Authentik is known for its adaptability and flexibility. It seamlessly integrates into existing environments, offering support for various protocols. It simplifies tasks like sign-up and account recovery in applications. This article has been indexed from Cyware News – Latest Cyber…
Category: Cyware News – Latest Cyber News
Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks
Microsoft has classified the issue as low-severity and has not issued any fixes, except for Teams and OneNote apps. Excel, Outlook, PowerPoint, and Word apps remain vulnerable. This article has been indexed from Cyware News – Latest Cyber News Read…
Update: Ransomware Attack on Indian Payment System Traced Back to Jenkins Bug
A recent ransomware attack on Indian payment systems has been traced back to a vulnerability in the widely used Jenkins automation system. The attack targeted a digital payment system used by many Indian banks. This article has been indexed from…
Update: US Agencies Attribute Presidential Campaign Cyberattacks to Iran
The statement — which came Monday from the FBI, CISA, and the Office of the Director of National Intelligence (ODNI) — specifically attributes the recently announced cyberattack on the campaign of former President Donald Trump to Iranian actors. This article…
Microsoft Mandates MFA for all Azure Sign-Ins
Phase 1 in October 2024 will require MFA for accessing Azure portal, Microsoft Entra admin center, and Intune admin center, with Phase 2 in early 2025 extending enforcement to Azure CLI, Azure PowerShell, mobile app, and Infrastructure as Code tools.…
CISA Adds Jenkins CLI Bug to its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a Jenkins Command Line Interface (CLI) Path Traversal vulnerability, known as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities catalog. This article has been indexed from…
Cybercriminals Exploit Paris Olympics With Fake Domains
According to a report by cybersecurity researchers at BforeAI, threat actors used fake social media accounts, stores, ticketing systems, and fraudulent cryptocurrencies to target unsuspecting victims. This article has been indexed from Cyware News – Latest Cyber News Read the…
Ukrainian Bank’s Service for Military Donations Targeted by ‘Massive’ DDoS Attack
The attack, lasting from Friday to Monday, reached 7.5 billion requests per second, according to Monobank CEO. Despite not impacting operations, the bank collaborated with security services and specialists to manage the flood of internet traffic. This article has been…
Azure Domains and Google Abused to Spread Disinformation and Malware
Azure domains and Google have been exploited to spread disinformation and malware in a sophisticated campaign that involves using several Microsoft Azure and OVH cloud subdomains along with Google search notifications. This article has been indexed from Cyware News –…
Crypto Firm Says Hacker Locked All Employees Out of Google Products for Four Days
A cryptocurrency company reported to the SEC that a hacker breached its systems on August 9, 2024, locking all employees out of Google products for four days by changing the passwords on their G-Suite accounts. This article has been indexed…
Mad Liberator Gang Uses Fake Windows Update Screen to Hide Data Theft
A new cybercrime group named Mad Liberator has been identified by the Sophos X-Ops Incident Response team for targeting AnyDesk users. This ransomware group is using a fake Microsoft Windows update screen to hide their data exfiltration activities. This article…
Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs
Cymulate’s proof-of-concept attack demonstrates how multiple on-premises domains syncing to a single Azure tenant can lead to credential mishandling, potentially allowing unauthorized access to different domains. This article has been indexed from Cyware News – Latest Cyber News Read the…
Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data
Thousands of Oracle NetSuite E-Commerce Sites are at Risk of Exposing Sensitive Customer Data due to a widespread misconfiguration in the SuiteCommerce enterprise resource planning (ERP) platform. This article has been indexed from Cyware News – Latest Cyber News Read…
Update: Windows Zero-Day Flaw was Exploited by North Korea-linked Lazarus APT
Microsoft has patched a zero-day vulnerability, known as CVE-2024-38193, that was being exploited by the North Korea-linked Lazarus APT group. This vulnerability is a privilege escalation issue in the Windows Ancillary Function Driver for WinSock. This article has been indexed…
Dozens of Google Products Targeted by Scammers via Malicious Search Ads
Scammers have been targeting dozens of Google products through malicious search ads. They impersonated Google’s product line and used Looker Studio to lock up Windows and Mac users’ browsers. This article has been indexed from Cyware News – Latest Cyber…
A Deep Dive Into a New ValleyRAT Campaign Targeting Chinese Speakers
The malware masquerades as legitimate applications like Microsoft Office and creates an empty file to lure users. It also checks for virtual machines and uses sleep obfuscation to evade memory scanners. This article has been indexed from Cyware News –…
CISA Warns Critical Vulnerabilities in Vonets WiFi Bridge Devices, No Patch Available
These vulnerabilities could allow attackers to execute arbitrary code, disclose sensitive information, or disrupt device functionality, posing a significant threat to industrial and commercial networks relying on these devices. This article has been indexed from Cyware News – Latest Cyber…
Server-Side Template Injection: Transforming Web Applications from Assets to Liabilities – Check Point Research
Server-Side Template Injection (SSTI) vulnerabilities are a growing concern in web applications, allowing attackers to inject malicious code into templates and gain control over servers. This article has been indexed from Cyware News – Latest Cyber News Read the original…
PrestaShop GTAG Websocket Skimmer
A recent investigation uncovered a credit card skimmer using a web socket connection to steal credit card details from an infected PrestaShop website. Attackers use web sockets for obfuscation, making it difficult to analyze traffic. This article has been indexed…
Doppelgänger Operation Rushes to Secure Itself Amid Ongoing Detections, German Agency Says
European hosting companies were found to be supporting the Kremlin-linked disinformation campaign, prompting Doppelgänger operators to quickly back up their systems and data. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Doppelgänger…