Tag: Cyware News – Latest Cyber News

Seizing Control of the Cloud Security Cockpit

Cloud applications and SaaS tools have countless configuration options that are often poorly documented and can change frequently, making it difficult to ensure they are securely configured. This article has been indexed from Cyware News – Latest Cyber News Read…

Fake Antivirus Websites Used to Distribute Info-Stealer Malware

Researchers at Trellix Advanced Research Center spotted fake AV sites used to distribute info-stealers. The malicious websites hosted sophisticated malicious files such as APK, EXE, and Inno setup installer, including spying and stealer capabilities. This article has been indexed from…

High-Severity Flaw Affects Cisco Firepower Management Center

Cisco states that there are no workarounds that address this vulnerability. The IT giant has confirmed that this vulnerability does not affect Adaptive Security Appliance (ASA) Software or Firepower Threat Defense (FTD) Software. This article has been indexed from Cyware…

Cybercriminals Exploit Cloud Storage for SMS Phishing Scams

Security researchers have revealed a series of criminal campaigns that exploit cloud storage services such as Amazon S3, Google Cloud Storage, Backblaze B2 and IBM Cloud Object Storage. This article has been indexed from Cyware News – Latest Cyber News…

Beware of HTML Masquerading as PDF Viewer Login Pages

Forcepoint X-Labs has recently observed a significant number of phishing email instances in their telemetry targeting various government departments in APAC that masquerade as PDF viewer login pages. This article has been indexed from Cyware News – Latest Cyber News…

Sharp Dragon Expands Towards Africa and The Caribbean

The threat actors demonstrate increased caution in selecting their targets, broadening their reconnaissance efforts, and adopting Cobalt Strike Beacon over custom backdoors. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Sharp Dragon…

Three-Year-Old Apache Flink Flaw Now Under Active Attack

An improper access control bug in Apache Flink that was fixed in January 2021 has been added to the US government’s Known Exploited Vulnerabilities Catalog, meaning criminals are right now abusing the flaw in the wild to compromise targets. This…

Bugcrowd Buys Informer to Enhance Attack Surface Management

Bugcrowd CEO Dave Gerry said their acquisition of Brighton, England-based Informer will fuel the adoption of Bugcrowd’s penetration testing technology and prompt clients to expand the scope of their bug bounty programs. This article has been indexed from Cyware News…

Morocco-based Cybercriminals Cashing in on Bold Gift Card Scams

“Rather than scam or phish everyday people directly for gift card-based payments, Storm-0539 infiltrates large retailers and fraudulently issues gift card codes to themselves, virtually printing their own money,” Microsoft’s Vasu Jakkal explained. This article has been indexed from Cyware…

High-Severity GitLab Flaw Lets Attackers Take Over Accounts

The security flaw (tracked as CVE-2024-4835) is an XSS weakness in the VS code editor (Web IDE) that lets threat actors steal restricted information using maliciously crafted pages. This article has been indexed from Cyware News – Latest Cyber News…

Cyber Force Provision Gets House Committee’s Approval

A requirement for the Pentagon to commission an independent study on the creation of a U.S. Cyber Force was added late Wednesday to the House version of the defense policy bill. This article has been indexed from Cyware News –…

Google Fixes Eighth Actively Exploited Chrome Zero-Day This Year

The security issue was discovered internally by Google’s Clément Lecigne and is tracked as CVE-2024-5274. It is a high-severity ‘type confusion’ in V8, Chrome’s JavaScript engine responsible for executing JS code. This article has been indexed from Cyware News –…

Courtroom Recording Software Compromised With Backdoor Installer

“Through ongoing monitoring and collaboration with cyber authorities, we identified attempts to replace our Viewer 8.3.7 software with a compromised file,” the company said in a statement on Thursday. This article has been indexed from Cyware News – Latest Cyber…

APT41 Deploys KeyPlug Backdoor Against Italian Industries

The KeyPlug backdoor has been developed to target both Windows and Linux operative systems and use different protocols to communicate which depend on the configuration of the malware sample itself. This article has been indexed from Cyware News – Latest…

Bolster Raises $14M Led by Microsoft’s M12

Bolster, an AI startup, has raised $14 million in funding led by Microsoft’s M12 to combat malicious phishing emails. Their flagship product, CheckPhish, offers brand and URL verification services to businesses. This article has been indexed from Cyware News –…

US Man Gets 10 Years for Laundering Cash From Online Fraud

Georgia resident Malachi Mullings received a decade-long sentence for laundering money scored in scams against healthcare providers, private companies, and individuals to the tune of $4.5 million. This article has been indexed from Cyware News – Latest Cyber News Read…

UK Government in $10.8m Bid to Tackle AI Cyber-Threats

The research program will be led by researcher Shahar Avin at the government’s AI Safety Institute and delivered in partnership with UK Research and Innovation and The Alan Turing Institute. This article has been indexed from Cyware News – Latest…

Why Shareable SBOMs are Essential for Software Security

Development teams need to plan ahead and create shareable SBOMs that are standardized in a format that’s readily consumable while also establishing scalable systems for attestation, access management, and data verification, among other factors. This article has been indexed from…

Pakistani-Aligned APT36 Targets Indian Defense Organizations

A politically motivated hacking group aligned with Pakistani interests is matching the Indian military’s shift away from the Windows operating system with a heavy focus on malware encoded for Linux. This article has been indexed from Cyware News – Latest…

Chinese Hackers Hide on Military and Government Networks for Six Years

Bitdefender researchers who discovered the threat group report that its operations align with Chinese geo-political interests, focusing on intelligence collection and espionage. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Chinese Hackers…

Microsoft’s Recall Stokes Security and Privacy Concerns

Microsoft’s new automatic screenshot retrieval feature could enable hackers to steal sensitive information such as online banking credentials, security experts warned. Additionally, the U.K ICO will probe Recall for compliance with privacy law. This article has been indexed from Cyware…

U.S. House Panel Takes on AI Security and Misuse

Much of the testimony – and concerns raised by the committee – focused on the AI advantages for cybercriminals and nation-state actors, advantages that cybersecurity officials say must be countered by increasingly building AI into products. This article has been…

Consumer-Grade Spyware App Found on US Hotel Check-in Computers

pcTattletale allows remote monitoring of Android or Windows devices and their data. The app claims to run invisibly in the background, undetectable on the target’s workstation. This article has been indexed from Cyware News – Latest Cyber News Read the…

Apple Wi-Fi Positioning System Open to Global Tracking Abuse

Apple is one of several companies, along with Google, Skyhook, and others, that operate a WPS. They offer client devices a way to determine their location that’s more energy efficient than using the Global Positioning System (GPS). This article has…

Rockwell Automation Urges Disconnection of ICS from the Internet

Rockwell Automation warned customers to disconnect industrial control systems (ICS) from the internet, citing escalating cyber threats and rising global geopolitical tensions. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Rockwell Automation…

Former White House Cyber Official Jeff Greene to Join CISA

Former White House National Security Council cyber staff member Jeff Greene, the current cybersecurity programs director at the Aspen Institute think tank, is joining the CISA next month, the agency confirmed. This article has been indexed from Cyware News –…

Scammers are Selling Fake NSO Pegasus Spyware

CloudSEK researchers found the fake spyware after perusing around 25,000 posts of individuals offering Pegasus and other NSO tools via channels on the messaging service Telegram. This article has been indexed from Cyware News – Latest Cyber News Read the…

Server-Side Credit Card Skimmer Lodged in Obscure Plugin

There are plenty of widely-used code snippet plugins available but in this case the attackers decided to use a very obscure plugin called Dessky Snippets, with only a few hundred active installations at the time of writing. This article has…

ARPA-H Pledges $50M for Hospital IT Security Auto-Patching

The US government’s Advanced Research Projects Agency for Health (ARPA-H) has pledged more than $50 million to fund the development of technology that aims to automate the process of securing hospital IT environments. This article has been indexed from Cyware…

Snapchat Revises AI Privacy Policy Following UK ICO Probe

Instant messaging app Snapchat its artificial intelligence-powered tool under compliance after the U.K. data regulator said it violated the privacy rights of individual Snapchat users. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Set of Bugs Puts Software Company and IoT Device Makers Into Motion

Cybersecurity researchers and Internet of Things (IoT) technology companies say they worked together to eliminate four software vulnerabilities that could have given malicious hackers deep access to networks. This article has been indexed from Cyware News – Latest Cyber News…

Authelia: Open-Source Authentication and Authorization Server

Authelia is an open-source authentication and authorization server that offers 2FA and SSO for applications through a web portal. It works alongside reverse proxies to permit, deny, or redirect requests. This article has been indexed from Cyware News – Latest…

100 Groups Urge Feds to Put UHG on Hook for Breach Notices

Over 100 medical associations and industry groups, representing thousands of U.S. doctors and healthcare professionals, have urged the HHS to hold Change Healthcare accountable for breach notifications following a massive February ransomware attack. This article has been indexed from Cyware…

QNAP QTS Zero-Day in Share Feature Gets Public RCE Exploit

An extensive security audit of QNAP QTS, the operating system for the company’s NAS products, has uncovered fifteen vulnerabilities of varying severity, with eleven remaining unfixed. This article has been indexed from Cyware News – Latest Cyber News Read the…

Void Manticore Launches Destructive Attacks on Albania and Israel

Void Manticore utilizes five different methods to conduct disruptive operations against its victims. This includes several custom wipers for both Windows and Linux, alongside manual deletion of files and shared drives. This article has been indexed from Cyware News –…

Chinese Telco Gear May Get Banned in Germany

Germany is considering banning the use of Huawei and ZTE equipment in its 5G networks due to national security concerns, despite industry opposition and the potential high costs associated with the removal of the Chinese-made technology. This article has been…

North Korea-Linked Kimsuky APT Attack Targets Victims via Messenger

Researchers at Genians Security Center (GSC) identified the North Korea-linked Kimsuky APT group targeting victims via Facebook Messenger, using fake accounts posing as South Korean officials to deliver malware. This article has been indexed from Cyware News – Latest Cyber…

The Mystery of the Targeted Ad and the Library Patron

An attorney discovered that the mobile ads she saw were reflecting her recent library audiobook borrowing habits, raising concerns about the privacy of library patron data and the potential for targeted advertising based on that information. This article has been…

Fortinet FortiSIEM Command Injection Flaw (CVE-2023-34992) Deep-Dive

Researchers at Horizon3.ai discovered a critical remote code execution vulnerability (CVE-2023-34992) in Fortinet FortiSIEM, allowing unauthenticated attackers to execute commands as root users and gain access to sensitive information. This article has been indexed from Cyware News – Latest Cyber…

Chinese Duo Indicted for Laundering $73m in Pig Butchering Case

Two Chinese nationals have been indicted for their alleged involvement in a multimillion-dollar “pig butchering” investment fraud scheme, where they laundered over $73 million through US financial institutions and cryptocurrency wallets. This article has been indexed from Cyware News –…

Too Many ICS Assets are Exposed to the Public Internet

The enterprise attack surface is rapidly expanding due to the convergence of IT and OT systems, leading to a large number of ICS assets being exposed to the public internet and creating new vulnerabilities that security teams struggle to manage.…

US SEC Approves Wall Street Data Breach Reporting Regs

The SEC has approved new regulations that require broker-dealers and investment firms to notify their clients within 30 days of detecting a data breach, in an effort to modernize and enhance the protection of consumers’ financial data. This article has…

The Importance of Access Controls in Incident Response

Adequate IAM policies are essential for incident management tooling to ensure the right people can quickly address issues without being blocked. Authentication verifies a person’s identity, while authorization manages permissions and access levels. This article has been indexed from Cyware…

CISA Senior Official Goldstein to Leave Agency in June

Eric Goldstein, the executive assistant director for cybersecurity at the CISA, is leaving the agency in June after playing a crucial role in driving the agency’s secure-by-design initiatives and strengthening partnerships with the private sector. This article has been indexed…

White House Unveils AI Safety Framework for US Workers

The White House unveiled a framework to protect U.S. workers from AI risks, emphasizing health and safety rights, governance, human oversight, and transparency as organizations adopt new technologies. This article has been indexed from Cyware News – Latest Cyber News…

UK Government Publishes AI Cybersecurity Guidance

The UK government has released guidance to help AI developers and vendors protect their AI models from hacking and potential sabotage, with the goal of transforming this guidance into a global standard to promote security by design in AI systems.…

Researchers Report High-Impact Cat-Phishing Targeting Users

HP’s new report reveals that cybercriminals are increasingly using “cat-phishing” techniques, exploiting open redirects in legitimate websites to deceive users and deliver malware. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Researchers…

CISA Warns of Hackers Exploiting Chrome, EoL D-Link Bugs

CISA has added a high-severity vulnerability (CVE-2024-4761) in Chrome’s V8 JavaScript engine to its ‘Known Exploited Vulnerabilities’ catalog, which is being actively exploited. This article has been indexed from Cyware News – Latest Cyber News Read the original article: CISA…

Norway Recommends Replacing SSL VPN to Prevent Breaches

The Norwegian NCSC recommends organizations replace SSL VPN/WebVPN solutions with more secure alternatives, like IPsec with IKEv2, by 2025 to prevent breaches from repeated vulnerabilities. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Is an Open-Source AI Vulnerability Next?

The challenges within the AI supply chain mirror those of the broader software supply chain, with added complexity when integrating large language models (LLMs) or machine learning (ML) models into organizational frameworks. This article has been indexed from Cyware News…

SEC to Require Financial Firms to Have Data Breach Incident Plans

The SEC now requires certain financial institutions to have written policies for detecting, addressing, and notifying customers of data breaches involving their personal information. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

OWASP Dep-Scan: Open-Source Security and Risk Audit Tool

OWASP dep-scan is an open-source security and risk assessment tool that analyzes project dependencies to identify vulnerabilities, licensing issues, and potential risks like dependency confusion attacks. This article has been indexed from Cyware News – Latest Cyber News Read the…

Unsafe Software Development Practices Persist, Despite CISA’s Push

Despite repeated efforts by the CISA to eliminate common software vulnerabilities, unsafe software development practices continue to persist across the industry, highlighting the challenges in driving change in coding practices. This article has been indexed from Cyware News – Latest…