Researchers have developed a technique called “GhostStripe” that can exploit the camera-based computer vision systems of autonomous vehicles, causing them to fail to recognize road signs, making it very risky for Tesla and Baidu Apollo vehicles. This article has been…
Category: Cyware News – Latest Cyber News
‘The Mask’ Espionage Group Resurfaces After 10-Year Hiatus
An advanced persistent threat (APT) group that has been missing in action for more than a decade has suddenly resurfaced in a cyber-espionage campaign targeting organizations in Latin America and Central Africa. This article has been indexed from Cyware News…
Telus Acquires Cybersecurity Services Firm Vumetric
Telus announced Tuesday its acquisition of Vumetric Cybersecurity, a Toronto-based cybersecurity provider that specializes in advanced penetration testing designed to identify cyber vulnerabilities and threats to companies across North America. This article has been indexed from Cyware News – Latest…
New LLMjacking Attack Uses Stolen Cloud Credentials to Target Cloud-Hosted AI Models
Sysdig researchers discovered evidence of a reverse proxy for LLMs being used to provide access to the compromised accounts, suggesting a financial motivation. However, another possible motivation is to extract LLM training data. This article has been indexed from Cyware…
Android Remote Access Trojan Equipped to Harvest Credentials
This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices. This includes the icons of Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter). This article has been indexed from…
Update: Thwarted Cyberattack Targeted Library of Congress in Tandem With October British Library Breach
The Library of Congress was targeted in a cyberattack that occurred in parallel with a high-profile intrusion into the British Library in October 2023 but it was a failed attempt, according to internal documents obtained by Nextgov/FCW. This article has…
Report: Global Ransomware Crisis Worsens
According to NTT Security Holdings’ 2024 Global Threat Intelligence report, ransomware and extortion incidents increased by 67% in 2023, with over 5,000 victims detected or posted across social channels, up from 3,000 in 2022. This article has been indexed from…
Ransomware Attacks Impact 20% of Sensitive Data in Healthcare Orgs
Recent cyber incidents demonstrate the healthcare industry continues to be a prime target for ransomware hackers, according to Rubrik. New research by Rubrik Zero Labs reveals that ransomware attacks produce larger impacts against healthcare targets. This article has been indexed…
Monday.com Removes “Share Update” Feature Abused for Phishing Attacks
The phishing emails pretended to come from a “Human Resources” department, asking users to either acknowledge the “organization’s workplace sex policy” or submit feedback as part of a “2024 Employee Evaluation.” This article has been indexed from Cyware News –…
CISA Explains Why it Doesn’t Call Out Tech Vendors by Name
The CISA isn’t inclined to call out technology vendors when their fundamental errors impact customers — officials contend they can make a greater impact by discerning and generalizing those mistakes for a broader audience. This article has been indexed from…
Widely Used Telit Cinterion Modems Open to SMS-based Device Takeover Attacks
The vulnerabilities were found in the Cinterion EHS5-E series modem, but other Telit Cinterion products with similar software and hardware architecture are also likely impacted, including Cinterion BGS5, EHS5/6/7, PDS5/6/8, ELS61/81, and PLS62. This article has been indexed from Cyware…
Citrix Warns Customers to Update PuTTY Version Installed on Their XenCenter System Manually
Versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR used PuTTY, a third-party component, for SSH connections to guest VMs. However, PuTTY inclusion was deprecated with XenCenter version 8.2.6, and any versions after 8.2.7 will not include PuTTY. This article…
Regulators are Coming for IoT Device Security
Regulators are increasingly focusing on IoT device security due to the vulnerabilities present in many IoT devices. The lack of expertise among manufacturers in securing connected products has led to significant security risks. This article has been indexed from Cyware…
CISA Starts CVE “Vulnrichment” Program
The US Cybersecurity and Infrastructure Agency (CISA) has announced the creation of “Vulnrichment,” a new project that aims to fill the CVE enrichment gap created by NIST National Vulnerability Database’s recent slowdown. This article has been indexed from Cyware News…
Cybercriminals are Getting Faster at Exploiting Vulnerabilities
Cybercriminals are exploiting new vulnerabilities at an increasingly rapid pace, with attacks starting on average just 4.76 days after vulnerabilities are publicly disclosed, according to Fortinet. This article has been indexed from Cyware News – Latest Cyber News Read the…
Google Fixes Fifth Chrome Zero-Day Exploited in Attacks This Year
The high-severity issue tracked as CVE-2024-4671 is a “user after free” vulnerability in the Visuals component that handles the rendering and display of content on the browser. This article has been indexed from Cyware News – Latest Cyber News Read…
SocGholish Sets Sights on Victim Peers
The SocGholish malware is targeting enterprises through fake browser update prompts, compromising legitimate websites to deliver malicious payloads that steal sensitive data and establish persistence on infected systems. This article has been indexed from Cyware News – Latest Cyber News…
How Workforce Reductions Affect Cybersecurity Postures
The Cobalt State of Pentesting Report highlights the challenges faced by the cybersecurity industry in balancing the use of AI and protecting against it, amidst significant workforce reductions and resource constraints. This article has been indexed from Cyware News –…
Update: Boeing Confirms Attempted $200 Million Ransomware Extortion Attempt
Boeing confirmed to CyberScoop that it is the unnamed multinational aeronautical and defense corporation referenced in an indictment unsealed Tuesday by the U.S. Department of Justice. This article has been indexed from Cyware News – Latest Cyber News Read the…
Poland Says it was Targeted by Russian Military Intelligence Hackers
Poland’s CERT-PL said on Wednesday that it had observed a large-scale malware campaign, likely carried out by the hacker group APT28, also known as Fancy Bear, associated with Russia’s military intelligence agency, the GRU. This article has been indexed from…