This occurs when a private package fetches a similar public one, leading to exploit due to misconfigurations in package managers This article has been indexed from www.infosecurity-magazine.com Read the original article: Dependency Confusion Vulnerability Found in Apache Project
Tag: EN
Malvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoor
By Deeba Ahmed IT professionals are under attack! This article exposes a malicious malvertising campaign targeting IT teams with a novel backdoor named MadMxShell. Learn how attackers use typosquatting and DNS techniques to compromise systems. This is a post from…
Windows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like Abilities
A new vulnerability has been unearthed, allowing attackers to gain rootkit-like abilities on Windows systems without requiring administrative privileges. Dubbed “MagicDot,” this vulnerability exploits the DOS-to-NT path conversion process within the Windows operating system. Here, we delve into the technical…
VMware ESXi Shell Service Exploit on Hacking Forums: Patch Now
A new exploit targeting VMware ESXi Shell Service has been discovered and is circulating on various hacking forums. This vulnerability poses a significant risk to organizations using VMware for their virtual environments, potentially allowing unauthorized access and control over virtual…
UK Cyber Agency NCSC Announces Richard Horne as its Next Chief Executive
The hire marks another coup for the British public sector in poaching talent from the technology industry, particularly at the executive level, following the recruitment of Ollie Whitehouse as the NCSC’s chief technology officer earlier this year. This article has…
Ukrainian Soldiers’ Apps Increasingly Targeted for Spying, Cyber Agency Warns
The agency is attributing the surge to a group tracked as UAC-0184, which was spotted in February targeting an unnamed Ukrainian entity in Finland. CERT-UA does not attribute UAC-0184’s activity to any specific foreign cyber threat group. This article has…
Billions of scraped Discord messages up for sale
An internet scraping platform is offering access to a database filled with over four billion Discord messages and combined user profiles. This article has been indexed from Malwarebytes Read the original article: Billions of scraped Discord messages up for sale
UK data watchdog questions how private Google’s Privacy Sandbox is
Leaked draft report says stated goals still come up short Google’s Privacy Sandbox, which aspires to provide privacy-preserving ad targeting and analytics, still isn’t sufficiently private.… This article has been indexed from The Register – Security Read the original article:…
Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability
Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400. The post Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…
Cybercriminals Threaten Release of Stolen World-Check Database, Exposing Millions to Financial Risk
A financially motivated criminal hacking group, self-identified as GhostR, has claimed responsibility for the theft of a confidential database containing millions of records from the renowned World-Check screening database. The stolen data, totaling 5.3 million records, includes sensitive information…
MITRE breached by nation-state threat actor via Ivanti zero-days
MITRE has been breached by attackers via two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti’s Connect Secure VPN devices. The attackers have also managed to move laterally and compromise the company network’s VMware infrastructure, MITRE confirmed late last week. What is…
Trend Micro launches AI-driven cyber risk management capabilities
Trend Micro unveiled AI-driven cyber risk management capabilities across its entire flagship platform, Trend Vision One. This seamlessly integrates more than 10 industry technology categories into one offering, empowering security, cloud and IT operations teams to manage risk proactively. The…
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and…
Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half. And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital…
Has the ever-present cyber danger just got worse?
Facing down the triple threat of ransomware, data breaches and criminal extortion Sponsored On the face of it, there really isn’t much of an upside for the current UK government after MPs described its response to attacks by cyber-espionage group…
Alert! Zero-day Exploit For WhatsApp Advertised On Hacker Forums
A zero-day exploit targeting the popular messaging app WhatsApp has been advertised on underground hacker forums. The exploit has raised serious concerns regarding the safety of users on Android and iOS platforms. This exploit is reported to have the potential…
Sharp-Project: New Stealer Family on the Market
Infostealers are one of the most lucrative types of malware employed by criminals. And because this is a tried and tested approach, there are still new players entering this illegal game. The new kid on the block is called “Sharp…
Researchers Find Dozens of Fake E-Zpass Toll Websites After FBI Warning
Researchers from cybersecurity firm DomainTools told Recorded Future News that they have found nearly 30 newly created domains related to tolls, 15 of which have a “high chance of being weaponized for phishing, malware, or spam.” This article has been…
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe…
CrushFTP File Transfer Vulnerability Lets Attackers Download System Files
CrushFTP is urging customers to download v11 of its file transfer platform, with attackers actively exploiting a vulnerability that allows them to download system files This article has been indexed from www.infosecurity-magazine.com Read the original article: CrushFTP File Transfer Vulnerability…