A memory-only dropper decrypts and executes a PowerShell-based downloader known as PEAKLIGHT, allowing for the distribution of malware such as Lumma Stealer, Hijack Loader, and CryptBot. This article has been indexed from Cyware News – Latest Cyber News Read the…
Category: Cyware News – Latest Cyber News
GenAI Models are Easily Compromised
GenAI security measures are easily compromised, with 95% of experts expressing low confidence in their security. Attack methods specific to GenAI make it easy for anyone to manipulate applications, gain unauthorized access, and steal data. This article has been indexed…
Hackers can Take Over Ecovacs Home Robots to Spy on Device Owners
Researchers recently warned that Ecovacs vacuum and lawn mower robots could be hacked to spy on their owners, with one flaw that allows attackers to take over devices’ cameras and microphones via Bluetooth. This article has been indexed from Cyware…
Kremlin Blames Widespread Website Disruptions on DDoS Attack; Digital Experts Disagree
The Kremlin attributed the widespread website disruptions in Russia to a DDoS attack, but digital experts disagree, stating that it is unlikely to target all 2,000 Russian telecom operators simultaneously. This article has been indexed from Cyware News – Latest…
CISA Adds Versa Director Bug to its Known Exploited Vulnerabilities Catalog
The vulnerability, CVE-2024-39717, allows administrators to upload a malicious file disguised as a PNG image through the “Change Favicon” feature in Versa Director’s GUI. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
C-Suite Involvement in Cybersecurity is Little More Than Lip Service
The C-suite’s lack of engagement in cybersecurity poses a significant risk despite the growing threat landscape. Organizations need to prioritize cyber-risk management to prevent financial losses and damage to their reputation. This article has been indexed from Cyware News –…
Another Critical SolarWinds Web Help Desk Bug Fixed (CVE-2024-28987)
SolarWinds has fixed another critical bug in Web Help Desk, known as CVE-2024-28987. This flaw involves hardcoded credentials that can be exploited by remote unauthenticated users to access internal functions and alter data. This article has been indexed from Cyware…
Why C-Suite Leaders are Prime Cyber Targets
As per GetApp’s 2024 Executive Cybersecurity Report, 72% of cybersecurity professionals in the US have reported attacks on senior executives in the past 18 months, with AI-generated deepfakes playing a role in 27% of these incidents. This article has been…
Gartner Spotlights AI, Security in 2024 Hype Cycle for Emerging Tech
Gartner’s 2024 Hype Cycle for Emerging Technologies highlights autonomous AI, developer productivity, total experience, and human-centric security and privacy programs as the key technology trends to look out for. This article has been indexed from Cyware News – Latest Cyber…
Financial Firm Fined $850K for Violating SEC Cyber Rules
Equiniti Trust Company, a financial services company, has been fined $850,000 by the Securities and Exchange Commission for failing to protect customer assets in two separate cyberattacks that resulted in the theft of over $6.6 million. This article has been…
FAA Proposes New Cybersecurity Rules for Airplanes
The increasing connectivity of airplanes to data networks has prompted regulators to consider cybersecurity threats from various sources, including maintenance laptops, airport networks, wireless sensors, and satellite communications. This article has been indexed from Cyware News – Latest Cyber News…
Most Ransomware Attacks Occur Between 1 AM and 5 AM
Cybercriminals are continuously evolving their tactics, emphasizing the need for organizations to have continuous monitoring to detect suspicious activities, according to a report by Malwarebytes. This article has been indexed from Cyware News – Latest Cyber News Read the original…
NSA Issues Guidance for Better Logging, Threat Detection to Prevent LotL Incidents
The NSA has released guidelines to improve logging and threat detection for Living-off-the-Land (LotL) attacks in cloud services, enterprise networks, mobile devices, and OT networks as part of a global effort for critical infrastructure security. This article has been indexed…
CISA Adds Dahua IP Camera, Linux Kernel, and Microsoft Exchange Server Bugs to its KEV Catalog
The CISA has added new vulnerabilities to its Known Exploited Vulnerabilities catalog, including Dahua IP Camera authentication bypass flaws, a Linux Kernel buffer overflow issue, and a Microsoft Exchange Server vulnerability. This article has been indexed from Cyware News –…
Greasy Opal’s CAPTCHA Solver Still Serving Cybercrime After 16 Years
Greasy Opal, a well-known developer, has been aiding cybercriminals for 16 years by offering a tool that can solve CAPTCHAs automatically on a large scale, bypassing security measures. This article has been indexed from Cyware News – Latest Cyber News…
Slack Patches AI Bug That Exposed Private Channels
Slack fixed a vulnerability in its AI feature that could allow attackers to steal data from private channels. The flaw involved a prompt injection flaw in an AI feature, which allowed attackers to manipulate the system to perform malicious actions.…
Urgent Edge Security Update: Microsoft Patches Zero-day & RCE Vulnerabilities
The urgent security update, Microsoft Edge Stable Channel Version 128.0.2739.42, based on Chromium versions 128.0.6613.85 and 128.0.6613.84, addresses a total of 25 security issues. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
China-linked APT Velvet Ant Exploited Zero-Day to Compromise Cisco Nexus Switches
The China-linked APT group Velvet Ant exploited a zero-day vulnerability in Cisco switches, CVE-2024-20399, to take control of network devices. The flaw in Cisco NX-OS Software’s CLI enabled attackers with Admin credentials to run arbitrary commands. This article has been…
Exploit for CVE-2024-38054 Released: Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk
This vulnerability allows local attackers to escalate privileges to SYSTEM level through a heap-based buffer overflow. With a CVSS score of 7.8, CVE-2024-38054 is a critical flaw patched by Microsoft in July. This article has been indexed from Cyware News…
Hackers Now Use AppDomain Injection to Drop Cobalt Strike Beacons
Hackers are now using AppDomain Injection to drop Cobalt Strike beacons in a series of attacks that began in July 2024. This technique, known as AppDomain Manager Injection, can weaponize any Microsoft .NET application on Windows. This article has been…