Category: Cyware News – Latest Cyber News

Vulnerability Prioritization is Only the Beginning

Vulnerability prioritization is crucial in managing security threats but is only the beginning. Knowing which vulnerabilities to address is not enough; the focus should be on quickly addressing and mitigating them. This article has been indexed from Cyware News –…

Fraud Tactics and the Growing Prevalence of AI Scams

Hiya, a call-blocking service, identified nearly 20 billion spam calls in the first half of 2024, with over 107 million spam calls daily. Of the 42 countries analyzed, 25 had spam flag rates exceeding 20%, some even surpassing 50%. This…

US Charges Alleged Member of Russian Karakurt Ransomware Group

A 33-year-old Latvian man, Deniss Zolotarjovs, residing in Moscow, has been charged in the U.S. with money laundering, financial fraud, and extortion related to the Russian ransomware group Karakurt. This article has been indexed from Cyware News – Latest Cyber…

WordPress Websites Used to Distribute ClearFake Trojan Malware

WordPress websites were found distributing the ClearFake Trojan malware, a dangerous threat that can lead to ransomware infections. The malware was disguised as a prompt to install a root certificate. This article has been indexed from Cyware News – Latest…

Hundreds of Online Stores Hacked in New Campaign

A new malware campaign has targeted numerous online stores, compromising their security by injecting digital skimmers that can steal credit card information during the checkout process. This article has been indexed from Cyware News – Latest Cyber News Read the…

CISA’s $524M headquarters slated for DHS campus in 2027

CISA’s new $524M headquarters, set to be completed in 2027, will be located at the DHS campus in Washington. Construction is expected to begin in the fall, consolidating the agency’s workforce currently spread across five office rentals. This article has…

NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

NIST has issued new quantum-resistant cryptography standards, alerting cybersecurity teams to prepare for quantum threats. Quantum computing is expected to jeopardize current cryptographic methods within ten years. This article has been indexed from Cyware News – Latest Cyber News Read…

GenAI Models are Easily Compromised

GenAI security measures are easily compromised, with 95% of experts expressing low confidence in their security. Attack methods specific to GenAI make it easy for anyone to manipulate applications, gain unauthorized access, and steal data. This article has been indexed…

C-Suite Involvement in Cybersecurity is Little More Than Lip Service

The C-suite’s lack of engagement in cybersecurity poses a significant risk despite the growing threat landscape. Organizations need to prioritize cyber-risk management to prevent financial losses and damage to their reputation. This article has been indexed from Cyware News –…

Why C-Suite Leaders are Prime Cyber Targets

As per GetApp’s 2024 Executive Cybersecurity Report, 72% of cybersecurity professionals in the US have reported attacks on senior executives in the past 18 months, with AI-generated deepfakes playing a role in 27% of these incidents. This article has been…

Gartner Spotlights AI, Security in 2024 Hype Cycle for Emerging Tech

Gartner’s 2024 Hype Cycle for Emerging Technologies highlights autonomous AI, developer productivity, total experience, and human-centric security and privacy programs as the key technology trends to look out for. This article has been indexed from Cyware News – Latest Cyber…

Financial Firm Fined $850K for Violating SEC Cyber Rules

Equiniti Trust Company, a financial services company, has been fined $850,000 by the Securities and Exchange Commission for failing to protect customer assets in two separate cyberattacks that resulted in the theft of over $6.6 million. This article has been…

FAA Proposes New Cybersecurity Rules for Airplanes

The increasing connectivity of airplanes to data networks has prompted regulators to consider cybersecurity threats from various sources, including maintenance laptops, airport networks, wireless sensors, and satellite communications. This article has been indexed from Cyware News – Latest Cyber News…

Most Ransomware Attacks Occur Between 1 AM and 5 AM

Cybercriminals are continuously evolving their tactics, emphasizing the need for organizations to have continuous monitoring to detect suspicious activities, according to a report by Malwarebytes. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Slack Patches AI Bug That Exposed Private Channels

Slack fixed a vulnerability in its AI feature that could allow attackers to steal data from private channels. The flaw involved a prompt injection flaw in an AI feature, which allowed attackers to manipulate the system to perform malicious actions.…

SonicWall Issues Urgent Patch for Critical Firewall Vulnerability

SonicWall has released an urgent patch to address a critical vulnerability (CVE-2024-40766) in SonicOS, which could allow unauthorized access to their firewalls. The vulnerability could lead to system compromise and network disruption. This article has been indexed from Cyware News…

Qilin Ransomware Caught Stealing Credentials Stored in Google Chrome

A recent Qilin ransomware attack targeted several endpoints, stealing VPN credentials and Chrome browser data. This attack, detected in July 2024, involved network access through compromised VPN credentials without multi-factor authentication. This article has been indexed from Cyware News –…

PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

Cryptojacking attackers are targeting poorly secured PostgreSQL databases on Linux systems. According to Aqua Security researchers, the attack begins with brute-force attempts to gain access to the database credentials. This article has been indexed from Cyware News – Latest Cyber…

New Phishing Campaign Targets US Government Organizations

The attackers have become more sophisticated in their approach, specifically targeting email addresses from 338 US government entities. The phishing links redirect victims to a fake Microsoft Teams login page. This article has been indexed from Cyware News – Latest…

Leveraging Ancient Tactics for Modern Malware

The HYAS Threat Intelligence team has detected threat actors using Steam for malicious activities, like hosting C2 domain addresses and exploiting user accounts. One actor used a Substitution Cipher to hide C2 domains. This article has been indexed from Cyware…

Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills

The suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to slack.com. However, after several days, it started redirecting to a click tracker, showing signs of a potentially malicious campaign. This article has…

Critical GitHub Enterprise Server Flaw Patched, Admin Access at Risk

GitHub disclosed three security vulnerabilities in GitHub Enterprise Server (GHES), including CVE-2024-6800, CVE-2024-6337, and CVE-2024-7711. The most severe, CVE-2024-6800, allowed attackers to forge a SAML response, granting site admin privileges. This article has been indexed from Cyware News – Latest…

Google Fixes Ninth Chrome Zero-Day Exploited in Attacks This Year

Google released an emergency security update to fix the ninth zero-day vulnerability exploited in attacks this year. The vulnerability, known as CVE-2024-7971, involves a type confusion weakness in Chrome’s V8 JavaScript engine. This article has been indexed from Cyware News…

MegaMedusa, RipperSec’s Public Web DDoS Attack Tool

RipperSec, a pro-Palestinian hacktivist group based in Malaysia, has released MegaMedusa, a publicly available Web DDoS attack tool that simplifies launching large-scale DDoS attacks. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Critical Remote Code Execution Vulnerability Addressed in GiveWP Plugin

The vulnerability, identified as CVE-2024-5932, arises from inadequate validation of user-provided serialized data, allowing attackers to inject harmful PHP objects through the give_title parameter. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

RCE Vulnerability in Atlassian Bamboo Data Center and Server

This flaw, present in versions 9.1.0 through 9.6.0, allows authenticated attackers to execute arbitrary code within the Bamboo environment, posing risks to confidentiality, integrity, and availability. This article has been indexed from Cyware News – Latest Cyber News Read the…

Spring Security Flaw Leaves Applications Open to Unauthorized Access

A high-severity vulnerability (CVE-2024-38810) has been discovered in Spring Security, potentially allowing unauthorized access to sensitive data within affected applications. The vulnerability impacts Spring Security versions 6.3.0 and 6.3.1. This article has been indexed from Cyware News – Latest Cyber…

Rising Abuse of URL Rewriting in Phishing

The abuse of URL rewriting in phishing attacks has emerged as a new trend, allowing threat actors to hide malicious links behind trusted domains of security vendors. Exploiting these features enables bypassing detection mechanisms. This article has been indexed from…

Africa’s Economies Feel Pain of Cybersecurity Deficit

Cybercrime is a growing threat to Africa’s economies, hindering their progress despite rapid GDP growth. The continent faces challenges like digital illiteracy and a shortage of cybersecurity professionals. This article has been indexed from Cyware News – Latest Cyber News…

To Improve Your Cybersecurity Posture, Focus on the Data

To bolster cybersecurity, focus on managing and utilizing enterprise data efficiently. Companies possess significant data reserves, yet these are often scattered across different systems, necessitating manual efforts to extract value. This article has been indexed from Cyware News – Latest…

UK: NCSC Opens Cyber Resilience Audit Scheme to Applicants

The NCSC has launched the Cyber Resilience Audit (CRA) scheme to find auditors for a new cyber-resilience initiative. It focuses on conducting independent audits based on the Cyber Assessment Framework (CAF) to support nationally critical sectors. This article has been…

OpenAI Kills Iranian Accounts Spreading Us Election Disinformation

The operation was linked to Iran’s Storm-2035, also flagged by Microsoft for election interference. Google has also reported Iranian cyber influence activity. OpenAI identified 12 X accounts and one Instagram account involved in the operation. This article has been indexed…

Digital Wallets can Allow Purchases With Stolen Credit Cards

Once a stolen card is added to the attacker’s wallet, they can use it to make purchases without being detected, even after the original card has been canceled. Recurring transactions are also vulnerable to abuse, allowing payments with locked cards.…

x64dbg: Open-Source Binary Debugger for Windows

x64dbg is an open-source binary debugger for Windows, perfect for malware analysis and reverse engineering executables. It has a user-friendly UI that simplifies navigation and provides context on the process. This article has been indexed from Cyware News – Latest…

Authentik: Open-Source Identity Provider

Authentik is known for its adaptability and flexibility. It seamlessly integrates into existing environments, offering support for various protocols. It simplifies tasks like sign-up and account recovery in applications. This article has been indexed from Cyware News – Latest Cyber…

Microsoft Mandates MFA for all Azure Sign-Ins

Phase 1 in October 2024 will require MFA for accessing Azure portal, Microsoft Entra admin center, and Intune admin center, with Phase 2 in early 2025 extending enforcement to Azure CLI, Azure PowerShell, mobile app, and Infrastructure as Code tools.…

Cybercriminals Exploit Paris Olympics With Fake Domains

According to a report by cybersecurity researchers at BforeAI, threat actors used fake social media accounts, stores, ticketing systems, and fraudulent cryptocurrencies to target unsuspecting victims. This article has been indexed from Cyware News – Latest Cyber News Read the…

Unfixed Microsoft Entra ID Authentication Bypass Threatens Hybrid IDs

Cymulate’s proof-of-concept attack demonstrates how multiple on-premises domains syncing to a single Azure tenant can lead to credential mishandling, potentially allowing unauthorized access to different domains. This article has been indexed from Cyware News – Latest Cyber News Read the…

PrestaShop GTAG Websocket Skimmer

A recent investigation uncovered a credit card skimmer using a web socket connection to steal credit card details from an infected PrestaShop website. Attackers use web sockets for obfuscation, making it difficult to analyze traffic. This article has been indexed…

DigiCert Announces Acquisition of Vercara

DigiCert has announced the acquisition of Vercara to offer customers a unified DNS and certificate management experience. Vercara provides cloud-based services like managed DNS and DDoS security to protect networks and applications. This article has been indexed from Cyware News…