Category: Cyware News – Latest Cyber News

Researchers Warn of a New Critical Apache OFBiz Flaw

The vulnerability allows unauthenticated users to execute screen rendering code under certain conditions in versions up to 18.12.14, with version 18.12.15 addressing the issue. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Mint Stealer: New MaaS Malware Threatens Confidential Data

A new MaaS malware known as Mint Stealer has emerged, threatening confidential data. This malware, identified by experts from Cyfirma, is designed to steal a wide range of information by employing advanced encryption and obfuscation techniques. This article has been…

US Senate Confirms First DOD Cyber Policy Chief

The Senate has confirmed Michael Sulmeyer as the first cyber policy chief at the Defense Department, where he will serve as the assistant secretary of Defense for cyber policy. This article has been indexed from Cyware News – Latest Cyber…

Israeli Hacktivist Group Claims it Took Down Iran’s Internet

WeRedEvils announced their intention to target Iranian systems on Telegram, claiming their attack was successful in infiltrating Iran’s computer systems, stealing data, and causing the outage. This article has been indexed from Cyware News – Latest Cyber News Read the…

US Sues TikTok for Violating Children Privacy Protection Laws

The lawsuit alleges that TikTok collected personal information from children under 13 without parental consent, failed to delete children-created accounts, and misled parents about data collection. This article has been indexed from Cyware News – Latest Cyber News Read the…

Surge in Magniber Ransomware Attacks Impact Home Users Worldwide

Unlike other ransomware groups targeting businesses, Magniber focuses on individuals. Victims report their devices getting infected after running software cracks. Ransom demands start at $1,000 and escalate to $5,000 if not paid within three days. This article has been indexed…

Linux Kernel Impacted by New SLUBStick Cross-Cache Attack

A new Linux Kernel attack called SLUBStick has a 99% success rate in turning a limited heap vulnerability into a powerful memory read-and-write capability, allowing for privilege escalation and container escape. This article has been indexed from Cyware News –…

Cryptonator Seized for Laundering Ransom Payments, Stolen Crypto

The U.S. and German law enforcement have seized the domain of the Cryptonator crypto wallet platform, indicting its operator, Roman Boss, for money laundering and running an unlicensed money service business. This article has been indexed from Cyware News –…

Protect AI Raises $60M in Series B Financing

Protect AI, a Seattle-based AI and ML security company, raised $60M in Series B funding led by Evolution Equity Partners, with participation from 01 Advisors, StepStone Group, Samsung, and existing investors. This article has been indexed from Cyware News –…

New BlankBot Android Malware Targets Users’ Banking Data

BlankBot, which is still in development, has advanced features like screen recording, keylogging, and remote control, posing a significant threat due to its evasion techniques. This article has been indexed from Cyware News – Latest Cyber News Read the original…

US Releases Russian Hackers and Spies as Part of Prisoner Swap

The United States, along with Germany and Slovenia, participated in a historic prisoner exchange with Russia, releasing hackers, spies, and an assassin. The swap took place at an airport in Ankara, Turkey. This article has been indexed from Cyware News…

Newly Identified BITSLOTH Backdoor Uses Novel C2 Communication Channel

A new Windows backdoor named BITSLOTH has been discovered by cybersecurity researchers. This malware exploits the Background Intelligent Transfer Service (BITS) for stealthy communication, making it difficult to detect. This article has been indexed from Cyware News – Latest Cyber…

FBI Warns of Scammers Posing as Crypto Exchange Employees

These fraudsters contact victims through phone calls or messages, posing as representatives of legitimate crypto exchanges, and create a sense of urgency by claiming security issues or hack attempts on the victims’ accounts. This article has been indexed from Cyware…

Airlines are Flying Blind on Third-Party Risks

Airlines are facing challenges with third-party risks in their supply chain. Recent revelations regarding risks in Boeing’s supply chain have emphasized the importance of measuring and mitigating these risks, according to SecurityScorecard. This article has been indexed from Cyware News…

US Senate Panel Advances Cyber Regulatory Harmonization Bill

The Streamlining Federal Cybersecurity Regulations Act, led by senators Gary Peters and James Lankford, would create an interagency group to synchronize U.S. cyber regulatory regimes and establish a pilot program for testing new frameworks. This article has been indexed from…

StackExchange Abused to Spread Malicious PyPI Packages as Answers

Threat actors used StackExchange to promote malicious PyPi packages, including ‘spl-types,’ ‘raydium,’ ‘sol-structs,’ ‘sol-instruct,’ and ‘raydium-sdk,’ which steal data from browsers, messaging apps, and cryptocurrency wallets. This article has been indexed from Cyware News – Latest Cyber News Read the…

Homebrew Security Audit Finds 25 Vulnerabilities

A security audit sponsored by the Open Tech Fund in August 2023 revealed 25 vulnerabilities in Homebrew. The audit found issues that could have allowed attackers to execute code, modify builds, control CI/CD workflows, and access sensitive data. This article…

Google Chrome Adds App-Bound Encryption to Block Infostealer Malware

Google Chrome has implemented app-bound encryption to enhance cookie protection on Windows and defend against infostealer malware. This new feature encrypts data tied to app identity, similar to macOS’s Keychain, to prevent unauthorized access. This article has been indexed from…

Threat Intelligence: A Blessing and a Curse?

Access to timely and accurate threat intelligence is essential for organizations, but it can be overwhelming to navigate the vast amount of available data and feeds. Balancing comprehensive information with relevance is crucial. This article has been indexed from Cyware…

Malicious Package Hidden in PyPI Discovered

The FortiGuard Labs team has discovered a malicious PyPI package that poses a significant risk to individuals and institutions by potentially leaking credentials and sensitive information. This article has been indexed from Cyware News – Latest Cyber News Read the…

Innovative Approach Promises Faster Bug Fixes

Birgit Hofer and Thomas Hirsch from TU Graz have developed a new approach to speed up software bug fixes. By identifying bottlenecks in fault localization, they created a scalable solution using NLP and metrics to analyze code for faults. This…

Microsoft Confirms Azure, 365 Outage Linked to DDoS Attack

Microsoft confirmed that an eight-hour outage on Tuesday affecting its Azure portal, Microsoft 365, and Microsoft Purview services was caused by a DDoS attack. The company mentioned that its response to the outage may have worsened the impact. This article…

Apple Extends Zero-Day Patch to Older Macs, Urges Immediate Update

Apple has released a critical zero-day patch for older Macs running macOS Monterey 12.7.6, addressing an actively exploited vulnerability (CVE-2024-23296). The flaw in Apple’s RTKit real-time OS could allow unauthorized access to kernel memory. This article has been indexed from…

EvilProxy Phishing Kit Used in Over One Million Attacks Monthly

EvilProxy, known as the “LockBit of phishing,” is a popular phishing kit used in over a million attacks each month. It allows cybercriminals to launch ransomware infections, steal data, and compromise business emails. This article has been indexed from Cyware…

Beware of Fake AI Tools Masking a Very Real Malware Threat

Attackers disguise malicious tools as legitimate GenAI apps through phishing sites, web browser extensions, fake apps on mobile stores, and malicious ads on social media. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Threat Actor Impersonates Google via Fake Ads for Authenticator

A threat actor recently impersonated Google through a fake ad for the Google Authenticator, a popular multi-factor authentication program. This resulted in innocent users unknowingly downloading malware or falling victim to phishing scams. This article has been indexed from Cyware…

Source Code of Phorpiex Botnet with Anti-AV Capabilities on Sale

The notorious Trik botnet, aka Phorpiex, is being sold in antivirus circles, offering advanced capabilities to evade detection. This C++ botnet includes modules such as a crypto clipper, a USB emitter, and a PE infector targeting crypto wallets. This article…

New Specula Tool Uses Outlook for Remote Code Execution in Windows

TrustedSec released a post-exploitation framework called “Specula”, which exploits CVE-2017-11774 to create a custom Outlook Home Page using WebView and execute arbitrary commands on compromised Windows systems. This article has been indexed from Cyware News – Latest Cyber News Read…

Report: 40% of Environments Exposed to Full Take Over

The Blue Report 2024 highlights alarming findings, with 40% of environments vulnerable to total takeover, emphasizing the importance of cybersecurity. Prevention effectiveness has improved to 69%, but detection effectiveness has dropped to 12%. This article has been indexed from Cyware…

New PowerShell Backdoor Linked to Zloader Malware

The newly discovered backdoor has limited samples available on VirusTotal, making detection more difficult. It operates by collecting system information and sending it to a command and control server, awaiting further instructions. This article has been indexed from Cyware News…

Change Healthcare Begins to Notify Millions Affected by Hack

Change Healthcare has started the process of notifying millions of Americans affected by a massive cyberattack and data theft that occurred more than five months ago. The company is sending individual breach notification letters on a rolling basis. This article…

European Central Bank Concludes Banking Cyber Stress Test

The European Central Bank has completed a cyber stress test for the banking sector, finding that while banks have strong response frameworks, there is still room for improvement in recovery capabilities. This article has been indexed from Cyware News –…

Microsoft 365 Users Targeted by Phishers Abusing Microsoft Forms

The phishing campaigns involve sending fake emails that appear to be from Microsoft, leading recipients to malicious Microsoft Forms impersonating Microsoft 365 or Adobe login pages. This article has been indexed from Cyware News – Latest Cyber News Read the…

Malware Campaign Lures Users With Fake W2 Form

A malicious campaign targeting users searching for W2 forms began on June 21, 2024, with a JavaScript file dropping a Brute Ratel Badger DLL into the user’s AppData. This initiated the installation of a Latrodectus backdoor. This article has been…

WhatsApp for Windows Lets Python, PHP Scripts Execute with no Warning

WhatsApp currently blocks certain file types considered risky, but Python and PHP scripts are not included in the blocklist. Security researcher Saumyajeet Das identified this vulnerability while testing file attachments in WhatsApp conversations. This article has been indexed from Cyware…

National Vulnerability Backlog Could Surge to 30,000 by 2025

The National Vulnerability Database (NVD), maintained by the National Institute of Standards and Technology (NIST), currently has a backlog of over 16,000 vulnerabilities, with an average daily influx of more than 100 new security flaws. This article has been indexed…

Data From Deleted Github Repositories May Not Actually be Deleted

Researchers at Truffle Security have found, or arguably rediscovered, that data from deleted GitHub repositories (public or private) and from deleted copies (forks) of repositories isn’t necessarily deleted. This article has been indexed from Cyware News – Latest Cyber News…

Most CISOs Feel Unprepared for New Compliance Regulations

Most CISOs are feeling unprepared for new compliance regulations, such as the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, presenting a significant challenge. This article has been indexed from Cyware…

Unveiling the Latest Banking Trojan Threats in Latin America

The malicious Chrome extension campaign in LATAM involves infecting victims through phishing websites and installing rogue extensions to steal sensitive information. The extensions mimic Google Drive, giving them access to a wide range of user data. This article has been…

Chainguard Raises $140M to Drive AI Support, Global Growth

Chainguard, a supply chain security startup, recently raised $140 million in a Series C funding round led by Redpoint Ventures, Lightspeed Venture Partners, and JVP. It aims to expand globally and strengthen its presence in the U.S. public sector. This…

How Cyber Insurance Coverage is Evolving

While purchasing cyber insurance won’t completely prevent data breaches, it does improve the cyber posture as it requires strict underwriting processes. However, only a quarter of companies currently have standalone cyber insurance policies. This article has been indexed from Cyware…

How CISOs Enable ITDR Approach Through the Principle of Least Privilege

Least privilege begins by addressing dormant user accounts and then scrutinizing access privileges, using Context-based access control (CBAC), Attribute-based access control (ABAC), and Role-based access control (RBAC) to determine user access. This article has been indexed from Cyware News –…