πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 What Is Cybersecurity Awareness Training? Why Your Business Needs it 🦿

Organizations of all sizes are being targeted by bad actors, which is why cybersecurity awareness training is more important than ever. Unfortunately, most organizations are not motivated to implement such training. A study by IBM found that barely half 51 of organizations that had already experienced a data breach in the past year planned to ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability πŸ–‹οΈ

Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, tracked as CVE20246633, carries a CVSS score of 9.8, and stems from the use of a static password to connect to a HSQL database. "The default credentials for the setup HSQL database HSQLDB for FileCatalyst Workflow are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT-C-60 Group Exploit WPS Office Flaw to Deploy SpyGlace Backdoor πŸ–‹οΈ

A South Koreaaligned cyber espionage has been linked to the zeroday exploitation of a nowpatched critical remote code execution flaw in Kingsoft WPS Office to deploy a bespoke backdoor dubbed SpyGlace. The activity has been attributed to a threat actor dubbed APTC60, according to cybersecurity firms ESET and DBAPPSecurity. The attacks have been found to infect Chinese and East Asian users.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave πŸ–‹οΈ

The threat actors behind the BlackByte ransomware group have been observed likely exploiting a recently patched security flaw impacting VMware ESXi hypervisors, while also leveraging various vulnerable drivers to disarm security protections. "The BlackByte ransomware group continues to leverage tactics, techniques, and procedures TTPs that have formed the foundation of its tradecraft since its.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a critical security flaw affecting the Apache OFBiz opensource enterprise resource planning ERP system to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability, known as CVE202438856, carries a CVSS score of 9.8, indicating critical severity.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials πŸ–‹οΈ

Cybersecurity researchers are calling attention to a new QR code phishing aka quishing campaign that leverages Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse of legitimate cloud offerings for malicious purposes. "By using legitimate cloud applications, attackers provide credibility to victims, helping them to trust the content it serves," Netskope Threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution πŸ–‹οΈ

A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute arbitrary code remotely under certain circumstances. The vulnerability, tracked as CVE20246386 CVSS score 9.9, impacts all versions of the plugin before 4.6.13, which was released on August 20, 2024. Arising due to missing input validation and sanitization,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Old devices, new dangers: The risks of unsupported IoT tech πŸš€

In the digital graveyard, a new threat stirs Outofsupport devices becoming thralls of malicious actors.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” LummaC2 Infostealer Resurfaces With Obfuscated PowerShell Tactics πŸ“”

LummaC2, a Cbased MaaS tool first identified in 2022, has resurfaced to exfiltrate credentials and personal data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iran-Backed Peach Sandstorm Hackers Deploy New Tickler Backdoor πŸ“”

The hacking subsidiary of the Iranian Islamic Revolutionary Guard Corps RGC has targeted satellite, communications, oil and gas and government sectors in the US and UAE.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Money Laundering Dominates UK Fraud Cases πŸ“”

KPMG research finds money laundering accounted for the majority of fraud cases heard in the first half of 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” South Korean Spies Exploit WPS Office Zero-Day πŸ“”

ESET uncovers a South Korean cyberespionage campaign featuring a zeroday exploit for WPS Office.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 How to Prevent Account Takeover: Real-life Scenarios and Mitigation Steps 🌊

Ignoring security in the name of progress is a risky gamble. Even tiny oversight, like failing to verify passwords during email changes can result in an account takeover. You read that right this seemingly minor issue can be a major troublemaker. In this article, our expert security team will discuss simple yet effective steps to The post How to Prevent Account Takeover Reallife Scenarios and Mitigation Steps appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CVE-2024-39717 Exposes Critical Vulnerability in Versa Director πŸ¦…

Key Takeaways This CVE202439717 vulnerability impacts Versa Director, a key platform for managing Versa SDWAN solutions used by ISPs and MSPs. CVE202439717 involves an unrestricted file upload flaw that allows authenticated users to upload malicious files disguised as .png images. Exploitation of this flaw can lead to unauthorized access and potential system compromise, posing a serious risk to affected organizations. Cybles scan reveals 31 internetexposed instances of Versa Director, with 16 in the U.S., indicating significant potential for exploitation. An APT actor has exploited the vulnerability due to a failure to implement recommended firewall and hardening measures. Users are advised to upgrade to Versa Director version 22.1.4 or later and follow additional sec...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Scammers Use ScreenConnect to Defraud SSA Beneficiaries πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL has uncovered a phishing site designed to mimic Zoom, which facilitates the download of ScreenConnect software. Scammers are leveraging Zoom's trusted reputation to trick victims into downloading ScreenConnect. By impersonating a widely recognized platform, the phishing site increases the likelihood that victims will believe the download is legitimate, lowering their guard. This ScreenConnect software allows attackers to establish a remote connection to the victims computer, giving them full access to the system. The IP address associated with the ScreenConnect software is also linked to other malicious activities. Notably, it hosts a domain involved in scamming Social Security Administration SSA account holders, indicat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking πŸ•΅οΈβ€β™‚οΈ

Novel attack vectors leverage the CVE202322527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets πŸ•΅οΈβ€β™‚οΈ

The pivot is one of several changes the groups using the malware have used in recent attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CCTV Zero-Day Exposes Critical Infrastructure to Mirai Botnet πŸ•΅οΈβ€β™‚οΈ

CISA warned about the RCE zeroday vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Attacks Exposed 6.7 Million Records in US Schools πŸ“”

Ransomware attacks on US schools and colleges have surged, with 491 incidents since 2018, affecting over 8000 institutions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Kursk Offensive Unveiled: Ukraine’s Strategic Planning and Cyber-Kinetic Convergence πŸ¦…

Executive Summary The geopolitical situation surrounding Ukraine in 2024 showcases a complicated interaction of changing international alliances and the difficulties the Ukrainian government faces in sustaining this support as global priorities shift. While Ukraine continues to receive significant international support, the landscape in 2024 indicates a potential decline in the international community's patience and commitment. The combination of reduced U.S. aid, significant gaps in European allocations, and the distraction of global conflicts poses serious challenges for Ukraine. However, on August 6, 2024, after its longtime defensive posture since the beginning of the conflict in February 2022, Ukraine threw caution to the wind by launching a significant mechanized leanon, s...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft issues warning over potent malware strain developed by Iranian threat actor πŸ“’

The Iranian statebacked hacking group has continued its usual password spraying and social engineering techniques to gain a foothold in target environments.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity