Slack fixed a vulnerability in its AI feature that could allow attackers to steal data from private channels. The flaw involved a prompt injection flaw in an AI feature, which allowed attackers to manipulate the system to perform malicious actions.…
Tag: EN
Urgent Edge Security Update: Microsoft Patches Zero-day & RCE Vulnerabilities
The urgent security update, Microsoft Edge Stable Channel Version 128.0.2739.42, based on Chromium versions 128.0.6613.85 and 128.0.6613.84, addresses a total of 25 security issues. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads
Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems with information stealers and loaders. “This memory-only dropper decrypts and executes a PowerShell-based downloader,” Google-owned Mandiant…
Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp
Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian state-sponsored threat actor, who it said used a set of WhatsApp accounts that attempted to target individuals in Israel, Palestine,…
CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. The medium-severity vulnerability, tracked as CVE-2024-39717 (CVSS score: 6.6), is case…
China-linked APT Velvet Ant Exploited Zero-Day to Compromise Cisco Nexus Switches
The China-linked APT group Velvet Ant exploited a zero-day vulnerability in Cisco switches, CVE-2024-20399, to take control of network devices. The flaw in Cisco NX-OS Software’s CLI enabled attackers with Admin credentials to run arbitrary commands. This article has been…
Russian national arrested in Argentina for laundering money of crooks and Lazarus APT
A Russian national was arrested in Argentina for laundering proceeds from illicit actors, including North Korea-linked Lazarus Group. This week, the Argentine Federal Police (PFA) arrested a Russian national for laundering proceeds from illicit actors and seized millions of dollars…
Exploit for CVE-2024-38054 Released: Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk
This vulnerability allows local attackers to escalate privileges to SYSTEM level through a heap-based buffer overflow. With a CVSS score of 7.8, CVE-2024-38054 is a critical flaw patched by Microsoft in July. This article has been indexed from Cyware News…
Hackers Now Use AppDomain Injection to Drop Cobalt Strike Beacons
Hackers are now using AppDomain Injection to drop Cobalt Strike beacons in a series of attacks that began in July 2024. This technique, known as AppDomain Manager Injection, can weaponize any Microsoft .NET application on Windows. This article has been…
Cyber Security Today Week In Review: Saturday, August 24th, 2024
Join host Jim Love in this weekend edition of Cyber Security Today, featuring a distinguished panel including Terry Cutler (Cyology Labs), David Shipley (Beauceron Security), and special guest Tara Gold (Cado Security). The episode delves into key cybersecurity topics including…
Scammers are increasingly using messaging and social media apps to attack
Meta platforms, alongside Telegram, are among the growing number of sites used as a form of contact in 45% of scams. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Scammers are increasingly…
CISA Adds One Known Exploited Vulnerability to Catalog for Versa Networks Director
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-39717 Versa Director Dangerous File Type Upload Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…
Qilin ransomware steals credentials stored in Google Chrome
Sophos researchers investigated a Qilin ransomware breach attack that led to the theft of credentials stored in Google Chrome browsers. Sophos researchers investigated a Qilin ransomware attack where operators stole credentials stored in Google Chrome browsers of a limited number…
Enhancing School Safety with Cloud Monitor: A Powerful Cyber Safety Protection Tool
As the back-to-school season begins, K-12 tech leaders face many cybersecurity and safety challenges. To help smooth the transition to a secure start to the 2024-2025 school year, we recently hosted a webinar featuring Samuel Hoch, the Technology Director at…
Friday Squid Blogging: Self-Healing Materials from Squid Teeth
Making self-healing materials based on the teeth in squid suckers. Blog moderation policy. This article has been indexed from Schneier on Security Read the original article: Friday Squid Blogging: Self-Healing Materials from Squid Teeth
Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)
A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash. This article has been indexed from Security…
# OffSec 500 – Community Update 1
OffSec 500 participants are making huge strides! Check out the leaderboard and read Tristram’s inspiring weight loss story. The post # OffSec 500 – Community Update 1 appeared first on OffSec. This article has been indexed from OffSec Read the…
Innovator Spotlight: ArmorCode
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…
Audit: FBI is Losing Track of Storage Devices Holding Sensitive Data
DOJ inspectors have found the FBI is not labeling hard drives and other storage devices holding sensitive that are slated for destruction, making them hard to track, and that boxes of them can sit in a poorly secured facility for…
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program has been reviewed and approved by Congress. Though…