βUNC5812: Unmasking the Russian Operation to Sabotage Ukraineβs Military Recruitment
https://securityonline.info/unc5812-unmasking-the-russian-operation-to-sabotage-ukraines-military-recruitment/
https://securityonline.info/unc5812-unmasking-the-russian-operation-to-sabotage-ukraines-military-recruitment/
Cybersecurity News
UNC5812: Unmasking the Russian Operation to Sabotage Ukraine's Military Recruitment
Uncover the UNC5812 Russian espionage campaign targeting Ukrainian military recruits. Learn how malware and strategic misinformation are used to undermine mobilization efforts.
β22,000 CyberPanel Servers Exposed: Zero-Click RCE Vulnerability Discovered, PoC Published
https://securityonline.info/22000-cyberpanel-servers-exposed-zero-click-rce-vulnerability-discovered-poc-published/
https://securityonline.info/22000-cyberpanel-servers-exposed-zero-click-rce-vulnerability-discovered-poc-published/
Daily CyberSecurity
22,000 CyberPanel Servers Exposed: Zero-Click RCE Vulnerability Discovered, PoC Published
Learn about the critical flaw in CyberPanel, exposing thousands of instances to a zero-click pre-authentication root RCE threat
βRussia-linked espionage group UNC5812 targets Ukraineβs military with malware
https://securityaffairs.com/170346/cyber-warfare-2/unc5812-targets-ukraines-military-malware.html
https://securityaffairs.com/170346/cyber-warfare-2/unc5812-targets-ukraines-military-malware.html
Security Affairs
Russia-linked espionage group UNC5812 targets Ukraineβs military with malware
Suspected Russia-linked espionage group UNC5812 targets Ukraine's military with Windows and Android malware via Telegram.
βNew ChatGPT-4o Jailbreak Technique Enabling to Write Exploit Codes
https://gbhackers.com/new-chatgpt-4o-jailbreak-technique/
https://gbhackers.com/new-chatgpt-4o-jailbreak-technique/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
New ChatGPT-4o Jailbreak Technique Enabling to Write Exploit Codes
Researcher Marco Figueroa has uncovered a method to bypass the built-in safeguards of ChatGPT-4o and similar AI models, enabling them to generate exploit code.
βClickFix Malware Infect Website Visitors Via Hacked WordPress Websites
https://gbhackers.com/clickfix-malware-hacked-wordpress/
https://gbhackers.com/clickfix-malware-hacked-wordpress/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
ClickFix Malware Infect Website Visitors via Hacked WordPress Websites
Researchers have identified a new variant of the ClickFix fake browser update malware distributed through malicious WordPress plugins, which
π2
βHardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk
https://gbhackers.com/hardcoded-creds-risk-android-ios-apps/
https://gbhackers.com/hardcoded-creds-risk-android-ios-apps/
βLatrodectus Employs New anti-Debugging And Sandbox Evasion Techniques
https://gbhackers.com/latrodectus-anti-debugging-sandbox-evasion/
https://gbhackers.com/latrodectus-anti-debugging-sandbox-evasion/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Latrodectus Employs New anti-Debugging And Sandbox Evasion Techniques
Latrodectus, a new malware loader, has been rapidly evolving since its discovery, potentially replacing IcedID, and includes a command
βSMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows
https://gbhackers.com/smb-auth-vulnerability-opa-windows/
https://gbhackers.com/smb-auth-vulnerability-opa-windows/
π₯3
βChinese Hackers Scanning Canadian IT Systems for Vulnerabilities
https://gbhackers.com/chinese-hackers-scanning-canadian-it-systems/
https://gbhackers.com/chinese-hackers-scanning-canadian-it-systems/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Chinese Hackers Scanning Canadian IT Systems for Vulnerabilities
The Canadian Centre for Cyber Security (Cyber Centre), has warned Canadian organizations about an ongoing cyber threat.
βRedLine and META Infostealers Infrastructure Seized by Authorities
https://gbhackers.com/redline-and-meta-infostealers-seized/
https://gbhackers.com/redline-and-meta-infostealers-seized/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
RedLine and META Infostealers infrastructure Seized by Authorities
An international coalition led by the U.S. Department of Justice has dismantled the infrastructure behind the notorious RedLine and META infostealers.
βFog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766
https://securityaffairs.com/170359/cyber-crime/fog-akira-ransomware-sonicwall-vpn-flaw.html
https://securityaffairs.com/170359/cyber-crime/fog-akira-ransomware-sonicwall-vpn-flaw.html
Security Affairs
Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766
Fog and Akira ransomware operators are exploiting SonicWall VPN flaw CVE-2024-40766 to breach enterprise networks.
βLumma/Amadey: fake CAPTCHAs want to know if youβre human
https://securelist.com/fake-captcha-delivers-lumma-amadey/114312/
https://securelist.com/fake-captcha-delivers-lumma-amadey/114312/
Securelist
Malicious CAPTCHA delivers Lumma and Amadey Trojans
Malicious CAPTCHA distributed through ad networks delivers the Amadey Trojan or the Lumma stealer, which pilfers data from browsers, password managers, and crypto wallets.
π2
βHackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks
https://gbhackers.com/fog-ransomware-sonicwall-vpn-attack/
https://gbhackers.com/fog-ransomware-sonicwall-vpn-attack/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks
Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in
π2
βNew Windows Downgrade Attack Let Hackers Downgrade Patched Systems To Exploits
https://gbhackers.com/windows-downgrade-attack/
https://gbhackers.com/windows-downgrade-attack/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
New Windows Downgrade Attack Let Hackers Downgrade Patched Systems To Exploits
The researcher discovered a vulnerability in the Windows Update process that allowed them to downgrade critical system components, including
βImproving Threat Detection with Preemptive Security Solutions
https://blog.morphisec.com/gartner-improving-threat-detection-with-preemptive-security-solutions
https://blog.morphisec.com/gartner-improving-threat-detection-with-preemptive-security-solutions
Morphisec
Improving Threat Detection with Preemptive Security Solutions
A proactive approach to cybersecurity is key to resiliency. Learn how preemptive security solutions can improve threat detection and defensive measures.
π₯2
βCyber insecurity now impacts the health and wellness of Americans. We need a clearer treatment plan.
https://cyberscoop.com/health-care-cybersecurity-mark-green-op-ed/
https://cyberscoop.com/health-care-cybersecurity-mark-green-op-ed/
CyberScoop
Cyber insecurity now impacts the health and wellness of Americans. We need a clearer treatment plan.
Rep. Mark Green, chair of the House Homeland Security Committee, argues for a multi-pronged approach to protect health care networks.
βRussian charged by U.S. for creating RedLine infostealer malware
https://www.bleepingcomputer.com/news/security/russian-charged-by-us-for-creating-redline-infostealer-malware/
https://www.bleepingcomputer.com/news/security/russian-charged-by-us-for-creating-redline-infostealer-malware/
BleepingComputer
Russian charged by U.S. for creating RedLine infostealer malware
The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and administrator of the RedLine malware operation, one of the most prolific infostealers over the past few years.
βRisk reduction redefined: How compromise assessment helps strengthen cyberdefenses
https://securelist.com/compromise-assessment-cases/114332/
https://securelist.com/compromise-assessment-cases/114332/
Securelist
Compromise assessment in cybersecurity: real-world cases
Kaspersky experts analyze cyberdefense weak points, including patch management, policy violations and MSSP issues, and real-world cases where compromise assessment helped detect and mitigate incidents.
βSenator urges Meta CEO to maintain election research partnerships
https://cyberscoop.com/meta-markey-election-integrity-partnerships-researchers/
https://cyberscoop.com/meta-markey-election-integrity-partnerships-researchers/
CyberScoop
Senator urges Meta CEO to maintain election research partnerships
Sen. Ed Markey is pressing Meta to partner with independent researchers to study the impact of their platforms on the 2024 elections.
βQNAP fixes NAS backup software zero-day exploited at Pwn2Own
https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/
https://www.bleepingcomputer.com/news/security/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own/
BleepingComputer
QNAP fixes NAS backup software zero-day exploited at Pwn2Own
QNAP has fixed a critical zero-day vulnerability exploited by security researchers on Thursday to hack a TS-464 NAS device during the Pwn2Own Ireland 2024 competition.