Grove Group, a cybersecurity and cloud services company based in Cape Town, brings around 600 customers across 51 countries to Integrity360. This acquisition will also enhance Integrity360’s security operations center (SOC) business. This article has been indexed from Cyware News…
Tag: Cyware News – Latest Cyber News
The NIS2 Directive: How Far Does it Reach?
Key aspects of the NIS2 Directive include a focus on proactive cybersecurity measures for entities within its scope, such as risk analysis, incident handling, and supply chain security. This article has been indexed from Cyware News – Latest Cyber News…
Philippines: Intel Fusion Center Eyed to Boost Cybersecurity
The Department of Information and Communications Technology (DICT) is focusing on enhancing cybersecurity in the Philippines through the National CyberSecurity Plan (NCSP) 2023-2028. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Philippines:…
California Passes Landmark Bill Requiring Easier Data Sharing Opt-Outs for Consumers
California has passed a landmark bill that requires internet browsers and mobile operating systems to make it easier for consumers to opt out of sharing their private data with websites for targeted advertising. This article has been indexed from Cyware…
PoorTry Windows Driver Deletes Crucial Files to Impairs Windows Computers
The PoorTry Windows driver, originally used to disable EDR solutions, has now evolved into an EDR wiper, deleting crucial files to make system restoration harder. Sophos has confirmed actual EDR wiping attacks in the wild. This article has been indexed…
Unpatchable Zero-Day in Surveillance Cameras is Being Exploited to Install Mirai
The vulnerability, known as CVE-2024-7029, allows attackers to remotely execute commands on the compromised device. The targeted device is the AVM1203 surveillance camera from AVTECH. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Cisco Bolsters AI Security by Buying Robust Intelligence
Cisco is strengthening its AI security by acquiring Robust Intelligence, a startup led by a former Harvard professor. This acquisition emphasizes the importance of AI security in modern IT infrastructure. This article has been indexed from Cyware News – Latest…
LummaC2 Infostealer Resurfaces with Obfuscated PowerShell Tactics
The latest variant employs obfuscated PowerShell commands to download and execute malicious payloads, utilizing Windows binaries like Mshta.exe and Dllhost.exe for stealth. This article has been indexed from Cyware News – Latest Cyber News Read the original article: LummaC2 Infostealer…
New Tickler Malware Used to Backdoor US Government, Defense Organizations
APT33 used the new Tickler malware to infiltrate government and defense organizations in the US and the UAE. The group, known as Peach Sandstorm and Refined Kitten, is linked to the Iranian Revolutionary Guard Corps. This article has been indexed…
US Election-Themed Phishing Scams Rely on Fake Donation Sites
The domain actsblue[.]com is posing as the legitimate actblue[.]com, a platform for Democratic Party donations. The malicious site is registered anonymously with Namecheap, making it difficult to trace back to the threat actors. This article has been indexed from Cyware…
Buffer Overflow Flaw in TP-Link Routers Opens Door to RCE
A critical vulnerability, CVE-2024-42815, with a CVSS score of 9.8, has been discovered in TP-Link RE365 V1_180213 series routers, allowing for remote exploitation and potential takeover. This article has been indexed from Cyware News – Latest Cyber News Read the…
Critical Fortra FileCatalyst Workflow Vulnerability Patched (CVE-2024-6633)
The flaw, known as CVE-2024-6633, involves the use of default credentials for the HSQL database, which could compromise the software’s confidentiality, integrity, and availability. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Threat Group ‘Bling Libra’ Pivots to Extortion for Cloud Attacks
The threat group known as Bling Libra, previously linked to the Ticketmaster data breach, has shifted to the double extortion strategy in cloud attacks, according to researchers at Palo Alto Networks’ Unit 42. This article has been indexed from Cyware…
Hundreds of LLM Servers Expose Corporate, Health & Other Online Data
Flowise, a popular low-code tool backed by Y Combinator, was particularly at risk due to an authentication bypass vulnerability that allowed access to sensitive information such as GitHub tokens and API keys in plaintext. This article has been indexed from…
CISA Adds Google Chromium V8 Bug to its Known Exploited Vulnerabilities Catalog
Google released a security update this week to address the actively exploited Chrome zero-day vulnerability. The vulnerability, CVE-2024-7965, is an inappropriate implementation issue in Chrome’s V8 JavaScript engine. This article has been indexed from Cyware News – Latest Cyber News…
AWS Load Balancer Plagued by Authentication Bypass Flaw
Miggo has uncovered a security flaw in AWS Load Balancer that could allow cybercriminals to bypass authentication and authorization services, potentially affecting over 15,000 applications. This article has been indexed from Cyware News – Latest Cyber News Read the original…
BlackByte Blends Known Tactics With New Encryptor Variant and Vulnerability Exploits to Support Ongoing Attacks
The latest encryptor variant identified by researchers at Cisco Talos appends the file extension ‘blackbytent_h’ to encrypted files. This variant also includes the deployment of four vulnerable drivers, an increase from previous reports. This article has been indexed from Cyware…
Microsoft’s Sway Serves as Launchpad for ‘Quishing’ Campaign
A new QR code phishing campaign is using Microsoft Sway to steal credentials. The attacks primarily target users in Asia and North America, particularly in the technology, manufacturing, and finance sectors. This article has been indexed from Cyware News –…
New Phishing Campaign Steals VPN Credentials Using Social Engineering Methods
The GuidePoint Research and Intelligence Team (GRIT) discovered attacker domain names and IP addresses targeting over 130 US organizations through a campaign that begins by stealing credentials and passcodes using social engineering tactics. This article has been indexed from Cyware…
Check Point Acquires Cybersecurity Startup Cyberint
Israeli cybersecurity firm Check Point Software Technologies has announced the acquisition of threat intelligence company Cyberint, marking its third startup acquisition in a year. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…