Author: Admin
The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often and at such a high rate that it can be very difficult to keep up. Some vulnerabilities will set off alarm bells in your security tools, while others are much more subtle but still pose an equally dangerous threat. Today we want to discuss one of the Source link
August 30, 2024Ravi LakshmananCyber espionage / threat intelligence Chinese-speaking users are being targeted by a “highly organized and sophisticated attack” campaign that is likely using phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers were able to move sideways, establish persistence, and remain undetected on systems for over two weeks,” Securonix researchers Dan Yuzwick and Tim Peck said in a new report. A secret company under a code name SLOW#STORM and not attributed to any known threat actor, begins with malicious ZIP files that, when unzipped, activate an infection chain that leads to the deployment of a…
August 30, 2024Hacker newsICS Security / OT Security The comprehensive guide, authored by Dean Parsons, highlights the growing need for specialized ICS security measures in the face of growing cyber threats. With a staggering 50% increase in ransomware attacks targeting industrial control systems (ICS) in 2023, the SANS Institute is taking decisive action by announcing the release of its important new strategic guidance, “ICS is a business: why securing ICS/OT environments is business critical in 2024.” Authored by Dean Parsons, ICS Defense Force CEO and SANS Certified Instructor, this guide offers a comprehensive analysis of the rapidly evolving threat landscape…
August 30, 2024Ravi LakshmananCryptocurrency / Malware Threat actors linked to North Korea have been seen publishing a number of malicious packages to the npm registry, indicating a “coordinated and relentless” effort to target malware developers and steal cryptocurrency assets. The latest wave, observed between August 12 and 27, 2024, included packages named temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and qq-console. “The behavior of this company leads us to believe that qq-console is related to a North Korean company known as Contagious Interview,” wrote software security firm Phylum. said. Contagious interview refers to an campaign continues which seeks to compromise software developers with…
August 29, 2024Ravi LakshmananBrowser Security / Vulnerability Cybersecurity researchers have identified several exploit campaigns in the wild that have used patched flaws in Apple’s Safari and Google Chrome browsers to infect mobile users with information-stealing malware. “These companies presented exploits for n days for which patches were available, but they were still effective against unpatched devices,” Google Threat Analysis Group (TAG) researcher Clement Lessin said in a report shared with The Hacker News. The activity observed between November 2023 and July 2024 is notable for the fact that the exploits were carried out using a hacker attack on the Mongolian…
August 29, 2024Ravi LakshmananCyber espionage / malware A non-profit organization that supports human rights in Vietnam was the target of a multi-year campaign designed to spread various malware on compromised hosts. Cybersecurity firm Huntress attributed the activity to a threat cluster known as APT32, a Vietnam-based hacking group also known as APT-C-00, Canvas Cyclone (formerly Bismuth), Cobalt Kitty and OceanLotus. The invasion is believed to have lasted at least four years. “This intrusion has a number of overlaps with known methods used by the APT32/OceanLotus threat actor and a known target demographic that matches the goals of APT32/OceanLotus,” security researchers…
August 29, 2024Ravi LakshmananIoT Security / Vulnerability A multi-year high-severity flaw affecting AVTECH IP cameras has been weaponized by attackers as a zero-day tool to tie them into botnets. CVE-2024-7029 (CVSS Score: 8.7), the vulnerability in question is “a remote code execution (RCE) command injection vulnerability discovered in the brightness feature of AVTECH CCTV cameras.” , Akamai researchers Kyle Lefton, Larry Cashdollar and Aline Eliovich said. Details of the security flaw were first published earlier this month by the US Cybersecurity and Infrastructure Security Agency (CISA), highlighting its low attack complexity and remote exploitability. “Successful exploitation of this vulnerability could…
US cybersecurity and intelligence agencies have accused an Iranian hacking group of hacking multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity was linked to a threat actor called Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm (formerly Rubidium), Parisite, and UNC757, which is described as being linked to the Iranian government and using an Iranian information technology (IT) company, Danesh Novin Sahand , probably as a cover. “Their malicious cyber operations are aimed at deploying ransomware attacks to gain and develop network access,” said the Cybersecurity and Infrastructure Security Agency (CISA),…
August 29, 2024Ravi LakshmananInternet Crime / Privacy French prosecutors on Wednesday formally charged CEO Paul Dourav with facilitating a series of criminal activities on the popular messaging platform and opened a formal investigation. after his arrest saturday Russian-born Durov, who is also a French citizen, was charged with complicity in the distribution of child sexual abuse material (CSAM), as well as facilitating organized crime, illegal operations, drug trafficking and fraud. There was also a fool is charged with “refusal to hand over, at the request of the competent authorities, information or documents necessary to conduct and carry out interceptions authorized…
August 28, 2024Ravi LakshmananVulnerability / Data Security Fortra has resolved a critical security flaw affecting the FileCatalyst workflow that could be exploited by a remote attacker to gain administrative access. The vulnerability, tracked as CVE-2024-6633, has a CVSS score of 9.8 and results from the use of a static password to connect to an HSQL database. “The default credentials to install the HSQL database (HSQLDB) for FileCatalyst Workflow are published to the vendor knowledge base article”Fortra said in the consulting room. “Misuse of these credentials may compromise the confidentiality, integrity, or availability of the software.” “HSQLDB is included for ease…