Tag: Cyware News – Latest Cyber News

Thread Name-Calling: Using Thread Name for Offense

Process Injection is a vital technique used by attackers to evade detection and escalate privileges. Thread Name-Calling has emerged as a new injection technique that abuses Windows APIs for thread descriptions to bypass endpoint protection products. This article has been…

Senator: Top Banks Only Reimburse 38% of Unauthorized Claims

US Senator Richard Blumenthal revealed that Bank of America, JPMorgan Chase, and Wells Fargo only reimbursed 38% of customers for unauthorized payments, resulting in $100 million in fraud losses. This article has been indexed from Cyware News – Latest Cyber…

North Korean Hackers Targeted KnowBe4 with Fake IT Worker

KnowBe4, a cybersecurity training company, was tricked into hiring a fake IT worker from North Korea, highlighting the threat of insider activities. Despite this, no data breach occurred. This article has been indexed from Cyware News – Latest Cyber News…

Progress Software Fixed Critical Flaw in Telerik Report Server

The vulnerability, tracked as CVE-2024-6327, allows attackers to execute code on unpatched servers through deserialization of untrusted data. The issue affects Report Server 2024 Q2 (10.1.24.514) and earlier versions. This article has been indexed from Cyware News – Latest Cyber…

Google Chrome Now Asks for Passwords To Scan Protected Archives

The new warning messages help users understand the danger posed by each downloaded file from the Internet. Google has implemented a two-tier download warning system using AI-powered malware verdicts from its Safe Browsing service. This article has been indexed from…

SocGholish: Fake Update Puts Visitors at Risk

The recent developments in SocGholish infection tactics target WordPress-based websites. The attack sequence involves initial access through compromised websites with vulnerable WordPress plugins. This article has been indexed from Cyware News – Latest Cyber News Read the original article: SocGholish:…

Email Gateway Security Gaps Enable New Malware Tactics

Email security gaps in gateway defenses have allowed phishing hackers to sneak malware past static scanning functions. Hackers hid malicious attachments by using a decoy file extension in a compressed archive. This article has been indexed from Cyware News –…

Mimecast Acquires Veteran Data Security Firm Code42

Mimecast has acquired veteran data security firm Code42, adding 175 employees to its team. Code42, founded in 2001, focuses on expanding its data protection platform, Incydr, with recent enhancements for source code exfiltration detection. This article has been indexed from…

North Korean Hacker Group Targeting Healthcare, Energy Sectors

North Korean hackers, specifically the Andariel hacking group, are now targeting the healthcare, energy, and financial sectors according to a Mandiant report. This group is believed to be associated with North Korea’s Reconnaissance General Bureau. This article has been indexed…

Report: Malware Attacks Surge 30% in First Half of 2024

The 2024 Mid-Year Cyber Threat Report from SonicWall revealed a 30% increase in malware-based threats compared to 2023, with a significant spike in attacks from March to May, including 78,923 new variants observed in the first half of 2024. This…

Pro-Palestinian Actor Levels Six-Day DDoS Attack on UAE Bank

BlackMeta, known for targeting organizations in Israel, UAE, and the US, used a cybercrime service called InfraShutdown to target a UAE bank for $500-$625 a week. The attach lasted 100 hours in total. This article has been indexed from Cyware…

Vanta Raises $150M Series C, Now Valued at $2.45B

Vanta’s Series C funding was led by Sequoia Capital. Other participating investors include Growth Equity at Goldman Sachs Alternatives and J.P. Morgan, along with existing partners like Atlassian Ventures and Y Combinator. This article has been indexed from Cyware News…

Lakera Raises $20 Million to Secure GenAI Applications

Lakera has raised $20 million in a Series A funding round. Led by European VC Atomico, with participation from Citi Ventures, Dropbox Ventures, and existing investors including redalpine, this investment brings Lakera’s total funding to $30 million. This article has…

Echoes of Braodo Tales from the Cyber Underworld

The Braodo Stealer, a Vietnamese-based malware, is infiltrating victims’ systems to steal sensitive information like credentials and banking details for identity theft and financial harm. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Okta Browser Plugin Reflected Cross-Site Scripting CVE-2024-0981

Okta Browser Plugin versions 6.5.0 through 6.31.0 are vulnerable to cross-site scripting, prompting users to save credentials in Okta Personal. The issue was fixed in version 6.32.0 for Chrome, Edge, Firefox, and Safari. This article has been indexed from Cyware…

Two Vulnerabilities Discovered in LangChain GenAI Framework

Researchers identified two vulnerabilities in LangChain, an open-source generative AI framework with over 81,000 stars on GitHub: CVE-2023-46229 and CVE-2023-44467 (LangChain Experimental). This article has been indexed from Cyware News – Latest Cyber News Read the original article: Two Vulnerabilities…

Cybersecurity Startup Protexxa Closes $10M Series A Round

Protexxa, a Toronto-based B2B SaaS cybersecurity company founded by Claudette McGowan, has secured $10 million in Series A funding from various investors including Bell Ventures and private investors like Sonia Baxendale and Annette Verschuren. This article has been indexed from…

Philippines to End Online Casinos, Maybe Scams Too

The Philippines has decided to shut down its online gambling industry to tackle illegal activities such as financial scams and human trafficking. President Ferdinand Marcos Jr instructed PAGCOR to cease operations of POGOs by the end of the year. This…

Malware Campaigns Target Hamster Kombat Players

Threat actors are targeting Hamster Kombat’s 250 million players with fake Android and Windows software that install spyware and malware. The clicker mobile game allows players to earn fictional currency by completing simple tasks. This article has been indexed from…

Report: HHS Needs to Beef up Cloud Security and Skills

The Department of Health and Human Services is facing cloud security issues, with weaknesses in security controls and inventories of cloud systems. Over 30% of their systems are in the cloud, putting them at risk of compromise. This article has…

Fake CrowdStrike Repair Manual Pushes New Infostealer Malware

The Daolpu malware collects account credentials, browser history, and cookies from Chrome, Edge, Firefox, and other browsers. It is spread through malicious document attachments in phishing emails that contain malicious macros. This article has been indexed from Cyware News –…

Alphabet’s Reported $23B Bet on Wiz Fizzles Out

Alphabet’s planned $23 billion acquisition of cybersecurity firm Wiz has fallen through, leading Wiz to pursue its own path toward an IPO and aiming for $1 billion in annual recurring revenue (ARR). This article has been indexed from Cyware News…

The Power and Peril of RMM Tools

RMM tools have become essential in managing remote devices, but they also pose risks if exploited by threat actors. Attackers can gain remote access to devices, exfiltrate data, and remain undetected. This article has been indexed from Cyware News –…

Google Abandons Plan to Drop Third-Party Cookies in Chrome

Google has decided to continue supporting third-party cookies, instead proposing a new approach that allows users to opt-in to their Privacy Sandbox. This comes after criticism and regulatory pressure over privacy concerns and competition issues. This article has been indexed…

Verizon to Pay $16 Million in TracFone Data Breach Settlement

Verizon Communications has agreed to pay a $16 million settlement to the FCC for three data breaches at TracFone Wireless, a subsidiary acquired in 2021. TracFone provides services under brands like Total by Verizon Wireless and Straight Talk. This article…

BreachForums v1 database leak is an OPSEC test for hackers

The leak comes from a backup allegedly sold by Conor Fitzpatrick, also known as Pompompurin. Following the seizure of RaidForums in 2022, Fitzpatrick launched BreachForums v1, which was later seized by the FBI and linked to his arrest. This article…

FrostyGoop Malware Used to Shut down Heat in Ukraine Attack

FrostyGoop can disrupt industrial processes by altering values on ICS devices. The malware exploited the Modbus protocol to directly affect industrial control systems, posing a significant threat to OT environments globally. This article has been indexed from Cyware News –…

Ransomware Takedowns Leave Criminals Scrambling for Stability

A recent report from Europol indicates that the disruption of ransomware-as-a-service (RaaS) groups is causing a fragmentation of the threat landscape, complicating tracking efforts. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Fake Grand Theft Auto VI Beta Download Spreads Malware

Bitdefender researchers found suspicious Facebook ads promoting fake beta versions for free download on PC. These ads promise early access to a non-existent GTA VI beta with attractive features and release dates, using stolen gameplay footage. This article has been…

Attackers Abuse Swap File to Steal Credit Cards

Attackers recently abused the swap file in a Magento e-commerce site to steal credit card information. Despite multiple cleanup attempts, the malware persisted until analysts discovered it. This article has been indexed from Cyware News – Latest Cyber News Read…

Analyzing Container Escape Techniques in Cloud Environments

While containers offer efficiency, they are vulnerable to attacks exploiting misconfigurations. Attackers can execute code or escalate privileges, endangering organizational security. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Analyzing Container Escape…

Fake CrowdStrike Fixes Target Companies With Malware, Data Wipers

Malicious campaigns have emerged, including one targeting BBVA bank customers with a fake CrowdStrike Hotfix that installs remote access tools. Another attack involves a data wiper distributed under the guise of a CrowdStrike update. This article has been indexed from…

China Claims Volt Typhoon was a False Flag Inside Job Conspiracy

Beijing has claimed that the Volt Typhoon attack gang, accused by Five Eyes nations of being a Beijing-backed threat to critical infrastructure, was actually fabricated by the US intelligence community. This article has been indexed from Cyware News – Latest…

Operation Spincaster Targets Crypto Pig-Butchering Scams

Operation Spincaster, involving law enforcement and government agencies across six countries, as well as 17 cryptocurrency exchanges, has identified 7,000 leads and $162 million in losses. This article has been indexed from Cyware News – Latest Cyber News Read the…

Critical Splunk Flaw can be Exploited to Grab Passwords

A critical vulnerability (CVE-2024-36991) in Splunk Enterprise on Windows is considered more severe than initially thought, allowing attackers to grab passwords. Various proof-of-concept exploits have been published. This article has been indexed from Cyware News – Latest Cyber News Read…

Revolver Rabbit Gang Registers 500,000 Domains for Malware Campaigns

The Revolver Rabbit cybercriminal gang has registered over 500,000 domain names for infostealer campaigns targeting Windows and macOS systems. They utilize registered domain generation algorithms (RDGAs) to rapidly register multiple domains at once. This article has been indexed from Cyware…

CISA Appoints New Cybersecurity, Stakeholder Group Leaders

The Cybersecurity and Infrastructure Security Agency (CISA) has appointed new leaders to its cybersecurity division and stakeholder engagement role to enhance national cyber defenses and foster collaboration between the public and private sectors. This article has been indexed from Cyware…

Exchange Online Adds Inbound DANE with DNSSEC for Security Boost

This new capability combines DNS-based Authentication of Named Entities (DANE) for SMTP and Domain Name System Security Extensions (DNSSEC) to protect against downgrade and man-in-the-middle attacks. This article has been indexed from Cyware News – Latest Cyber News Read the…

Critical Cisco Bug Lets Hackers Add Root Users on SEG Devices

Cisco has addressed a critical vulnerability that allows attackers to add new users with root privileges and crash Security Email Gateway (SEG) appliances by sending emails with malicious attachments. This article has been indexed from Cyware News – Latest Cyber…

SolarWinds Fixes Eight Critical Bugs in Access Rights Audit Software

The vulnerabilities (CVE-2024-23469, CVE-2024-23466, CVE-2024-23467, CVE-2024-28074, CVE-2024-23471, and CVE-2024-23470) were all rated with severity scores of 9.6/10 and posed risks of unauthorized actions and information disclosure. This article has been indexed from Cyware News – Latest Cyber News Read the…

Firms Skip Security Reviews of Updates About Half the Time

A recent poll of tech managers from CrowdStrike’s 2024 State of Application Security Report revealed that cybersecurity workers only review major updates to software applications 54% of the time. This article has been indexed from Cyware News – Latest Cyber…

Ransomware Costs at Critical Infrastructure Organizations Soar

According to Sophos, ransomware attacks on critical national infrastructure (CNI) organizations have seen a significant increase in costs over the past year, with the median ransom payments reaching $2.54 million. This article has been indexed from Cyware News – Latest…

Cisco SSM On-Prem Bug Lets Hackers Change Any User’s Password

Tracked as CVE-2024-20419, the flaw enables remote attackers to set new passwords without authentication. Admins are advised to upgrade to the fixed release to protect vulnerable servers, as there are no workarounds available. This article has been indexed from Cyware…

Most GitHub Actions Workflows are Insecure in Some Way

A report by Legit Security highlights concerns around the security posture of the GitHub Actions marketplace, with most custom Actions lacking verification and being maintained by one developer. This article has been indexed from Cyware News – Latest Cyber News…

Report: Half of SMEs Unprepared for Cyber-Threats

According to a new report by JumpCloud, About 49% of SME IT teams feel they lack resources to defend against cyber-threats, with layoffs affecting nearly half of them. 71% believe budget cuts would increase risk. This article has been indexed…

Coast Guard Battles Cyberthreats Amid Industry Resistance

A recent report reveals that private sector stakeholders in the marine transportation system are hesitating to utilize critical cybersecurity services offered by the U.S. Coast Guard. This article has been indexed from Cyware News – Latest Cyber News Read the…

Scattered Spider Chooses RansomHub, Qilin for Latest Attacks

Scattered Spider, a notorious cybercrime group, has added ransomware strains RansomHub and Qilin to its arsenal, as revealed by Microsoft. They are known for sophisticated social engineering tactics to breach targets and steal data. This article has been indexed from…

Firmware Update Hides Bluetooth Fingerprints

A team of researchers from the University of California San Diego has developed a firmware update to hide a smartphone’s unique Bluetooth fingerprint, which can be used to track the user. This article has been indexed from Cyware News –…

Fake AWS Packages Ship Command and Control Malware in JPEG Files

The two malicious packages, img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy, were downloaded 190 and 48 times, respectively, before being removed by npm security. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Fake AWS Packages Ship…

Paris 2024 Olympics to Face Complex Cyber Threats

Paris 2024 Olympics are expected to face a significant increase in cyber threats, with IDC predicting the Games will encounter a complex threat landscape and a large ecosystem of threat actors. This article has been indexed from Cyware News –…

Ransomware Leak Site Posts Jumped 20% in Q2

According to Reliaquest, ransomware incidents surged in Q2, with 1,237 organizations listed on data leak sites, a 20% increase from Q1. U.S. businesses were hit the hardest, accounting for over half of the victims. This article has been indexed from…

ChatGPTriage: How can CISOs See and Control Employees’ AI Use?

Building a database of AI destinations and capturing employee activity are essential steps in gaining visibility. Monitoring user prompts, responses, and data exchanged with AI models is crucial for understanding employee behavior. This article has been indexed from Cyware News…

JPCERT/CC Warns of MirrorFace Attacks Against Japanese Organizations

Initially, the targets of MirrorFace were media, political organizations, think tanks, and universities, but by 2023, the focus shifted to manufacturers and research institutions. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Well-Established Cybercriminal Ecosystem Blooms in Iraq

Researchers have uncovered a well-established cybercriminal ecosystem connected to a Telegram bot, with over 90,000 Arabic messages dating back to 2022, enabling a sophisticated network offering social media manipulation and financial theft services. This article has been indexed from Cyware…

Kubernetes Exposed: Exploiting the Kubelet API

Real-world attacks have been observed where attackers target the Kubelet API to steal secrets and gain control over clusters. Various techniques, such as environment discovery, network scanning, and secrets collection, have been utilized by hackers. This article has been indexed…