A recently patched high-severity flaw impacting SolarWinds Serv-U file transfer software is being actively exploited by malicious actors in the wild. The vulnerability, tracked as CVE-2024-28995 (CVSS score: 8.6), concerns a directory transversal bug that could allow attackers to read…
Category: EN
Cyber Security Today, June 21, 2024 – US to ban Kaspersky for consumers and businesses
This episode reports on how gullible employees are falling for a scam and cutting and pasting malware into their organization’s IT systems, and more This article has been indexed from Cybersecurity Today Read the original article: Cyber Security Today, June…
PrestaShop Website Under Injection Attack Via Facebook Module
A critical vulnerability has been discovered in the “Facebook” module (pkfacebook) from Promokit.eu for PrestaShop. The vulnerability, CVE-2024-36680, allows a guest to perform SQL injection attacks on affected module versions. CVE-2024-36680 – Vulnerability Details The vulnerability stems from the Ajax…
US bans Kaspersky, warns: “Immediately stop using that software”
“Immediately stop using [Kaspersky] and switch to an alternative” warned the Commerce Secretary in a new US ban of the antivirus provider. This article has been indexed from Malwarebytes Read the original article: US bans Kaspersky, warns: “Immediately stop using…
Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features
A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart from typical Distributed Denial of Service (DDoS) botnets. Discovered by the XLab Cyber Threat Insight Analysis (CTIA) system on May 20, 2024, Zergeca has already demonstrated…
Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information
A recent rise in data breaches from illegal Chinese OTT platforms exposes that user information, including names and financial details, is vulnerable to exploitation by criminals. The leaked information can be used for phishing attacks, financial fraud, and even harassment,…
Telcos Hit Hardest by Cloud Malware, Report Finds
Telecom companies are being targeted by malicious actors at an alarming rate, according to a new report by Netskope Threat Labs. The report highlights a concerning trend of attackers exploiting popular cloud apps like Microsoft OneDrive and GitHub to deliver…
Hackers Attacking Vaults, Buckets, And Secrets To Steal Data
Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins, and other useful data kept within these storage solutions. These storage solutions’ centralized and often inadequately protected nature makes them…
Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code
Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to execute arbitrary code on the server. An attacker can exploit these vulnerabilities by sending a specially crafted email to an administrator. When the administrator views the…
Was T-Mobile compromised by a zero-day in Jira?
IntelBroker is offering source code from major companies for sale. Are they demonstrating the value of a zero-day they are also selling? This article has been indexed from Malwarebytes Read the original article: Was T-Mobile compromised by a zero-day in…
How to find Kaspersky products with runZero
The US government has banned the sale of Kaspersky products and services. Here’s how to find Kaspersky products in your network. The post How to find Kaspersky products with runZero appeared first on Security Boulevard. This article has been indexed…
It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever.
Modern chief information security officers (CISOs) are navigating tough circumstances due to complex challenges and heightened regulatory pressures. The post It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever. appeared first on Security Boulevard.…
Chinese UNC3886 Actors Exploiting VMware, Fortinet 0-days For Spying
In 2021, UNC3886, a suspected China nexus cyber espionage actor, was found to be targeting strategic organizations on a large scale, utilizing multiple vulnerabilities in FortiOS and VMware to install backdoors on the infected machines. Fortinet and VMware have released…
New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document
Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as an executable disguised as a Word document attached to phishing emails. It uses evasion techniques to avoid detection and analysis. Then it downloads a malicious payload…
Hackers Weaponizing Windows Shortcut Files for Phishing
LNK files, a shortcut file type in Windows OS, provide easy access to programs, folders, or websites. Created automatically during shortcut creation or manually by users, LNK files contain the target location and other information useful for threat intelligence. It…
Since joining NATO, Sweden claims Russia has been borking Nordic satellites
If Putin likes jammin’, we hope NATO likes jammin’ too Sweden says its satellites have been impacted by “harmful interference” from Russia ever since the Nordic nation joined the North Atlantic Treaty Organization (NATO) last March.… This article has been…
Defending Against Business Email Compromise: A Comprehensive Guide
In today’s digital age, where email communication is integral to business operations, the threat of Business Email Compromise (BEC) looms large. BEC attacks are sophisticated schemes where cybercriminals manipulate email communication to deceive employees into transferring money or sensitive information.…
With Kaspersky banned in the US, what should customers do?
The United States are banning Kaspersky products. Starting July 20, Kaspersky is no longer allowed to sell its products to new customers. Software updates remain available until September 29, 2024. Customers who […] Thank you for being a Ghacks reader.…
Kaspersky banned in the United States
Normal 0 false false false EN-US /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:10.0pt; mso-bidi-font-size:11.0pt; font-family:”Calibri”,sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Calibri; mso-bidi-theme-font:minor-bidi; mso-font-kerning:1.0pt; mso-ligatures:standardcontextual;} The United States government…
My health information has been stolen. Now what?
As health data continues to be a prized target for hackers, here’s how to minimize the fallout from a breach impacting your own health records This article has been indexed from WeLiveSecurity Read the original article: My health information has…