Source: www.bleepingcomputer.com – Author: Bill Toulas The BlackCat/ALPHV ransomware gang has added Seiko to its extortion site, claiming responsibility for a cyberattack disclosed by the Japanese...
Author:
Cuba ransomware uses Veeam exploit against critical U.S. organizations – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT...
Hackers use VPN provider’s code certificate to sign malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The China-aligned APT (advanced persistent threat) group known as ‘Bronze Starlight’ was seen targeting the Southeast Asian gambling industry with...
WinRAR flaw lets hackers run programs when you open RAR archives – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can...
Interpol arrests 14 suspected cybercriminals for stealing $40 million – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation...
Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular...
Phishing campaign steals accounts for Zimbra email servers worlwide – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas An ongoing phishing campaign has been underway since at least April 2023 that attempts to steal credentials for Zimbra Collaboration...
Thousands of Android APKs use compression trick to thwart analysis – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Threat actors increasingly distribute malicious Android APKs (packaged app installers) that resist decompilation using unsupported, unknown, or heavily tweaked compression...
Google released first quantum-resilient FIDO2 key implementation – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Google has announced the first open-source quantum resilient FIDO2 security key implementation, which uses a unique ECC/Dilithium hybrid signature schema...
Massive 400,000 proxy botnet built with stealthy malware infections – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Researchers have uncovered a massive campaign that delivered proxy server apps to at least 400,000 Windows systems. The devices act...
Major U.S. energy org targeted in QR code phishing attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious...
Ivanti Avalanche impacted by critical pre-auth stack buffer overflows – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Two stack-based buffer overflows collectively tracked as CVE-2023-32560 impact Ivanti Avalanche, an enterprise mobility management (EMM) solution designed to manage,...
LinkedIn accounts hacked in widespread hijacking campaign – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas LinkedIn is being targeted in a wave of account hacks resulting in many accounts being locked out for security reasons...
Raccoon Stealer malware returns with new stealthier version – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The developers of Raccoon Stealer information-stealing malware have ended their 6-month hiatus from hacker forums to promote a...
New CVE-2023-3519 scanner detects hacked Citrix ADC, Gateway devices – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Mandiant has released a scanner to check if a Citrix NetScaler Application Delivery Controller (ADC) or NetScaler Gateway Appliance was...
Threat actors use beta apps to bypass mobile app store security – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The FBI is warning of a new tactic used by cybercriminals where they promote malicious “beta” versions of cryptocurrency investment...
FBI warns of increasing cryptocurrency recovery scams – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The FBI is warning of an increase in scammers pretending to be recovery companies that can help victims of cryptocurrency...
Monti ransomware targets VMware ESXi servers with new Linux locker – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Monti ransomware gang has returned, after a two-month break from publishing victims on their data leak site, using a new...
Colorado warns 4 million of data stolen in IBM MOVEit breach – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The Colorado Department of Health Care Policy & Financing (HCPF) is alerting more than four million individuals of a...
MaginotDNS attacks exploit weak checks for DNS cache poisoning – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A team of researchers from UC Irvine and Tsinghua University has developed a new powerful cache poisoning attack named ‘MaginotDNS,’...
Ford says cars with WiFi vulnerability still safe to drive – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Ford is warning of a buffer overflow vulnerability in its SYNC3 infotainment system used in many Ford and Lincoln vehicles,...
US cyber safety board to analyze Microsoft Exchange hack of govt emails – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Department of Homeland Security’s Cyber Safety Review Board (CSRB) has announced plans to conduct an in-depth review of cloud...
Industrial PLCs worldwide impacted by CODESYS V3 RCE flaws – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Millions of PLC (programmable logic controllers) used in industrial environments worldwide are at risk to 15 vulnerabilities in the CODESYS...
Gafgyt malware exploits five-years-old flaw in EoL Zyxel router – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Fortinet has issued an alert warning that the Gafgyt botnet malware is actively trying to exploit a vulnerability in the...
MoustachedBouncer hackers use AiTM attacks to spy on diplomats – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney A cyberespionage group named ‘MoustachedBouncer’ has been observed using adversary-in-the-middle (AitM) attacks at ISPs to hack foreign embassies...
CISA: New Whirlpool backdoor used in Barracuda ESG hacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has discovered a new backdoor malware named ‘Whirlpool’ used in...
Dell Compellent hardcoded key exposes VMware vCenter admin creds – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas An unfixed hardcoded encryption key flaw in Dell’s Compellent Integration Tools for VMware (CITV) allows attackers to decrypt stored vCenter...
Hackers use open source Merlin post-exploitation toolkit in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Ukraine is warning of a wave of attacks targeting state organizations using ‘Merlin,’ an open-source post-exploitation and command and control...
New BitForge cryptocurrency wallet flaws lets hackers steal crypto – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney Multiple zero-day vulnerabilities named ‘BitForge’ in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell...
Rhysida ransomware behind recent attacks on healthcare – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Rhysida ransomware operation is making a name for itself after a wave of attacks on healthcare organizations has forced...