Source: thehackernews.com – Author: . Jan 30, 2024NewsroomCyber Crime / Malware A Brazilian law enforcement operation has led to the arrest of several Brazilian operators in...
Day: January 30, 2024
URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 30, 2024NewsroomDevSecOps / Vulnerability GitLab once again released fixes to address a critical security flaw in its Community Edition (CE)...
China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 30, 2024NewsroomMalware / Cyber Espionage The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar’s Ministry...
Online ransomware decryptor helps recover partially encrypted files – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas CyberArk has created an online version of ‘White Phoenix,’ an open-source ransomware decryptor targeting operations using intermittent encryption. The company announced...
US charges two more suspects with DraftKing account hacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The U.S. Department of Justice arrested and charged two more suspects for their involvement in the hacking of almost 68,000 DraftKings accounts in...
Vastaamo hacker traced via ‘untraceable’ Monero transactions, police says – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Julius Aleksanteri Kivimäki, the suspect believed to be behind an attack against one of Finland’s largest psychotherapy clinics, Vastaamo, was...
A mishandled GitHub token exposed Mercedes-Benz source code – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A mishandled GitHub token gave unrestricted access to Mercedes-Benz’s internal GitHub Enterprise Service, exposing source code to the public. Mercedes-Benz...
Microsoft Teams phishing pushes DarkGate malware via group chats – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan New phishing attacks abuse Microsoft Teams group chat requests to push malicious attachments that install DarkGate malware payloads on victims’...
How SMBs can lower their risk of cyberattacks and data breaches – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software The Akira ransomware group is targeting small to medium-sized businesses (SMBs) – 80% of its victims, since March 2023, have...
Citibank sued over failure to defend customers against hacks, fraud – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan New York Attorney General Letitia James sued Citibank over its alleged failure to defend customers against hacks and scams and...
Police disrupt Grandoreiro banking malware operation, make arrests – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Federal Police of Brazil and cybersecurity researchers have disrupted the Grandoreiro banking malware operation, which has been targeting Spanish-speaking...
Keenan warns 1.5 million people of data breach after summer cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Keenan & Associates is sending notices of a data breach to 1.5 million customers, warning that hackers accessed their personal...
Schneider Electric Confirms Data Accessed in Ransomware Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Energy firm Schneider Electric has revealed it has fallen victim to a ransomware attack, leading to data from its Sustainability Business...
Orange España Breach: Dark Web Flooded With Operator Credentials – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have uncovered the presence of hundreds of network operators’ credentials circulating on the dark web in the aftermath of a...
Alpha Ransomware Group Launches Data Leak Site on the Dark Web – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A new ransomware group called Alpha has recently emerged with the launch of its Dedicated/Data Leak Site (DLS) on the Dark...
Rust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver Toolkit – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Payloads recently found on compromised Ivanti Connect Secure appliances could be from the same, sophisticated threat actor, according to incident response...
Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Ransomware incidents surged by 68% in 2023 to reach a record high, according to new data from Corvus Insurance. However, law...
FBI: Scammers Are Sending Couriers to Collect Cash From Victims – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The FBI has claimed $55m were lost from May to December 2023 to scammers posing as representatives of the government, financial...
UK House of Lords Calls For Legislation on Facial Recognition Tech – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The UK parliament’s upper chamber has said it is “deeply concerned” about unaccountable police use of live facial recognition (LFR) tech and...
Experts Reveal Dataset with 26 Billion Leaked Records – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici The massive breach includes information from multiple breaches, totaling 12 terabytes of data spread across 26 billion records. This is...
What Is Just-In-Time (JIT) Provisioning – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Key Takeaways: What Is Just-in-Time (JIT) Provisioning? How Does Just-in-Time (JIT) Provisioning Work? Key Components of JIT Provisioning Systems The...
The 7 Key Steps of the Effective Patch Management Process – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși In January 2024, the National Vulnerability Database received over 1,830 new CVEs. That added up to the other already registered...
What Is the Principle of Least Privilege (POLP)? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Key highlights: What least privilege is and how it works; How sophisticated modern attacks occur; Best practices for effective least...
User Access Review Explained: What Is It, Best Practices & Checklist – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Antonia Din Managing user access is crucial for security and compliance with IT standards. However, lacking effective user access review knowledge leads...
Threat Actors Leverage TeamViewer in Ransomware Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Threat actors are leveraging TeamViewer to gain initial access to the endpoints of organizations and attempt to deploy encryptors based...
750 million Indian mobile subscribers’ data offered for sale on dark web – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini 750 million Indian mobile subscribers’ data offered for sale on dark web Data of 750 million Indian mobile subscribers was...
Juniper Networks released out-of-band updates to fix high-severity flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Juniper Networks released out-of-band updates to fix high-severity flaws Juniper Networks released out-of-band updates to fix high-severity flaws in SRX Series and...
Hundreds of network operators’ credentials found circulating in Dark Web – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Hundreds of network operators’ credentials found circulating in Dark Web Hundreds of compromised credentials of customers of RIPE, APNIC, AFRINIC,...
Cactus ransomware gang claims the Schneider Electric hack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cactus ransomware gang claims the Schneider Electric hack Energy management and industrial automation firm Schneider Electric suffered a data breach...
Mercedes-Benz accidentally exposed sensitive data, including source code – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Mercedes-Benz accidentally exposed sensitive data, including source code Researchers discovered that Mercedes-Benz accidentally left a private key online exposing internal...