In today’s cybersecurity news… Chameleon reappears targeting Canadian restaurant chain The malware originally known for attacking banks has now begun targeting hospitality workers in Canada and Europe, including “an unnamed […] The post Cybersecurity Headlines: Chameleon malware reappears, Rhysida hospital…
Tag: EN
OpenWrt Dominates, but Vulnerabilities Persist in OT/IoT Router Firmware
A Forescont study showed that outdated software components in OT/IoT cellular routers and SOHO routers are linked to known vulnerabilities, with an average of 20 exploitable n-days affecting the kernel in widely used firmware images. This article has been indexed…
Vulnerability Allowed Eavesdropping via Sonos Smart Speakers
Sonos has patched vulnerabilities in its smart speakers, including a serious flaw that could have been exploited to eavesdrop on users. The post Vulnerability Allowed Eavesdropping via Sonos Smart Speakers appeared first on SecurityWeek. This article has been indexed from…
PowerDMARC Integrates with SecLytics for Predictive Threat Intelligence Analysis
Reading Time: 5 min PowerDMARC now integrates with SecLytics to deliver advanced threat intelligence. Strengthen your email security with our powerful combination. The post PowerDMARC Integrates with SecLytics for Predictive Threat Intelligence Analysis appeared first on Security Boulevard. This article…
Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools
ReliaQuest found that Rclone, WinSCP and cURL were the top three data exfiltration tools utilized by threat actors over the past year This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Favor Rclone, WinSCP and cURL…
Windows Zero-day Flaw Let Hackers Downgrade Fully Updated Systems To Old Vulnerabilities
Every software and operating system vendor has been implementing security measures to protect their products. This is due to the fact that threat actors require a lot of time to find a zero-days but require less time to find a…
GhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s Memory
Such is the industry, that RISC-V, an open and extensible instruction set architecture (ISA) has now invaded the CPU market, opening up many opportunities for new entrants. It has gained a lot of traction through Linux kernel support as well…
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model
Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from Change Healthcare but withholding funds from its data exfiltration affiliate. To remedy this, the affiliate has reportedly partnered with RansomHub…
Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices
A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into installing malicious code. The persistence mechanism allows threat actors to maintain covert control over the compromised device, facilitating data exfiltration…
DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs
The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for allegedly running a “laptop farm” to help get North Koreans remote jobs with American and British companies. Matthew Isaac Knoot is charged with conspiracy…
MongoDB Vulnerabilities Let Attackers Escalate Privileges
MongoDB has disclosed a critical vulnerability that could allow attackers to escalate privileges on systems running certain versions of MongoDB. This vulnerability, CVE-2024-7553, affects multiple versions of MongoDB Server, C Driver, and PHP Driver. The flaw stems from incorrect validation…
Russian cyber spies stole data and emails from UK government systems
Earlier this year, Russian cyber spies breached UK government systems and stole sensitive data and emails, reported The Record media. Earlier this year, Russia’s foreign intelligence service stole internal emails and data on individuals from the UK government. The news…
CISA adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache OFBiz and Android kernel bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Android Kernel Remote Code Execution flaw (CVE-2024-36971) and an Apache OFBiz Path…
Next-Gen Vehicle Technologies Present New Challenges for Cybersecurity Professionals
Modern technology has led to the rise of self-driving cars. While advantageous in some aspects, the autonomous vehicle concept introduces cybersecurity challenges. There is also innovation and concern with aviation cybersecurity and autonomous aircraft. Here’s what you need to know…
One of the largest data breaches in history? Cyber Security Today for Friday, August 9th, 2024
Massive Data Breach, Outlook’s Phishing Risk, and Windows Downgrade Attack Vulnerabilities In this episode of Cybersecurity Today, host Jim Love delves into one of the largest data breaches in history involving 2.9 billion records leaked without user consent by National…
Security vulnerability in IT infrastructure of Ransomware gang saves six victimized companies
Recent news has frequently highlighted how vulnerabilities in a company’s IT infrastructure can lead to devastating cyber-attacks. However, an intriguing twist has emerged: a flaw in the infrastructure managed by a ransomware group has led to a dramatic near-miss where…
Key Cloud Security Tools for 2024: A Comprehensive Overview
As cloud computing continues to evolve and integrate deeply into business operations, the need for robust cloud security tools becomes increasingly critical. With new threats emerging and cloud environments growing more complex, it’s essential for organizations to stay ahead of…
Authorities Dismantled North Korean Remote IT Worker Laptop Farm
Authorities have dismantled a “laptop farm” in Nashville, Tennessee, allegedly used to support the Democratic People’s Republic of Korea’s (DPRK) weapons program. Matthew Isaac Knoot, 38, has been charged with multiple offenses, including conspiracy to cause damage to protected computers…
CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install (SMI) feature with the aim of accessing sensitive data. The agency said it has seen adversaries “acquire system configuration files…
Proxmox Backup by NAKIVO: Powerful VM Data Protection
Proxmox VE is mainly suitable for small and medium-sized organizations that require advanced virtualization capabilities but have limited budgets. Proxmox VE is an open-source solution with particular advantages and disadvantages. On one side, it offers flexibility and adaptability that allow…