0

Commercial Spyware Vendors Have a Copycat in Top Russian APT

Thứ Sáu, 30 tháng 8, 2024
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.
0

'Voldemort' Malware Curses Orgs Using Global Tax Authorities

The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.
0

Brazilian Ad Fraud Network 'Camu' Hits 2B+ Daily Bid Requests

Thứ Năm, 29 tháng 8, 2024
The global Internet helps just about everything to scale more easily, including piracy and ad fraud.
0

SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024

0

Exploited: CISA Highlights Apache OFBiz Flaw After PoC Emerges

The vulnerability carries nearly the highest score possible on the CVSS scale, at 9.8, impacting a system used by major companies around the world.
0

South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel

Thứ Tư, 28 tháng 8, 2024
The most popular office software suite in China actually has two critical vulnerabilities, which allowed hackers the opportunity for remote code execution. Time to patch.
0

BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets

The pivot is one of several changes the groups using the malware have used in recent attacks.
0

Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking

Novel attack vectors leverage the CVE-2023-22527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.
0

Zimbabwe Trains Government Officials in Cybersecurity Skills

African nation's proactive approach to cybersecurity comes amid a rise in painful cyberattacks including the breach of a major bank.
0

77% of Educational Institutions Spotted a Cyberattack Within the Last 12 Months

Thứ Ba, 27 tháng 8, 2024
0

PoC Exploit for Zero-Click Vulnerability Made Available to the Masses

The exploit can be accessed on GitHub and makes it easier for the flaw to be exploited by threat actors.
0

Microsoft's Sway Serves as Launchpad for 'Quishing' Campaign

The attack is a mashup of QR codes and phishing that gets users to click on links to malicious Web pages.
0

Microsoft to Host Windows Security Summit in CrowdStrike Outage Aftermath

Thứ Hai, 26 tháng 8, 2024
The tech giant seeks to work with endpoint security partners, including CrowdStrike, on how to prevent an outage event of such gravity from happening again.
0

Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts

Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers.
0

Seattle-Tacoma Airport Suffers System Outages Due to Possible Cyberattack

As the entire Port of Seattle struggles to become fully operational once more, the airport recommends that those who are traveling take extra precautions.
0

Aggressively Monitoring for Changes Is a Key Aspect of Cybersecurity

Employees and management must fully support change detection and file integrity monitoring, allowing a proactive approach with definitive security controls to be implemented against threat actors.
0

India's Critical Infrastructure Suffers Spike in Cyberattacks

Chủ Nhật, 25 tháng 8, 2024
The financial and government sectors have come under increasing attacks in India, with the Reserve Bank of India (RBI) warning banks to double down on cybersecurity.
0

NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

Thứ Sáu, 23 tháng 8, 2024
The release of new NIST quantum-proof cryptography standards signals it's time for cybersecurity teams to get serious about preparing for the rise of quantum threats.
0

Patch Now: Second SolarWinds Critical Bug in Web Help Desk

The disclosure of CVE-2024-28987 means that, in two weeks, there have been two critical bugs and corresponding patches for SolarWinds' less-often-discussed IT help desk software.
0

Liverpool Fans Take English Premier League Title for Ticket Scams

Ticket scams are costing football fans close to £200 a season, on average, according to a report.
0

NFC Traffic Stealer Targets Android Users & Their Banking Info

Thứ Năm, 22 tháng 8, 2024
The malware builds on a near-field communication tool in combination with phishing and social engineering to steal cash.
0

NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents

The guidance is part of a coordinated, global effort to eradicate living-off-the-land techniques used against critical infrastructure.
0

Infostealers Waltz Through macOS to Grab Crypto Wallets, Browser Creds

Ironically, Macs' lower risk profile may make them more susceptible to any given threat than the average Windows or Linux system.
0

Google Chrome Update Fixes Flaw Exploited in the Wild

New Chrome release set to roll out over the next few days addresses 38 security issues in the browser.
0

Malicious Links, AI-Enabled Tools, and Attacks on SMBs Among Top Cybersecurity Threats in H1 Mimecast Global Threat Intelligence Report

Thứ Tư, 21 tháng 8, 2024
0

'Styx Stealer' Blows Its Own Cover With Sloppy OpSec Mistake

An individual in Turkey is behind a new information stealer that researchers have recently observed in multiple attacks.
0

Taiwan University Under Fire From Unique DLL Backdoor

It's unclear who the "Msupedge" threat actors were or what the motive for the attack was.
0

Azure Kubernetes Bug Lays Open Cluster Secrets

Thứ Ba, 20 tháng 8, 2024
Vulnerability gave attackers with access to a pod a way to obtain credentials and other secrets.
0

Toyota Customer, Employee Data Leaks in Confirmed Data Breach

The company has released little information on the breach, but claims it's been in contact with the individuals affected.
0

Name That Toon: Security Games

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks

Thứ Hai, 19 tháng 8, 2024
Outlook, Teams, PowerPoint, OneNote, Excel, and Word undermine macOS's strict user permission-based privacy and security protections.
0

IBM SkillsBuild Cybersecurity and Data Analytics Certificates to be Deployed in Community College Systems

0

Every Google Pixel Phone Has a Verizon App that Doubles As a Backdoor

What is a Verizon Wireless demo store app doing on non-Verizon phones, and why is it a vehicle to an attacker?
0

National Public Data Confirms Massive Breach

Cyber incidents like this highlight the need for tougher action on companies that fail to adequately protect consumer data.
0

Assume Breach When Building AI Apps

AI jailbreaks are not vulnerabilities; they are expected behavior.
0

Human Nature Is Causing Our Cybersecurity Problem

By moving beyond guidelines and enforcing accountability, encouraging innovation, and prioritizing the safety and well-being of our communities in the digital age, we can build a more secure software future.
0

A Critical Look at the State Department's Risk Management Profile

The US needs to seize this moment to set a global standard for responsible and ethical AI, ensuring that technological progress upholds and advances human rights.
0

Iran Reportedly Grapples With Major Cyberattack on Banking Systems

Thứ Sáu, 16 tháng 8, 2024
The last known cyberattack waged against Iranian infrastructure took place last December with the blame placed on Israel and the US.
0

Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats?

When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.
0

CISA, FBI Assure American Voters of Cyber Safe Electoral Process

Though it is possible for cyber disruptions to occur, CISA and the FBI say that ransomware will not impact casting or counting ballots.
0

DARPA Announces AI Cyber Challenge Finalists

Teams designed AI systems to secure open-source infrastructure software to be used in industry sectors such as financial services, utilities, and healthcare. Each finalist was awarded a $2 million prize.
0

Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs

Thứ Năm, 15 tháng 8, 2024
The attack affects organizations that have synced multiple on-premises Active Directory domains to a single Azure tenant.
0

SolarWinds: Critical RCE Bug Requires Urgent Patch

The vulnerability was given a high-severity CVSS score, indicating that customers should act swiftly to mitigate the flaw.
0

Google: Iran's Charming Kitten Targets US Presidential Elections, Israeli Military

The threat group tracked as APT42 remains on the warpath with various phishing and other social engineering campaigns, as tensions with Israel rise.
0

Experian Acquires Behavioral Analytics Company NeuroID

Thứ Tư, 14 tháng 8, 2024
0

GitHub Attack Vector Cracks Open Google, Microsoft, AWS Projects

Cloud services and thus millions of end users who access them could have been affected by the poisoning of artifacts in the development workflow of open source projects.
0

Critical Ivanti vTM Bug Allows Unauthorized Admin Access

Thứ Ba, 13 tháng 8, 2024
The CVSS 9.8 authentication bypass in Ivanti's traffic manager admin panel already has a proof-of-concept (PoC) exploit lurking in the wild.
0

Microsoft Azure AI Health Bot Infected With Critical Vulnerabilities

Privilege escalation flaws in the healthcare chatbot platform could have allowed unauthorized cross-tenant access and management of other customers’ resources.
0

FBI Shuts Down Dozens of Radar/Dispossessor Ransomware Servers

Computer infrastructure in the US, UK, and Germany associated with the cybercriminal group, which targeted SMBs using double extortion, is officially out of commission.
0

APT41 Spinoff Expands Chinese Actor's Scope Beyond Asia

Earth Baku, yet another subgroup of the highly active and increasingly sophisticated collective, is moving into EMEA with new malware and living-off-the-land (LOL) tactics.
0

UN Approves Cybercrime Treaty Despite Major Tech, Privacy Concerns

Thứ Hai, 12 tháng 8, 2024
The treaty would allow any country to request technology firms to aid in cybercrime investigations and preserve data about their users — potentially imperiling penetration testers and security researchers, among others.
0

AMD Issues Updates for Silicon-Level 'SinkClose' Processor Flaw

The vulnerability has been around for nearly 20 years and gives sophisticated attackers a way to bury virtually undetectable bootkits on devices with EPYC and Ryzen microprocessors.
0

CLFS Bug Crashes Even Updated Windows 10, 11 Systems

A quick and easy exploit for crashing Windows computers has no fix yet nor really any way to mitigate its effects.
0

A Lesson From the CrowdStrike Incident

The recent outage highlights the critical importance of adhering to established processes and governance frameworks.
0

Tennessee Man Helped DPRK Workers Get Jobs at US Orgs, Fund WMDs

US citizens play middleman between US companies and the North Korean government agents they unwittingly hire.
0

Media & Victims Find Common Ground Against Hackers

Thứ Sáu, 9 tháng 8, 2024
In a panel at Black Hat 2024, journalists and investigators explain their differing goals when a victim organization is breached.
0

Rubrik Partners With Mandiant for Cyber Resilience and Accelerated Incident Response Recovery

0

CrowdStrike's Legal Pressures Mount, Could Blaze Path to Liability

Following the July 19 outages caused by a bad update, the cybersecurity firm faces shareholder lawsuits and pressure to pay damages for at least one major customer, by Delta Airlines. Will software liability follow?
0

How to Weaponize Microsoft Copilot for Cyberattackers

Thứ Năm, 8 tháng 8, 2024
At Black Hat USA, security researcher Michael Bargury released a "LOLCopilot" ethical hacking module to demonstrate how attackers can exploit Microsoft Copilot — and offered advice for defensive tooling.
0

Microsoft on CISOs: Thriving Community Means Stronger Security

Microsoft execs detailed the company's reaction to the CrowdStrike incident and emphasized the value of a collective identity.
0

'0.0.0.0 Day' Flaw Puts Chrome, Firefox, Mozilla Browsers at RCE Risk

Attackers can use a seemingly innocuous IP address to exploit localhost APIs to conduct a range of malicious activity, including unauthorized access to user data and the delivery of malware.
0

CrowdStrike Will Give Customers Control Over Falcon Sensor Updates

Thứ Tư, 7 tháng 8, 2024
The security vendor has also implemented several changes to protect against the kind of snafu that crashed 8.5 million Windows computers worldwide last month.
0

Knostic Wins 2024 Black Hat Startup Spotlight Competition

During a "Shark Tank"-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
0

Creating Insecure AI Assistants With Microsoft Copilot Studio Is Easy

Microsoft claims 50,000 organizations are using its new Copilot Creation tool, but researcher Michael Bargury demonstrated at Black Hat USA ways it could unleash insecure chatbots.
0

Chameleon Banking Trojan Makes a Comeback Cloaked as CRM App

The evolving malware is targeting hospitality and other B2C workers in Canada and Europe with capabilities that can evade Android 13 security restrictions.
0

Startup Spotlight: RAD Security Brings Behavioral Profiling to Cloud

Thứ Ba, 6 tháng 8, 2024
Cybersecurity startup RAD Security, a finalist in this year's Black Hat USA Startup Spotlight competition, looks for "drift events," or events that vary from the baseline.
0

Attackers Use Multiple Techniques to Bypass Reputation-Based Security

Protections like Windows Smart App Control are useful but susceptible to attacks that allow threat actors initial access to an environment without triggering any alerts.
0

Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited

Everyone expected some kind of cyberattack during the Olympics. If this is the best they've got, the bad guys don't deserve a spot on the podium.
0

Russia's Priorities in Prisoner Swap Suggest Cyber Focus

At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap.
0

China's Evasive Panda Attacks ISP to Send Malicious Software Updates

Thứ Hai, 5 tháng 8, 2024
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
0

Startup Spotlight: LeakSignal Helps Plug Leaky Data in Organizations

Cybersecurity startup LeakSignal, a finalists in this year's Black Hat USA Startup Spotlight competition, helps organizations see where data is leaking within their environment.
0

Protect Data Differently for a Different World

Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach.
0

How Regional Regulations Shape Global Cybersecurity Culture

Ultimately, a more cyber-secure world requires a global governing body to regulate and campaign for cybersecurity, with consistent regulatory requirements in the various regions around the world.
0

Russia's 'Fighting Ursa' APT Uses Car Ads to Install HeadLace Malware

The scheme, from the group also known as APT28, involves targeting Eastern European diplomats in need of personal transportation, tempting them with a purported good deal on a Audi Q7 Quattro SUV.
0

Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand

Thứ Sáu, 2 tháng 8, 2024
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
0

China's APT41 Targets Taiwan Research Institute for Cyber Espionage

The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.
0

Twilio Users Kicked Out of Desktop App, Forced to Switch to Mobile

Now that the Authy Desktop app has reached EOL and is no longer accessible, users are hoping their 2FA tokens synced correctly with their mobile devices.
0

'Sitting Ducks' Attacks Create Hijacking Threat for Domain Name Owners

Thứ Năm, 1 tháng 8, 2024
Researchers say the attacks are easy to perform, difficult to contact, nearly unrecognizable, and "entirely preventable."
0

Meta Agrees to $1.4B Settlement With Texas Over Biometric Privacy

The process took two years, but this is the first successful settlement obtained under Texas' Capture or Use of Biometric Identifier Act, which forbids the capture of biometric data without users' explicit consent.