Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian state-sponsored threat actor, who it said used a set of WhatsApp accounts that attempted to target individuals in Israel, Palestine,…
Tag: EN
CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. The medium-severity vulnerability, tracked as CVE-2024-39717 (CVSS score: 6.6), is case…
China-linked APT Velvet Ant Exploited Zero-Day to Compromise Cisco Nexus Switches
The China-linked APT group Velvet Ant exploited a zero-day vulnerability in Cisco switches, CVE-2024-20399, to take control of network devices. The flaw in Cisco NX-OS Software’s CLI enabled attackers with Admin credentials to run arbitrary commands. This article has been…
Russian national arrested in Argentina for laundering money of crooks and Lazarus APT
A Russian national was arrested in Argentina for laundering proceeds from illicit actors, including North Korea-linked Lazarus Group. This week, the Argentine Federal Police (PFA) arrested a Russian national for laundering proceeds from illicit actors and seized millions of dollars…
Exploit for CVE-2024-38054 Released: Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk
This vulnerability allows local attackers to escalate privileges to SYSTEM level through a heap-based buffer overflow. With a CVSS score of 7.8, CVE-2024-38054 is a critical flaw patched by Microsoft in July. This article has been indexed from Cyware News…
Hackers Now Use AppDomain Injection to Drop Cobalt Strike Beacons
Hackers are now using AppDomain Injection to drop Cobalt Strike beacons in a series of attacks that began in July 2024. This technique, known as AppDomain Manager Injection, can weaponize any Microsoft .NET application on Windows. This article has been…
Cyber Security Today Week In Review: Saturday, August 24th, 2024
Join host Jim Love in this weekend edition of Cyber Security Today, featuring a distinguished panel including Terry Cutler (Cyology Labs), David Shipley (Beauceron Security), and special guest Tara Gold (Cado Security). The episode delves into key cybersecurity topics including…
Scammers are increasingly using messaging and social media apps to attack
Meta platforms, alongside Telegram, are among the growing number of sites used as a form of contact in 45% of scams. This article has been indexed from Latest stories for ZDNET in Security Read the original article: Scammers are increasingly…
CISA Adds One Known Exploited Vulnerability to Catalog for Versa Networks Director
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-39717 Versa Director Dangerous File Type Upload Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…
Qilin ransomware steals credentials stored in Google Chrome
Sophos researchers investigated a Qilin ransomware breach attack that led to the theft of credentials stored in Google Chrome browsers. Sophos researchers investigated a Qilin ransomware attack where operators stole credentials stored in Google Chrome browsers of a limited number…
Enhancing School Safety with Cloud Monitor: A Powerful Cyber Safety Protection Tool
As the back-to-school season begins, K-12 tech leaders face many cybersecurity and safety challenges. To help smooth the transition to a secure start to the 2024-2025 school year, we recently hosted a webinar featuring Samuel Hoch, the Technology Director at…
Friday Squid Blogging: Self-Healing Materials from Squid Teeth
Making self-healing materials based on the teeth in squid suckers. Blog moderation policy. This article has been indexed from Schneier on Security Read the original article: Friday Squid Blogging: Self-Healing Materials from Squid Teeth
Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)
A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash. This article has been indexed from Security…
# OffSec 500 – Community Update 1
OffSec 500 participants are making huge strides! Check out the leaderboard and read Tristram’s inspiring weight loss story. The post # OffSec 500 – Community Update 1 appeared first on OffSec. This article has been indexed from OffSec Read the…
Innovator Spotlight: ArmorCode
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…
Audit: FBI is Losing Track of Storage Devices Holding Sensitive Data
DOJ inspectors have found the FBI is not labeling hard drives and other storage devices holding sensitive that are slated for destruction, making them hard to track, and that boxes of them can sit in a poorly secured facility for…
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program has been reviewed and approved by Congress. Though…
Fake funeral “live stream” scams target grieving users on Facebook
Facebook scammers are posting links to fake funeral live streams to get victims to sign up for paid services or steeal credit card details This article has been indexed from Malwarebytes Read the original article: Fake funeral “live stream” scams…
CrowdStrike 2024 report exposes North Korea’s covert workforce in U.S. tech firms
In April 2024, CrowdStrike Services responded to the first of several incidents in which North Korea’s FAMOUS CHOLLIMA malicious insiders targeted U.S. firms This article has been indexed from Security News | VentureBeat Read the original article: CrowdStrike 2024 report…
Phishing attacks target mobile users via progressive web applications (PWA)
Cybercriminals use progressive web applications (PWA) to impersonate banking apps and steal credentials from mobile users. ESET researchers detailed a phishing campaign against mobile users that uses Progressive Web Applications (PWAs). The threat actors used fake apps almost indistinguishable from real…