A new BYOI technique lets attackers bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade process. Aon’s Stroz Friedberg discovered a new “Bring Your Own Installer” (BYOI) EDR bypass technique that exploits a flaw in…
Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
An easily and remotely exploitable vulnerability (CVE-2024-7399) affecting Samsung MagicINFO, a platform for managing content on Samsung commercial displays, is being leveraged by attackers. Exploit attempts have been flagged by the SANS Internet Storm Center and Arctic Wolf researchers: the…
UK Retail Chains Targeted by Ransomware Attackers Claiming Data Theft
Major ransomware campaign targeting UK retailers has escalated as hackers provided BBC News with evidence of extensive network infiltration and data theft from Co-op, contradicting the company’s initial statements that downplayed the incident. The cyber criminals, operating under the name…
Samsung MagicINFO 9 Server Vulnerability Actively Exploited in the Wild
A critical security vulnerability in the Samsung MagicINFO 9 Server has come under active exploit, security researchers from Arctic Wolf have warned. The flaw, tracked as CVE-2024-7399, allows unauthenticated attackers to remotely execute code and compromise digital signage infrastructure in organizations…
Threat Actor Evades SentinelOne EDR to Deploy Babuk Ransomware
Aon’s Stroz Friedberg Incident Response Services has uncovered a method used by a threat actor to bypass SentinelOne Endpoint Detection and Response (EDR) protections, ultimately deploying a variant of the notorious Babuk ransomware. SentinelOne EDR, a widely-used endpoint protection solution,…
New ClickFix Attack Imitates Ministry of Defence Website to Target Windows & Linux Systems
A newly identified cyberattack campaign has surfaced, leveraging the recognizable branding of India’s Ministry of Defence to distribute cross-platform malware targeting both Windows and Linux systems. Uncovered by threat intelligence researchers at Hunt.io, this operation employs a ClickFix-style infection chain,…
US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car
Customs and Border Protection has called for tech companies to pitch real-time face recognition technology that can capture everyone in a vehicle—not just those in the front seats. This article has been indexed from Security Latest Read the original article:…
Beyond DDoS: The New Breed Of Layer 7 Attacks And How SMEs Can Outmaneuver Them
When most people think of DDoS attacks, they envision tsunami-like floods of traffic overwhelming servers. That’s the classic Layer 3/4 strategy brute force attacks meant to crash services by clogging up bandwidth. But over the last quarter, I’ve seen a…
Darcula (PhaaS) Stolen 884,000 Credit Card Details on 13 Million Clicks from Users Worldwide
Security researchers have uncovered one of the largest credit card theft operations in recent history, with a sophisticated Phishing-as-a-Service (PhaaS) platform called “Darcula” responsible for stealing approximately 884,000 credit card details through a massive campaign that generated over 13 million…
UK’s NCSC Offers Security Tips as Co-op Confirms Data Loss
The National Cyber Security Centre has published advice for retailers while the Co-op admits customer data was stolen This article has been indexed from www.infosecurity-magazine.com Read the original article: UK’s NCSC Offers Security Tips as Co-op Confirms Data Loss
Hackers Are Using AI to Steal Your Data—Here’s How to Protect Yourself
Hackers now use AI to craft convincing phishing scams that mimic real voices and writing styles. AI tools let cybercriminals scale attacks quickly, making scams more personal and harder to detect. Multi-factor authentication and slowing down before reacting are key…
Firefox’s Future Uncertain Without Google Search Deal, Insider Warns
Mozilla’s Chief Financial Officer testified that Firefox could face extinction if Justice Department proposals targeting Google’s search dominance are fully implemented, revealing the browser’s precarious financial position amid ongoing antitrust proceedings. Mozilla Corporation CFO Eric Muhlheim delivered stark testimony Friday,…
xAI API Key Leak Exposes Proprietary Language Models on GitHub
Employee at Elon Musk’s artificial intelligence firm xAI inadvertently exposed a private API key on GitHub for over two months, granting unauthorized access to proprietary large language models (LLMs) fine-tuned on internal data from SpaceX, Tesla, and Twitter/X. Security researchers…
TikTok Hit with €530 Million Fine Over Data Transfers to China
Irish Data Protection Commission (DPC) has imposed a landmark €530 million fine on TikTok Technology Limited for illegally transferring European Economic Area (EEA) user data to China and failing to meet transparency obligations under the General Data Protection Regulation (GDPR).…
Researcher Exploits Regex Filter Flaw to Gain Remote Code Execution
Target application included a username field restricted by a frontend regex filter (/^[a-zA-Z0-9]{1,20}$/), designed to accept only alphanumeric characters. While this initially appeared robust, the researcher discovered that the backend failed to revalidate inputs after the regex check. This oversight…
PIVOTT Act Revived to Tackle Growing Cybersecurity Workforce Shortages
The cyber workforce gap is one of the most pressing and persistent challenges facing the cybersecurity industry. In 2024, ISC2 found that the gap amounted to 4.8 million people globally, up 19% from the previous year. Both public and private…
As Vishing Gains Momentum, It’s Time to Fight Back
The mechanisms and dangers of email phishing are well known, as are the best practices for hardening organizations against it. Its spin-off, called vishing, is nothing new, but it’s both rapidly evolving, and unlike the more mainstream counterpart, too often…
Android Update Patches FreeType Vulnerability Exploited as Zero-Day
Android’s May 2025 security update includes patches for an exploited vulnerability in the FreeType open source rendering engine. The post Android Update Patches FreeType Vulnerability Exploited as Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
< div class=”block-paragraph_advanced”> Background UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to…
Stealth Tunnels: The Dawn of Undetectable Remote Access
In today’s world, more employees work from home, coffee shops, or satellite offices than ever before. While remote access tools like VPNs have kept us connected, they’re increasingly easy for network gatekeepers to spot—and sometimes block or slow down. Enter…
Google Gemini Introduces Built-In Image Editing in App
Google has integrated advanced AI-powered image editing tools directly into its Gemini app, enabling users to manipulate both AI-generated and uploaded images through text prompts. The update, which began rolling out globally on May 5, 2025, introduces multi-step editing workflows,…
What a future without CVEs means for cyber defense
The importance of the MITRE-run Common Vulnerabilities and Exposures (CVE) Program shouldn’t be understated. For 25 years, it has acted as the point of reference for cybersecurity professionals to understand and mitigate security flaws. By providing a standardized method for…
IT Security News Hourly Summary 2025-05-06 09h : 10 posts
10 posts were published in the last hour 7:2 : Smishing on a Massive Scale: ‘Panda Shop’ Chinese Carding Syndicate 7:2 : Over 1,200 SAP Instances Exposed to Critical Vulnerability Exploited in the Wild 6:32 : Python InfoStealer with Embedded…
Why Modern Businesses Need Cyber Threat Intelligence
Every seasoned professional knows that effective cybersecurity rests on knowledge. You cannot counter attacks unless you know how they work and what they target. That’s why enterprises rely on cyber threat intelligence that delivers essential insights to power their security…
New GPOHound Tool Analyzes Active Directory GPOs for Escalation Risks
Security researchers have released GPOHound, a powerful open-source tool designed to analyze Group Policy Objects (GPOs) in Active Directory environments for misconfigurations and privilege escalation risks. Developed by cybersecurity firm Cogiceo, the tool automates the detection of insecure settings like exposed…
Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware
A sophisticated new attack method that disables endpoint security protection has been identified by security researchers, enabling threat actors to deploy ransomware undetected. The technique, dubbed “Bring Your Own Installer,” was recently discovered by Aon’s Stroz Friedberg Incident Response team…
UDP Vulnerability in Windows Deployment Services Allows 0-Click System Crashes
A newly discovered vulnerability in Microsoft’s Windows Deployment Services (WDS) allows attackers to remotely crash servers with zero user interaction or authentication. The flaw, which targets the UDP-based TFTP service at the WDS, could allow even low-skilled attackers to paralyze…