GitLab released updates covering versions 17.1.7, 17.2.5, and 17.3.2 for GitLab Community Edition (CE) and Enterprise Edition (EE), addressing a total of 18 security issues. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Tag: Cyware News – Latest Cyber News
Fileless Remcos RAT Campaign Leverages CVE-2017-0199 Flaw
In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the Remcos Remote Access Trojan (RAT), leveraging a benign-looking Excel document as the attack vector. This article has been indexed from Cyware News…
Chinese-Made Port Cranes in US Included ‘Backdoor’ Modems, House Report Says
A recent congressional investigation revealed that Chinese-made port cranes in the United States contained hidden modems that could provide unauthorized access to the machines. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Citrix Workspace App Users Urged to Update Following Two Privilege Escalation Flaws
Users of Citrix Workspace App are advised to update due to two privilege escalation flaws. Cloud Software Group disclosed vulnerabilities (CVE-2024-7889 & CVE-2024-7890) in the Windows app, allowing attackers to gain high-level access. This article has been indexed from Cyware…
Update: Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities
Trend Micro researchers uncovered remote code execution attacks targeting Progress Software’s WhatsUp Gold using the vulnerabilities tracked as CVE-2024-6670 and CVE-2024-6671. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Update: Protecting Against…
New Vo1d Malware Infects 1.3 Million Android Streaming Boxes
The Vo1d malware campaign targets specific Android firmware versions like Android 7.1.2 and Android 10.1. The malware modifies system files to launch itself on boot and persist on the device. This article has been indexed from Cyware News – Latest…
Targeted Campaigns in Retail Sector Involve Domain Fraud, Brand Impersonation, and Ponzi Schemes
Threat actors are actively engaging in domain fraud, brand impersonation, and Ponzi schemes targeting the retail sector, which plays a significant role in the global economy. This article has been indexed from Cyware News – Latest Cyber News Read the…
Hackers Have Sights Set on Four Microsoft Vulnerabilities, CISA Warns
Federal civilian agencies have until the end of the month to address these issues. The vulnerabilities are part of Microsoft’s monthly security release, with CVE-2024-43491 considered the most concerning due to its severity score. This article has been indexed from…
Critical Severity Flaw Exposes Siemens Industrial Systems
This flaw, tracked as CVE-2024-35783 and with a CVSS score of 9.4, affects SIMATIC Process Historian, PCS 7, and WinCC, allowing attackers to gain elevated privileges and execute arbitrary commands. This article has been indexed from Cyware News – Latest…
Fake Recruiter Coding Tests Target Developers With Malicious Python Packages
The Lazarus Group has been targeting developers in a new VMConnect campaign, using fake job interviews to trick them into downloading malicious software packages from open-source repositories. This article has been indexed from Cyware News – Latest Cyber News Read…
SolarWinds Reveals RCE Flaw in Access Rights Manager
SolarWinds has disclosed two vulnerabilities in their Access Rights Manager (ARM) software: CVE-2024-28990 (CVSS 6. 3) allows for a hardcoded credential authentication bypass, while CVE-2024-28991 (CVSS 9. 0) enables remote code execution. This article has been indexed from Cyware News…
Update: Hackers Target Apache OFBiz RCE Flaw CVE-2024-45195 After PoC Exploit Released
Hackers are targeting an RCE vulnerability (CVE-2024-45195) in Apache OFBiz after the release of a Proof of Concept (PoC) exploit. Malicious requests have been detected, with attacks focusing on the financial services industry and business sectors. This article has been…
Chinese-speaking Hackers Linked to DragonRank SEO Manipulator Service
By exploiting web app services, the attackers deploy a web shell to launch malware and gather credentials, compromising IIS servers to spread the BadIIS malware. The malware facilitates proxy ware and SEO fraud by manipulating search engine rankings. This article…
Iranian APT Hackers Target Iraqi Government in New Espionage Campaign
The group deployed sophisticated malware named Veaty and Spearal against Iraqi targets, using distinctive command and control mechanisms, including a custom email-based channel identified within the Veaty malware. This article has been indexed from Cyware News – Latest Cyber News…
Two Critical RCE Flaws Discovered in Docker Desktop
Two critical remote code execution (RCE) flaws, identified as CVE-2024-8695 and CVE-2024-8696, have been uncovered in Docker Desktop, a popular tool for containerized application development. This article has been indexed from Cyware News – Latest Cyber News Read the original…
New Linux Malware “Hadooken’ Targets Oracle WebLogic Applications
A new Linux malware named Hadooken is targeting Oracle WebLogic servers, dropping Tsunami malware and deploying a cryptominer. WebLogic servers are vulnerable to cyberattacks due to flaws like deserialization and weak access controls. This article has been indexed from Cyware…
Adobe Completes Fix for Reader Bug with Known PoC Exploit
Adobe has completed a fix for a critical bug in Reader with a known Proof of Concept (PoC) exploit for CVE-2024-41869. The update also addresses another critical flaw, CVE-2024-45112, in various versions of Acrobat and Reader. This article has been…
Global Cybersecurity Workforce Growth Flatlines, Stalling at 5.5 Million Pros
According to ISC2, the global cybersecurity workforce growth has stagnated at 5. 5 million professionals, increasing by just 0. 1% in a year, marking the sector’s first stall since 2019. This article has been indexed from Cyware News – Latest…
Inc Ransom Attack Analysis: Extortion Methodologies
The attack lifecycle involved initial access gained through a firewall vulnerability, followed by enumeration of network shares and lateral movement using Impacket and pass-the-hash attacks. This article has been indexed from Cyware News – Latest Cyber News Read the original…
DockerSpy: Search for Images on Docker Hub, Extract Sensitive Information
Created to combat data leaks within publicly available Docker images, DockerSpy automates the process of scanning for secrets to enhance security and compliance. Its scanning engine can identify various secret types and provides detailed analysis. This article has been indexed…