Tag: Cyware News – Latest Cyber News

Dozens of Arrests Disrupt $2.7m Vishing Gang

The criminal gang targeted elderly Spanish citizens by posing as bank employees through voice phishing and then showing up unannounced at their homes to collect cards, bank details, and PINs. This article has been indexed from Cyware News – Latest…

The Impossibility of “Getting Ahead” in Cyber Defense

The nature of defense is inherently stacked against defenders, as cybercriminals aim to disrupt systems while defenders manage complex tech stacks. Additionally, the rapid evolution of technology means defenders are always playing catch-up. This article has been indexed from Cyware…

FCC Drafts Rules to Strengthen Cyber of Emergency Systems

The Federal Communications Commission (FCC) has proposed draft final rules to enhance the security of public alert and warning systems in the face of emerging cybersecurity threats. This article has been indexed from Cyware News – Latest Cyber News Read…

Cybersecurity is Now a Top Concern for Auto Industry, Report Finds

According to a survey by Rockwell Automation, vehicle and automotive supply manufacturers ranked cybersecurity as their biggest external concern. Cyberattacks resulted in $11.8 billion in damages during the first half of 2023 alone. This article has been indexed from Cyware…

New Orcinius Trojan Uses VBA Stomping to Mask Infection

This multi-stage trojan utilizes Dropbox and Google Docs to update and deliver payloads. It uses the VBA stomping technique, removing the VBA source code in a Microsoft Office document, leaving only compiled p-code. This article has been indexed from Cyware…

Preparing for Q-Day as NIST Nears Approval of PQC Standards

Q-Day, the day when a quantum computer can break modern encryption, is approaching rapidly, leaving our society vulnerable to cyberattacks. Recent advancements in quantum technology suggest that Q-Day is coming sooner than expected. This article has been indexed from Cyware…

How Hacked YouTube Channels Spread Scams and Malware

The most common attack methods against YouTube channels involve phishing attacks to steal login credentials, exploiting weak or reused passwords, and even bypassing two-factor authentication by stealing session cookies. This article has been indexed from Cyware News – Latest Cyber…

Report: Cyber Workforce Grows 15% at Large Organizations

Large organizations have significantly bolstered their cybersecurity workforce in 2024, with an average of one expert dedicated to cybersecurity for every 1,086 employees in companies with over $1 billion in revenue, as per a report by Wavestone. This article has…

Latest Intel CPUs Impacted by New Indirector Side-Channel Attack

Researchers at the University of California, San Diego have discovered a new type of attack called ‘Indirector’ that targets modern Intel processors, including those from the Raptor Lake and Alder Lake generations. This article has been indexed from Cyware News…

CISOs Becoming More Comfortable With Risk Levels

The cyber threats landscape has led to changes in the way CISOs evaluate their business’s risk appetite, causing tensions with CEO and C-suite members, according to Netskope. This article has been indexed from Cyware News – Latest Cyber News Read…

National Australia Bank Raises Alarm About Cyber Threats to Major Banks

Australia’s four major banks, including ANZ Bank, Commonwealth Bank, National Australia Bank (NAB), and Westpac, are constantly under attack from threat actors seeking to steal sensitive information and money from unsuspecting customers. This article has been indexed from Cyware News…

Korean ERP Vendor’s Update Systems Subverted to Spew Malware

A South Korean ERP vendor’s product update server was breached by attackers who used it to distribute malware instead of legitimate updates, according to AhnLab, a local cybersecurity firm. This article has been indexed from Cyware News – Latest Cyber…

Poland to Probe Russia-Linked Cyberattack on State News Agency

Polish prosecutors are investigating a suspected Russian attack on the country’s state news agency, the Polish Press Agency (PAP). The attack, which occurred in May, aimed to spread disinformation and cause disruptions in Poland’s system or economy. This article has…

Apple CocoaPods Bugs Expose Millions of Apps to Code Injection

A report by E.V.A Information Security reveals that Apple’s popular dependency manager, CocoaPods, has been plagued with three critical vulnerabilities for several years. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Apple…

Startup Odaseva Raises $54M to Bolster Global Expansion, R&D

The Series C funding will allow San Francisco-based Odaseva to provide more robust support to clients dealing with stringent data residency regulations and evolving privacy laws around the globe, according to founder and CEO Sovan Bin. This article has been…

Report: 75% of New Vulnerabilities Exploited Within 19 Days

Last year, Skybox Security reported that there were over 30,000 new vulnerabilities, with a new vulnerability emerging every 17 minutes on average. This amounts to around 600 new vulnerabilities per week. This article has been indexed from Cyware News –…

Multiple Vulnerabilities Found in Gas Chromatographs

Multiple critical vulnerabilities have been discovered in Emerson gas chromatographs, which could potentially enable unauthorized access to sensitive data, cause denial-of-service attacks, and execute arbitrary commands. This article has been indexed from Cyware News – Latest Cyber News Read the…

Web Scraping is Not Just a Security or Fraud Problem

Scraper bots have a negative impact on various aspects of an organization, including revenue, competitive advantage, brand identity, customer experience, infrastructure costs, and digital experience. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Threat Actors Actively Exploit D-Link DIR-859 Router Flaw

The flaw, which has a CVSS score of 9.8, allows threat actors to perform path traversal attacks and gain unauthorized access to sensitive information, including user passwords. This article has been indexed from Cyware News – Latest Cyber News Read…

Critical GitLab Bug Lets Attackers Run Pipelines as Any User

A critical vulnerability has been discovered in certain versions of GitLab Community and Enterprise Edition products. This vulnerability allows an attacker to run pipelines as any user. This article has been indexed from Cyware News – Latest Cyber News Read…

China-Sponsored Attackers Target 40K Corporate Users in 90 Days

The campaigns, named LegalQloud, Eqooqp, and Boomer, deploy highly evasive and adaptive threat (HEAT) attack techniques that can bypass multifactor authentication (MFA) and URL filtering. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Kimsuky Deploys TRANSLATEXT to Target South Korean Academia

Kimsuky uploaded TRANSLATEXT to their attacker-controlled GitHub repository on March 7, 2024, and it is capable of bypassing security measures for prominent email service providers like Gmail, Kakao, and Naver. This article has been indexed from Cyware News – Latest…

Crypto-Gang Leader Convicted of Vicious Kidnaps, Robbery

A 24-year-old leader of an international robbery crew, Remy St Felix, has been convicted in the US for carrying out violent home invasions to steal cryptocurrency tokens. This article has been indexed from Cyware News – Latest Cyber News Read…

Nuance Ex-Employee Indicted for Breach Affecting 1 Million

A former employee of Nuance Communications, a unit of Microsoft, is the main suspect in a 2023 data breach that affected over 1 million patients of Geisinger, a healthcare system based in Pennsylvania. This article has been indexed from Cyware…

New Ransomware, Infostealers Pose Growing Risk in 2024

In Q1 2024, BlackBerry detected and stopped 3.1 million cyberattacks, averaging 37,000 per day. They also detected 630,000 malicious hashes, a 40% increase from the previous reporting period. This article has been indexed from Cyware News – Latest Cyber News…

CISA Report Finds Critical Open-Source Memory Safety Risks

CISA urges manufacturers to reduce memory safety vulnerabilities by ditching memory-unsafe languages, implementing secure coding practices, and adopting routine security testing measures. This article has been indexed from Cyware News – Latest Cyber News Read the original article: CISA Report…

WhisperGate Data-Wiping Malware Suspect Indicted

The US Department of Justice has indicted a 22-year-old Russian, Amin Timovich Stigal, for his alleged involvement in cyber attacks on Ukrainian government computers and critical infrastructure systems known as the “WhisperGate” attack. This article has been indexed from Cyware…

B+ Security Rating Masks Healthcare Supply Chain Risks

The healthcare sector received a “B+” security rating for the first half of 2024, indicating a decent level of security. However, it faces a significant vulnerability in the form of supply chain cyber risk. This article has been indexed from…

California Privacy Regulator to Partner With French Data Authority

The California Privacy Protection Agency (CPPA) has signed a partnership agreement with France’s Commission Nationale de l’Informatique et des Libertés (CNIL) to conduct joint research and share investigative findings on data privacy issues. This article has been indexed from Cyware…

Xeno RAT Spread via .gg Domains and GitHub

XenoRAT is being used by North Korean hackers and other actors targeting the gaming community. It is being spread through .gg domains and a GitHub repository disguised as Roblox scripting tools. This article has been indexed from Cyware News –…

No Patches for Hospital Temperature Monitors’ Critical Flaws

Researchers at Nozomi Networks uncovered four vulnerabilities in Sensor Net Connect and three flaws in the Thermoscan IP desktop application, both made by a division of French firm Proges Plus. This article has been indexed from Cyware News – Latest…

Vanna AI Prompt Injection Vulnerability Enables RCE

The Vanna AI library has been found to have a vulnerability (CVE-2024-5565) that could allow for remote code execution (RCE) due to a prompt injection issue related to the Plotly script. This article has been indexed from Cyware News –…

PoC Exploit for Critical Fortra FileCatalyst Flaw Published

The vulnerability allows attackers to create administrative user accounts, modify and delete data in the application database, and potentially gain full control of vulnerable systems. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Malicious NPM Package Targets AWS Users to Deploy Backdoor

ReversingLabs researchers discovered a suspicious package on npm called legacyreact-aws-s3-typescript. They found that the package contained a post-install script that downloaded and executed a simple backdoor. This article has been indexed from Cyware News – Latest Cyber News Read the…

Phantom Secrets: Undetected Secrets Expose Major Corporations

Major secrets, including cloud environment credentials, internal infrastructures, and telemetry platforms, have been found exposed on the internet due to Git-based processes and Source Code Management (SCM) platforms behavior. This article has been indexed from Cyware News – Latest Cyber…

Update: MOVEit Transfer Vulnerability Targeted Amid Disclosure Drama

The non-profit cybersecurity organization, the Shadowserver Foundation, has observed exploitation attempts against CVE-2024-5806. They noted that the exploitation began soon after the vulnerability details were made public. This article has been indexed from Cyware News – Latest Cyber News Read…

Chinese Cyberspies Employ Ransomware in Attacks for Diversion

The adoption of ransomware in cyberespionage attacks helps adversaries blur the lines between APT and cybercriminal activity, leading to potential misattribution or concealing the true nature of the operation. This article has been indexed from Cyware News – Latest Cyber…

Multiple Vulnerabilities in Siemens Power Automation Products

Siemens recently patched several vulnerabilities in its Sicam products that could be exploited to target the energy sector. The updates addressed two high-severity and one medium-severity flaws. This article has been indexed from Cyware News – Latest Cyber News Read…

New Medusa Malware Variants Target Android Users in Seven Countries

The Medusa banking trojan (aka TangleBot) operates as a malware-as-a-service, providing keylogging, screen controls, and SMS manipulation. Note that this operation is different from the ransomware gang and the Mirai-based botnet with the same name. This article has been indexed…

Zeek: Open-Source Network Traffic Analysis, Security Monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual, or cloud platform. This article has been indexed from Cyware News…

Update: CISA Warns Chemical Facilities of Potential Data Theft

Although there was no evidence of data theft or lateral movement, the agency’s investigation revealed that unauthorized access to various sensitive information, including security plans and user accounts, may have occurred. This article has been indexed from Cyware News –…

Russian Hackers Target Ukraine with XWorm RAT Malware Payload

Cyble Research and Intelligence Labs (CRIL) researchers have discovered that a Russia-linked threat group known as UAC-0184 is targeting Ukraine using the XWorm remote access trojan (RAT). This article has been indexed from Cyware News – Latest Cyber News Read…

Authentication Bypasses in MOVEit Transfer and MOVEit Gateway

A critical security vulnerability, CVE-2024-5806, has been found in MOVEit Transfer, a popular file transfer software. The vulnerability allows attackers to bypass authentication checks and gain administrative access by sending manipulated requests. This article has been indexed from Cyware News…

Report: Cloud Breaches Impact Nearly Half of Organizations

According to the Thales 2024 Cloud Security Study, 44% of organizations have experienced a cloud data breach, with 14% reporting incidents in the past year. Human error and misconfigurations were the top root causes, affecting 31% of cases. This article…

FBI Warns of Fake Law Firms Targeting Crypto Scam Victims

The FBI has issued a warning about cybercriminals pretending to be law firms and lawyers offering cryptocurrency recovery services. These scammers target victims of investment scams, stealing funds and personal information. This article has been indexed from Cyware News –…

Android RAT SpyMax Targets Telegram Users

SpyMax does not require the targeted device to be rooted, making it easier for threat actors to cause damage. Once installed, SpyMax gathers personal information from the infected device without user consent and sends it to a remote threat actor.…

P2PInfect Botnet Targets Redis Servers with New Ransomware Module

P2PInfect, a previously dormant peer-to-peer malware botnet, has recently become active and is now targeting Redis servers. The botnet has introduced new features like cron-based persistence mechanisms and SSH lockout. This article has been indexed from Cyware News – Latest…

Is the Cybersecurity Industry Ready for AI?

AI is not new to cybersecurity, but generative AI is causing concern as it impacts organizations. A study found that AI-generated threats have already affected 75% of organizations, yet 60% are not prepared to handle AI-based attacks. This article has…

New Attack Uses MSC Files and Windows XSS Flaw to Breach Networks

A new command execution technique called “GrimResource” has been discovered that leverages a combination of specially crafted Microsoft Saved Console (MSC) files and an unpatched Windows XSS flaw. This article has been indexed from Cyware News – Latest Cyber News…

Boolka Group’s Modular Trojan BMANAGER Exposed

The Boolka group is responsible for deploying advanced malware and conducting web attacks. They have been exploiting vulnerabilities using SQL injection attacks since 2022, targeting websites in various countries. This article has been indexed from Cyware News – Latest Cyber…

Hackers Create Rogue Admin Accounts via Backdoored WordPress Plugins

Multiple WordPress plugins have been found to contain a backdoor that injects malicious code. This code allows attackers to create unauthorized administrator accounts, enabling them to perform malicious actions. This article has been indexed from Cyware News – Latest Cyber…

Digital ID Adoption: Implementation and Security Concerns

As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead in security and efficiency, according to Regula. This article has been indexed from Cyware News – Latest Cyber News Read…

Human Error Still Perceived as the Achilles’ Heel of Cybersecurity

While fears of cyberattacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. This article has been indexed from Cyware News – Latest…

Australian Telecom Watchdog Sues Optus Over 2022 Data Breach

The Australian Communications and Media Authority said it has filed proceedings against Optus in a federal court as the company failed to protect sensitive customer data during a data breach in September 2022 that affected close to 10 million people.…

Worried About Job Security, Cyber Teams Hide Security Incidents

The frequency and severity of attacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, and new sophisticated attack methods, companies are more susceptible than ever. This article has been indexed from Cyware…

Malicious PyPI Packages Targeting Highly Specific MacOS Machines

Cybersecurity researchers at Datadog Security Labs discovered malicious software packages targeting MacOS users through the Python Package Index (PyPI) and NPM repository. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Malicious PyPI…