DVUEFI was created to assist ethical hackers, security researchers, and firmware enthusiasts in beginning their journey into UEFI firmware security by providing examples to explore potential vulnerabilities. This article has been indexed from Cyware News – Latest Cyber News Read…
Category: Cyware News – Latest Cyber News
Swan Bitcoin Alerts Users of Phishing Emails Carrying Fake Data Breach Notice
Swan Bitcoin CEO Cory Klippsten has warned users about phishing emails targeting the platform’s users. The scam involves fake “Data Breach Notice” emails, possibly linked to the Klaviyo and HubSpot data breaches in 2022. This article has been indexed from…
Three UK Men Convicted of Running Website Behind Fraud Calls During COVID-19 Lockdown
The mastermind behind the operation, Callum Picari, along with his accomplices Vijayasidhurshan Vijayanathan and Aza Siddeeque, were arrested by National Crime Agency (NCA) officers in March 2021. This article has been indexed from Cyware News – Latest Cyber News Read…
FTC: Over $110 Million Lost to Bitcoin ATM Scams in 2023
The most common scams involve government impersonation, business impersonation, and tech support, where scammers persuade victims to withdraw cash from their bank accounts and deposit it into Bitcoin ATMs. This article has been indexed from Cyware News – Latest Cyber…
Verkada to Pay $2.95 Million for Alleged CAN-SPAM Act Violations
Hackers exploited a vulnerability in Verkada’s customer support server, gaining access to the Command platform and extracting video footage and customer data. Another incident involved a hacker installing the Mirai botnet on Verkada’s network server. This article has been indexed…
Keeping up With Automated Threats is Becoming Harder
Automated threats are increasingly difficult to keep up with, with 98% of organizations attacked by bots experiencing revenue loss, according to Kasada. Web scraping and account fraud are the primary threats causing revenue losses. This article has been indexed from…
White House Calls Attention to ‘Hard Problem’ of Securing Internet Traffic Routing
The White House advised network operators to implement Resource Public Key Infrastructure (RPKI) to enhance security, which involves digital certificates managed by Regional Internet Registries. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Zyxel Warns of Critical OS Command Injection Flaw in Routers
The flaw, known as CVE-2024-7261, has a CVSS v3 score of 9.8, enabling hackers to execute arbitrary commands on the host operating system by manipulating user-supplied data. This article has been indexed from Cyware News – Latest Cyber News Read…
Canonical Addresses Critical Linux Kernel AWS Vulnerabilities with New Patches
Security researchers have identified six vulnerabilities, including a race condition in the Bluetooth RFCOMM protocol driver that can crash the system, a race condition in the Bluetooth subsystem, and a double-free error in the net/mlx5e module. This article has been…
Researchers Link ManticoraLoader Malware to Ares Malware Developer
Researchers have traced the new ManticoraLoader malware-as-a-service (MaaS) to the cybercriminal group ‘DarkBLUP,’ previously associated with distributing AresLoader and AiDLocker ransomware from the DeadXInject group. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Researchers Find SQL Injection Flaw to Bypass Airport TSA Security Checks
Security researchers discovered a SQL injection vulnerability in FlyCASS, a third-party web service used by airlines to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). This article has been indexed from Cyware News – Latest…
North Korea-linked APT Citrine Sleet Exploit Chrome Zero-Day to Deliver FudModule Rootkit
A North Korean APT used a Google Chrome zero-day flaw, CVE-2024-7971, to deploy the FudModule rootkit. Microsoft researchers linked these attacks to Citrine Sleet (AppleJeus, Labyrinth Chollima, UNC4736, or Hidden Cobra) with medium confidence. This article has been indexed from…
Novel Attack on Windows Spotted in Chinese Phishing Campaign
The malicious DLL implant for the Cobalt Strike attack toolkit gets injected into the Windows binary “runonce.exe,” giving total control to the attackers. The campaign further deploys various malicious tools for reconnaissance and data exfiltration. This article has been indexed…
Roblox Developers Under Attack by New Malicious NPM Campaign
Roblox developers are being targeted by a new malicious npm campaign. Cybercriminals have created fake Roblox npm packages with the aim of deploying a remote access trojan called Quasar. This article has been indexed from Cyware News – Latest Cyber…
A Macro Look at the Most Pressing Cybersecurity Risks
A Forescout report highlighted a 43% increase in published vulnerabilities, with 23,668 reported in H1 2024. Ransomware attacks also rose by 6%, totaling 3,085 incidents, with the U.S. being the most targeted country. This article has been indexed from Cyware…
Uniqkey Raises $5.92M in Funding
Backers included BackingMinds, in combination with industry veterans such as Jesper Zerlang (ex-CEO of Logpoint), Lars Ankjer, Otto Krabbe, Rolf Bladt, and several angels and key employees. This article has been indexed from Cyware News – Latest Cyber News Read…
A New Variant of Cicada Ransomware Targets VMware ESXi Systems
The group behind Cicada3301 has been recruiting affiliates on cybercrime forums since June. It is speculated that Cicada3301 could be related to the now-defunct ALPHV group, as both ransomware share similarities. This article has been indexed from Cyware News –…
Sinon: Open-Source Automatic Generative Burn-in for Windows Deception Hosts
Sinon is an open-source tool designed to automate the burn-in process of Windows-based deception hosts. It simplifies the orchestration of deception hosts at scale by incorporating generative capabilities to introduce diversity and randomness. This article has been indexed from Cyware…
GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware
GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document visualization to trick victims into revealing sensitive information or downloading malware payloads. This article has been indexed from Cyware News…
Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises
A fake Palo Alto GlobalProtect VPN access tool is being used as bait by threat actors targeting Middle Eastern organizations. The malware, disguised as a legitimate tool, can steal data and execute remote commands to infiltrate networks further. This article…