ransomware Resistant Storage: IBM's Cutting-Edge Solution to Defeat Cyber Threats
In an effort to mitigate the growing threat of ransomware, IBM has developed a cutting-edge storage solution that utilizes computational storage technology to scan for anomalies and potential threats in real-time. This innovative approach aims to provide organizations with a multi-layered defense against cyber attacks, reducing the time it takes to detect and respond to ransomware incidents.


Published: Tue Nov 26 10:31:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Microsoft's Bing Wallpaper App: A Threat to User Privacy

Microsoft's new Bing Wallpaper app has been found to secretly collect user data, raising concerns about user privacy and autonomy. The app, which is now available on the Microsoft Store, appears to be decrypting and reading all major browser cookies for tracking purposes.

Published: Tue Nov 26 11:03:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical WordPress Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Critical WordPress plugin flaws expose 200,000+ sites to remote attacks, putting millions of users at risk. Find out how you can protect yourself from this devastating vulnerability.

Published: Tue Nov 26 11:11:22 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybercrime Crackdown: Operation Serengeti Netting Over 1,000 Suspects


Global cybercrime has taken a major hit thanks to the coordinated efforts of law enforcement agencies from 19 African countries and Interpol, with over 1,000 suspects arrested as part of Operation Serengeti. These arrests netted authorities $193 million in financial losses attributed to various forms of cybercrime, including ransomware attacks and business email compromise schemes. The operation demonstrated a significant capacity for global cooperation in combating this menace.

Published: Tue Nov 26 13:56:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malwarebytes Seeks to Enhance Cybersecurity Protection During Black Friday 2024

Malwarebytes is offering significant discounts on its various products during Black Friday 2024, including 50% off its one-year anti-malware software subscriptions. This promotion offers customers the opportunity to enhance their cybersecurity protections and protect themselves against increasingly complex threats.

Published: Tue Nov 26 14:05:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Kansas City Man's Alleged Cybercrime Spree: A Tale of Bad Opsec and Guerilla Security Services

A Kansas City Man's Alleged Cybercrime Spree: A Tale of Bad Opsec and Guerilla Security Services

Published: Tue Nov 26 15:42:32 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Supply Chain Disruption: The Ransomware Attack on Blue Yonder


Blue Yonder, a global supply chain management software provider, has suffered a devastating ransomware attack, impacting operations for clients like Starbucks and grocery stores in the US and UK. The incident highlights the growing threat of cyberattacks on critical infrastructure and underscores the importance of robust cybersecurity measures to protect against such attacks.

Published: Tue Nov 26 16:47:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

New NachoVPN Attack: Rogue VPN Servers Install Malicious Updates



A new cybersecurity threat, dubbed "NachoVPN," has been discovered, allowing rogue VPN servers to install malicious updates on unpatched clients. AmberWolf security researchers identified this vulnerability, and SonicWall and Palo Alto Networks have released patches to address the issue.

Published: Tue Nov 26 18:13:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking for Hire: Unmasking Kiberphant0m's True Identity as a U.S. Army Soldier

A former U.S. Army soldier may have been behind a series of high-profile hacking incidents that left millions of customer records exposed. As authorities close in on Kiberphant0m, it remains to be seen whether they will finally reveal their true identity and face the consequences of their actions.

Published: Tue Nov 26 19:26:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the Web of Deception: The Salt Typhoon Cyber Espionage Campaign


The US Department of Justice has sentenced a 59-year-old Florida telco engineer to 48 months in prison for serving as a spy for China, highlighting the growing concern about Chinese espionage efforts within the country. The case serves as a prime example of how China's Ministry of State Security operates, using covert means to gather intelligence on the United States and its allies.

Published: Tue Nov 26 23:47:43 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Surveillance State in the Modern Workplace: A Growing Concern

The modern workplace has become a surveillance state, where employees are being monitored and tracked by various technologies. This trend is documented in a report titled "Tracking Indoor Location, Movement and Desk Occupancy in the Workplace," produced by Cracked Labs, an Austria-based non-profit organization.

Published: Wed Nov 27 05:17:01 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

CrowdStrike's Falcon Flame-Out: A Cautionary Tale of Software Snafus and Revenue Consequences

CrowdStrike, a leading security vendor, has been dealing with the aftermath of its infamous Falcon software failure that crashed millions of computers worldwide. Despite this setback, the company's financial performance for its third quarter showed a resilience that is somewhat surprising, but investors remain cautious over the potential impact on future sales.

Published: Wed Nov 27 05:29:15 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor: A Complex Web of Malware and Cyber Espionage



APT-C-60 has been linked to a complex cyber attack targeting an organization in Japan, leveraging legitimate services to deploy the SpyGlace backdoor. This article delves into the intricacies of this attack, exploring vulnerabilities exploited by APT-C-60 and the tactics used to deploy the SpyGlace backdoor.

Published: Wed Nov 27 05:39:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

African Cybercrime Crackdown: INTERPOL's Operation Serengeti Brings Together 19 Nations to Disrupt Global Cyber Threats

INTERPOL's Operation Serengeti has brought together 19 African countries to disrupt global cyber threats, resulting in the arrest of 1,006 suspects and the dismantling of 134,089 malicious networks. The operation highlights the growing concern over cybercrime in Africa and underscores the importance of international cooperation in addressing this threat.

Published: Wed Nov 27 05:47:10 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Matrix Botnet: A Looming Threat to Global Cybersecurity

Matrix Botnet: A Looming Threat to Global Cybersecurity. The recent revelation of a widespread DDoS botnet campaign, dubbed Matrix, has highlighted the vulnerability of IoT devices and the importance of addressing fundamental security practices.

Published: Wed Nov 27 05:55:11 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

DSPM: The Key to Mitigating Cyber Threats and Ensuring Compliance


Recent cyber threats have highlighted the importance of cybersecurity measures for businesses to meet compliance requirements. This article will delve into how DSPM (Data Security Management) helps organizations fulfill these requirements, discussing the various security challenges and vulnerabilities that businesses face in today's digital landscape.

Published: Wed Nov 27 06:16:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Cyber Threat Actors Unleash Chaos: RomCom Group Exploits Firefox and Tor Browser Zero-Days



A Russian cybercrime group known as RomCom has exploited zero-day vulnerabilities in Firefox and Tor Browser to target attacks on Europe and North America. The group's brazen exploits have left users across the continent vulnerable, underscoring the need for vigilance in the face of emerging threats.

Published: Wed Nov 27 06:53:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cybersecurity Black Friday Bonanza: A Comprehensive Guide to Discounts on VPNs, Antivirus Software, IT Courses, and More

Get ready for the Cybersecurity Black Friday Bonanza! This year's sale is packed with discounts on VPNs, antivirus software, online courses, and more. From NordVPN to LastPass, find out which deals are worth snagging during the holiday season.

Published: Wed Nov 27 08:12:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Discovery of Bootkitty: A Game-Changing UEFI Bootkit Targeting Linux Systems


Researchers at ESET have identified what appears to be the world's first UEFI bootkit specifically designed for Linux systems, dubbed Bootkitty. This malware, a proof-of-concept with no evidence of real-world use, has significant implications for Linux system security and marks a major shift in the threat landscape.

Published: Wed Nov 27 08:23:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Multi-Stage Attack Scenarios: A Growing Threat to Cybersecurity



The rise of multi-stage attack scenarios has become a growing concern in the world of cybersecurity. These complex attacks involve a sequence of URLs or embedded content that are designed to trick victims into thinking they are safe before ultimately leading them to a malicious destination. To protect against these attacks, it is essential to understand how they work and the tactics used by attackers. This article delves into the world of multi-stage attack scenarios, exploring their tactics and providing real-world examples to help users prepare for these complex threats.

Published: Wed Nov 27 08:32:24 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT-C-60 Hackers Exploit Multiple Legitimate Services to Deliver Highly Sophisticated SpyGlace Malware Campaign

A sophisticated malware campaign known as SpyGlace has been linked to APT-C-60, with the group exploiting multiple legitimate services such as Google Drive, Bitbucket, and StatCounter to deliver the malware. The use of these services by APT-C-60 makes the SpyGlace campaign particularly sophisticated and underscores the ongoing threat posed by this group.

Published: Wed Nov 27 08:46:06 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Operation Serengeti: A Global Crackdown on Cybercrime

Operation Serengeti: A Global Crackdown on Cybercrime - INTERPOL and AFRIPOL launch massive operation to combat cybercrime across 19 African countries, resulting in the arrest of 1,006 suspects and the dismantling of 134,089 malicious networks and infrastructures.

Published: Wed Nov 27 09:08:33 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Best Fitbit Deal of Black Friday: The Fitbit Charge 6 at an Unbeatable Price

Get the latest and greatest wearable fitness tracker from Fitbit at an unbeatable price of just $100, with six free months of Fitbit Premium membership included. This deal is a must-have for fitness enthusiasts and tech-savvy shoppers alike!

Published: Wed Nov 27 10:46:58 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Emergence of Bootkitty: A New Era in Linux UEFI Bootkits

Breakthrough discovery reveals the existence of Bootkitty, the first-ever UEFI bootkit targeting Linux systems. This significant development underscores the importance of being prepared for emerging threats in the ever-evolving world of cybersecurity.

Published: Wed Nov 27 11:03:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Automating the Unseen: The Evolution of Endpoint Management

Join Harman Kaur from Tanium on December 9th as they discuss how automation is revolutionizing endpoint management and share insights into the transformative power of autonomous endpoint solutions.

Published: Wed Nov 27 11:10:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Devices Under Siege: A Global Cybersecurity Crisis Unfolds


Recent attacks on Palo Alto Networks devices and ProjectSend open-source file-sharing application have exposed thousands of vulnerabilities worldwide, highlighting the ongoing threat of cybersecurity breaches. As attackers continue to exploit weaknesses in security systems, organizations must take immediate action to address these vulnerabilities and prevent further exploitation.

Published: Wed Nov 27 11:21:23 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Landscape of Cybersecurity: A Deluge of Vulnerabilities Exposed

Recent developments in the realm of cybersecurity highlight the ongoing nature of threats and the importance of staying vigilant in addressing potential vulnerabilities.

Published: Wed Nov 27 11:43:00 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Breaking Ground: The Discovery of the First UEFI Bootkit Malware Targeting Linux

Researchers have discovered the first UEFI bootkit malware specifically targeting Linux systems, marking a significant evolution in the threat landscape. This proof-of-concept malware demonstrates the increasing sophistication of attackers and underscores the importance of continued vigilance across all platforms.

Published: Wed Nov 27 13:07:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Hackers Exploited T-Mobile's Network, But Left Behind No Sensitive Customer Data

Chinese hackers recently breached T-Mobile's routers as part of a series of telecom breaches attributed to the state-sponsored Salt Typhoon group. However, thanks to proactive monitoring and network segmentation, the attack was blocked before it could spread further on the network, leaving behind no sensitive customer data.

Published: Wed Nov 27 13:15:37 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Bolstering Resilience Against 2025 Cyber Threats: Expert Insights from the MITRE ATT&CK Evaluations

Bolstering Resilience Against 2025 Cyber Threats: Expert Insights from the MITRE ATT&CK Evaluations

Summary:

The MITRE ATT&CK Evaluations have emerged as a crucial resource for cybersecurity decision-makers, providing a rigorous, independent assessment of how competing cybersecurity vendors detect and respond to real-world threats. With their alignment with the well-respected MITRE ATT&CK framework and transparent results, these evaluations offer valuable insights into real-world performance and provide a unique opportunity for cybersecurity vendors to demonstrate their capabilities.

Published: Wed Nov 27 13:25:07 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Alert: 600K+ Sensitive Files Left Exposed Online by Data Broker SL Data Services


Data Breach Alert: 600K+ Sensitive Files Left Exposed Online by Data Broker SL Data Services
Over 600,000 sensitive files belonging to thousands of people have been exposed online due to a lack of proper security measures implemented by data brokerage firm SL Data Services. The breach was discovered by security researcher Jeremiah Fowler in October and has raised concerns about the potential risks associated with this exposure.



Published: Wed Nov 27 13:38:05 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Zello Users Urged to Reset Passwords Following Security Incident

Major mobile service provider Zello is urging its customers to reset their passwords after a potential security incident compromised user credentials.

Published: Wed Nov 27 14:47:44 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Leverage Godot Game Engine Vulnerability to Infect Thousands of PCs Worldwide


Hackers have found a way to use the Godot game engine, which is widely used across various platforms, to infect thousands of PCs worldwide. In just three months, hackers managed to infect over 17,000 systems using a technique called "GodLoader." The malware was designed to exploit vulnerabilities in the Godot Engine's scripting language and deliver malicious payloads. With the Stargazers Ghost Network at play, hackers have been able to target gamers across all major platforms.

Published: Wed Nov 27 15:59:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Seize Advantage: ProjectSend Vulnerability Leaves Thousands of Servers Open to Attack


Hackers are exploiting a critical ProjectSend vulnerability, leaving thousands of exposed servers open to attack. With 99% of instances still running a vulnerable version, it's time to upgrade your ProjectSend application to patch this security bug.

Published: Wed Nov 27 16:26:52 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

T-Mobile US Claims Victory Against Chinese Cyberattacks Amid Industry-Wide Concerns

T-Mobile US claims victory over Chinese cyberattacks, but warns that other providers may be seeing different outcomes as the threat posed by Salt Typhoon and similar groups continues to grow. The incident highlights the ongoing challenge of protecting against advanced persistent threats (APTs) and other sophisticated tactics used by Chinese cyber-espionage crews.

Published: Wed Nov 27 16:47:57 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Bootkitty: A New UEFI Bootkit Designed for Linux Systems


Cybersecurity researchers have discovered the first UEFI bootkit specifically designed for Linux systems, which can bypass UEFI Secure Boot and load the Linux kernel. This malware, named Bootkitty by its creators, has significant implications for the security of Linux systems.

Published: Wed Nov 27 17:07:31 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Federal Trade Commission's Crackdown on Tech Support Scams: A New Era of Consumer Protection


The Federal Trade Commission (FTC) has finalized amendments to its Telemarketing Sales Rule (TSR), expanding its authority to pursue companies responsible for tech support scams, regardless of whether they initiated the call or not. This landmark change marks a significant step forward in protecting consumers from these insidious threats.

Published: Wed Nov 27 18:32:17 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Federal Trade Commission's Investigative Spotlight on Microsoft: A New Era of Antitrust Scrutiny


The Federal Trade Commission's investigation into Microsoft marks a significant escalation in antitrust scrutiny for Big Tech companies. The probe focuses on Microsoft's cloud and software licensing business, cybersecurity services, and AI offerings, and could potentially lead to costly penalties or structural reforms if the agency decides to take legal action.

Published: Wed Nov 27 18:43:13 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salt Typhoon's Surge: A Global Threat Beyond US Telcos

Salt Typhoon, a China-linked cyber gang, has been conducting widespread attacks on various sectors globally, including government agencies, internet service providers, and consulting firms. With its arsenal of advanced malware, including GhostSpider, Salt Typhoon poses a significant threat to organizations worldwide. As experts grapple with the implications of this surge, it is clear that this group demands attention and proactive measures to mitigate its impact.

Published: Wed Nov 27 18:54:30 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Hidden Threats: A Glimpse into the Recent Cybersecurity Incidents

Recent cybersecurity incidents highlight the ever-evolving nature of cyber threats, emphasizing the need for robust security measures to protect against them.

Published: Wed Nov 27 23:17:38 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Phishing Scam That's Leaving Recipients Feeling Fired: A Closer Look at the Latest Cybercrime Campaign

Phishing scammers are targeting unsuspecting recipients with a campaign that convinces them they've been fired from their jobs - only to reveal the true horror of compromised personal data. Learn more about this latest cybercrime campaign and how you can protect yourself.

Published: Thu Nov 28 02:33:21 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Flaw in Open-Source File-Sharing Application ProjectSend Raises Concerns Among Cyber Security Experts


Cyber Security Experts Warn of Critical Flaw in Open-Source File-Sharing Application ProjectSend
A critical security flaw has been discovered in the open-source file-sharing application ProjectSend, which may be actively being exploited by attackers. Researchers have warned that the vulnerability, known as CVE-2024-11680, could allow remote and unauthenticated attackers to gain unauthorized access to the application's configuration, create accounts, upload webshells, and embed malicious JavaScript.



Published: Thu Nov 28 02:53:51 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK Hospital Network Overwhelmed by Cyberattack: A Delicate Dance between Patient Care and Digital Security

UK hospital network WUTH has been forced to postpone numerous appointments and procedures following a devastating cyberattack, raising important questions about the balance between patient care and digital security.

Published: Thu Nov 28 05:13:53 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Malicious Npm Library Exploits Software Supply Chain Vulnerabilities to Steal Data and Deploy Crypto Miner


A malicious npm library has been discovered to steal sensitive data and deploy a crypto miner on infected systems, highlighting the importance of constant vigilance in software supply chain security. The attack, which has remained active for over a year, was detected by researchers at Checkmarx, who identified the package as @0xengine/xmlrpc. The malicious code was introduced in version 1.3.4 and harvested valuable information such as SSH keys, bash history, system metadata, and environment variables every 12 hours. The attack distribution methods include direct npm installation and a hidden dependency in a legitimate-looking repository.



Published: Thu Nov 28 05:24:14 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Leverage Godot Engine to Distribute Cross-Platform Malware, Leaving Over 17,000 Systems Vulnerable


Cybercriminals have been exploiting a popular open-source game engine called Godot Engine as part of a new malware campaign that has left over 17,000 systems vulnerable since at least June 2024. The malicious actors have been using the engine's scripting capabilities to deliver malware undetected by conventional security solutions. In this article, we'll delve into the details of this emerging threat and provide guidance on how users can protect themselves from cross-platform malware.

Published: Thu Nov 28 05:31:54 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

NHS Hospitals Fall Back on Pen-and-Paper Operations Amid Ongoing Cybersecurity Crisis

NHS hospitals in North West England have been forced to revert to pen-and-paper operations due to a major cyberattack that has affected several hospitals within the region, highlighting the ongoing risks associated with cybersecurity threats in the healthcare sector.

Published: Thu Nov 28 06:48:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Serverless Security: From Logs to Runtime Protection



The world of serverless computing is shifting towards more secure and proactive approaches to cybersecurity. Traditional log-based and static security tools are no longer sufficient to protect these environments from sophisticated cloud attacks. Sweet Security's innovative Lambda sensor offers a comprehensive solution for securing serverless computing environments, providing real-time monitoring and detection of threats. By embracing this cutting-edge technology, organizations can ensure their serverless environments remain secure and resilient against emerging threats.

Published: Thu Nov 28 07:03:50 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

T-Mobile Detects Network Intrusion Attempts, Blocks Them


T-Mobile has recently detected network intrusion attempts, but fortunately, they were able to block them. The incident serves as a reminder that cybersecurity is an ongoing process that requires continuous investment and vigilance to protect against evolving cyber threats.

Published: Thu Nov 28 09:24:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cyberattack on UK Healthcare: The Fallout of a Ransomware Attack at Wirral University Teaching Hospital


A recent ransomware attack at Wirral University Teaching Hospital has caused significant disruption to services and highlighted the importance of robust cybersecurity measures. The incident resulted in delays for appointments and procedures, with some services being postponed until further notice. As the healthcare sector increasingly relies on digital systems and data storage, it is essential that organizations prioritize their cyber security infrastructure and invest in training staff to recognize and respond to potential threats.

Published: Thu Nov 28 10:58:27 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Over Two Dozen Security Vulnerabilities Discovered in Advantech Industrial Wi-Fi Access Points: A Growing Concern for Industrial Cybersecurity

Researchers have discovered nearly two dozen security vulnerabilities in Advantech EKI industrial-grade wireless access point devices, which could be exploited by attackers to bypass authentication, execute code with elevated privileges, and further infiltrate networks. The identified flaws have been addressed in firmware versions 1.6.5 and 1.2.2, but experts warn that the attack vectors presented by these vulnerabilities are potentially sophisticated and could pose a significant risk to organizations relying on industrial Wi-Fi access points.

Published: Thu Nov 28 12:08:45 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Exchange Server Security Update: A Patch for Progress or a Slippery Slope?


In a surprise move, Microsoft has resumed the rollout of an Exchange Security update that was paused following reports of broken transport rules and disrupted email flow. The November 2024 Security Update problem was embarrassing, as it forced Microsoft to halt the rollout as it addressed the technical glitch.

The re-release is scheduled for December, when users will be able to get the new version automatically through Windows Update. In a bid to ease concerns among users, Microsoft has resumed the rollout of an Exchange Security update that was paused following reports of broken transport rules and disrupted email flow.



Published: Thu Nov 28 13:36:59 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Black Friday Blowout: Blink Outdoor Security Cameras Sold at Unbeatable Prices

Get the Blink Outdoor 5-camera system for just $160 each, a 60% discount on the regular price of $400. This deal includes five high-quality cameras with advanced features, long battery life, and seamless integration with smart home devices.

Published: Fri Nov 29 02:21:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Web of Deceit: Unraveling the Complexities of Corporate Espionage


A 59-year-old U.S. citizen has been sentenced to four years in prison for conspiring to act as a spy for China's intelligence agency, highlighting the ongoing threat posed by Chinese espionage agencies and the need for companies to take steps to protect themselves against these threats.

Published: Fri Nov 29 02:30:09 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious XML-RPC npm Package Deployment: A Case Study on the Dangers of Unchecked Software Dependencies


A malicious software supply chain attack has been uncovered on the npm package registry, compromising thousands of systems worldwide with a crypto miner that steals data. Despite its innocuous appearance, the @0xengine/xmlrpc package was found to harbor functionality to harvest valuable information and deploy XMRig cryptocurrency miners.

Published: Fri Nov 29 02:39:03 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: The Ongoing Threat Landscape - A Review of Recent Cyber Attacks and Breaches


A recent surge in cyber attacks, data breaches, and ransomware incidents has left many reeling in shock and anxiety. This article provides a comprehensive overview of the current state of cybersecurity threats, reviews recent notable incidents, and discusses measures being taken to mitigate these risks.

Published: Fri Nov 29 02:59:29 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fighting Cybercrime with Actionable Knowledge: Celebrating 35 Years of SANS Institute's Cybersecurity Training

Discover how SANS Institute is revolutionizing cybersecurity education, offering over 85 courses across 149 countries, and providing a reliable metric of cybersecurity excellence through its Global Information Assurance Certification (GIAC) qualifications. Learn more about their new and updated courses, as well as their commitment to staying abreast of emerging trends and technologies.

Published: Fri Nov 29 04:10:19 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Exoskeletons: A Decades-Long Quest for Military Supremacy



The US Army is once again testing powered exoskeletons, but what does this mean for their potential use on the battlefield? Learn more about the latest developments in this complex and multifaceted issue.

Published: Fri Nov 29 05:46:02 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Landscape of Cybersecurity: Understanding the Current State of Threats and Challenges

As cyber threats continue to evolve and compound, businesses must adapt their security measures to stay ahead of the curve. From enhanced data privacy to building resilient supply chains, proactive threat detection is critical in mitigating potential losses associated with cyber and physical security incidents.

Published: Fri Nov 29 05:54:25 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phishing-as-a-Service "Rockstar 2FA" Exposes Microsoft 365 Users to AI-Driven Threats


A new phishing-as-a-service (PhaaS) campaign, dubbed "Rockstar 2FA," has been targeting Microsoft 365 users with AI-driven tactics. The Rockstar 2FA PhaaS toolkit boasts an array of features designed to deceive even the most tech-savvy individuals. With its sophisticated AitM attack and range of features, this PhaaS campaign poses a significant threat to organizations using Microsoft 365 services.

Published: Fri Nov 29 06:20:47 2024 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of Exploitable Security Flaws: Microsoft's Latest Vulnerabilities

Microsoft has acknowledged four security flaws impacting its AI, cloud, enterprise resource planning, and Partner Center offerings, including one that has been exploited in active attacks. The tech giant has rolled out fixes for the shortcomings as part of updates to its online version of Microsoft Power Apps.

Published: Fri Nov 29 06:32:46 2024 by llama3.2 3B Q4_K_M