UnitedHealth is expected to spend over $2.3 billion this year to recover from a cyberattack on its subsidiary Change Healthcare, which is significantly higher than initial estimates. This article has been indexed from Cyware News – Latest Cyber News Read…
Category: Cyware News – Latest Cyber News
SubSnipe: Open-Source Tool for Finding Subdomains Vulnerable to Takeover
SubSnipe is an open-source tool designed to identify vulnerable subdomains at risk of takeover. Created by Florian Walter, the tool offers improved accuracy and efficiency compared to other similar tools by conducting additional verification steps. This article has been indexed…
Mysterious Chinese Hacking Group ‘GhostEmperor’ Spotted for First Time in Two Years
Security firm Sygnia revealed that GhostEmperor recently compromised a network, using it as a launchpad to access another victim’s systems. This marks the first public report on the group since it was identified by Kaspersky Lab in 2021. This article…
Ransomware Costs at Critical Infrastructure Organizations Soar
According to Sophos, ransomware attacks on critical national infrastructure (CNI) organizations have seen a significant increase in costs over the past year, with the median ransom payments reaching $2.54 million. This article has been indexed from Cyware News – Latest…
UK to Introduce Watered-Down Version of Mandatory Reporting for Ransomware Attacks
Despite the limited scope of the bill, it aims to protect digital services and supply chains from cyberattacks. The legislation will also empower regulators to ensure critical infrastructure companies implement essential cyber safety measures. This article has been indexed from…
Russia-linked FIN7 Hackers Sell Their Security Evasion Tool to Other Groups on Darknet
Russia-linked cybercriminal group FIN7 sells its security evasion tool, AvNeutralizer, to other criminal gangs on darknet forums. The tool helps hackers bypass threat detection systems on victims’ devices. This article has been indexed from Cyware News – Latest Cyber News…
Cisco SSM On-Prem Bug Lets Hackers Change Any User’s Password
Tracked as CVE-2024-20419, the flaw enables remote attackers to set new passwords without authentication. Admins are advised to upgrade to the fixed release to protect vulnerable servers, as there are no workarounds available. This article has been indexed from Cyware…
Weak Credentials Behind Nearly Half of All Cloud-Based Attacks, Research Finds
Credential mismanagement was the leading cause of cloud-based attacks in the first half of 2024, according to a Google Cloud report. Weak credentials and misconfigurations were responsible for 75% of network intrusions during this period. This article has been indexed…
Most GitHub Actions Workflows are Insecure in Some Way
A report by Legit Security highlights concerns around the security posture of the GitHub Actions marketplace, with most custom Actions lacking verification and being maintained by one developer. This article has been indexed from Cyware News – Latest Cyber News…
Report: Half of SMEs Unprepared for Cyber-Threats
According to a new report by JumpCloud, About 49% of SME IT teams feel they lack resources to defend against cyber-threats, with layoffs affecting nearly half of them. 71% believe budget cuts would increase risk. This article has been indexed…
Chinese APT Targets Italian Government Agencies and Companies Using 9002 RAT
The 9002 RAT malware, used in Operation Aurora in 2009, is a versatile trojan that can monitor network traffic, capture screenshots, and execute commands from a remote server. The malware is constantly updated with new variants to avoid detection. This…
Coast Guard Battles Cyberthreats Amid Industry Resistance
A recent report reveals that private sector stakeholders in the marine transportation system are hesitating to utilize critical cybersecurity services offered by the U.S. Coast Guard. This article has been indexed from Cyware News – Latest Cyber News Read the…
Scattered Spider Chooses RansomHub, Qilin for Latest Attacks
Scattered Spider, a notorious cybercrime group, has added ransomware strains RansomHub and Qilin to its arsenal, as revealed by Microsoft. They are known for sophisticated social engineering tactics to breach targets and steal data. This article has been indexed from…
CISA Adds OSGeo GeoServer GeoTools Bug to its Known Exploited Vulnerabilities Catalog
The US Cybersecurity and Infrastructure Security Agency (CISA) issued a directive to federal agencies to fix a critical vulnerability in GeoServer, a popular open-source server, that is actively being exploited. This article has been indexed from Cyware News – Latest…
WP Time Capsule Plugin Update Urged After Critical Security Flaw
By exploiting this flaw, attackers could bypass critical authentication checks, manipulating JSON-encoded POST data to elevate their privileges and effectively log in as site administrators. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Report: Nearly One in Three Software Development Professionals Unaware of Secure Practices
One-third of software development professionals lack awareness of secure practices, according to a report by the Linux Foundation and the Open Source Security Foundation. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
“Konfety” Mobile Ad Fraud Campaign Found Using Unique Obfuscation Method
A massive ad fraud operation known as Konfety is using over 250 Google Play decoy apps to hide malicious twins. The campaign leverages a mobile advertising SDK linked to a Russia-based ad network named CaramelAds. This article has been indexed…
Tether Freezes $29 Million of Cryptocurrency Connected To Cambodian Marketplace Accused of Fueling Scams
Tether has frozen $29 million of cryptocurrency linked to a Cambodian marketplace accused of supporting scams. Tether confirmed the freeze, citing concerns about fraudulent and criminal activities. This article has been indexed from Cyware News – Latest Cyber News Read…
Firmware Update Hides Bluetooth Fingerprints
A team of researchers from the University of California San Diego has developed a firmware update to hide a smartphone’s unique Bluetooth fingerprint, which can be used to track the user. This article has been indexed from Cyware News –…
Fake AWS Packages Ship Command and Control Malware in JPEG Files
The two malicious packages, img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy, were downloaded 190 and 48 times, respectively, before being removed by npm security. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Fake AWS Packages Ship…