Explore Cybersecurity News
FYI: Past 7 days displayed by default. Interested in something specific? Search using prompts (Example: What should I know as a SOC analyst? ) --OR-- select an article tag for similar results
Search Results:
Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign
The article warns of a new spear-phishing campaign by Russian Star Blizzard targeting WhatsApp accounts with a focus on customer acquisition for their business offering. The highlights the new tactics and social engineering methods used for this campaign.
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
The European privacy group has sued TikTok and AliExpress, alleging that they have been transferring people's personal data to China in violation of EU privacy laws. The data privacy concerns and data protection issues are raised by this lawsuit.
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
The article discusses US sanctions on North Korea's worker export programs. It highlights details the particular US response to North Korea's human rights violations, and worker exploitation issues.
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
The article warns of a new phishing kit that bypasses Microsoft 365 account's two-factor authentication system. It details a new method to target and compromise Microsoft accounts by using social engineering techniques. The kit is designed to create convincing phishing content and lure users into providing their login credentials, potentially leading to account takeovers.
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
The article offers insights into implementing Zero Trust security model with a cloud-based captive portal to enhance Wi-Fi security. The key facts are: adopt a secure portal, validate users, enforce policies, provide granular controls, leverage certificates, and automate access management. The recommended steps to create a secure access and improve overall Wi-Fi security.
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
The article discusses how Python-based bots are exploiting PHP platforms to fuel the proliferation of gambling platforms. The article is focused on the rise of automated betting and potential impacts on gaming and website security.
The FBI forced China-backed malware infecting US computers to self-destruct
The FBI forced a piece of malware designed by China to self-destruct on US computers, potentially disrupting key networks and critical infrastructure. actionable fact is to understand the potential impact on national security and critical systems.
FTC Orders GoDaddy to Fix Inadequate Security Practices
The article discusses the need to address inadequate security practices and the implementation of further orders from various financial institutions. It highlights the important steps to improve security measures, such as enhanced customer verification processes and proactive monitoring of suspicious activities.
Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense
The article provides a quick summary of the Biden administration's cybersecurity executive order, which builds upon and continues the previous Trump administration's foundation for cybersecurity defense. It emphasizes key actions and goals related to improving national cybersecurity defenses, including enhancing public and private sector protections, sharing best practices, and addressing critical vulnerabilities.
Russian APT Phishes Kazakh Gov't for Strategic Intel
The article reveals that Russia is suspected of gathering intelligence data on Kazakhstan's government via hacking their emails and other digital communications. The also may be used to create political instability in Kazakhstan.
FTC orders GoDaddy to fix poor web hosting security practices
The article is about the Federal Trade Commission ordering GoDaddy to improve poor web hosting security practices. The FTC took action against companies that failed to take adequate measures to protect against cyber attacks.
Wolf Haldenstein law firm says 3.5 million impacted by data breach
The article states that the Wolf Haldenstein law firm confirms that its database containing sensitive information for 3.5 million clients was hacked. The breach involved personal information, including names, addresses, and medical records. The article also covers the firm response and the need for increased cybersecurity measures.
Biden signs executive order to bolster national cybersecurity
President Biden just signed an executive order to strengthen national cybersecurity measures and respond to growing cyber threats. The order addresses critical infrastructure, enhances cybersecurity capabilities of federal agencies and establishes collaboration for improved cyber defense across critical networks.
US cracks down on North Korean IT worker army with more sanctions
The US has further tightened sanctions on North Korean workers and their families, targeting an army of IT workers. The US is cracking down on the North Korean workforces, accused of cyber attacks and hacking activities.
Microsoft expands testing of Windows 11 admin protection feature
Microsoft is expanding testing of a new admin protection feature for Windows 11 that prevents unauthorized changes to the OS configuration. The feature is now in advanced testing and aims to provide additional security protection for important enterprise environments.
W3 Total Cache plugin flaw exposes 1 million WordPress sites to attacks
The W3 Total Cache plugin has a flaw that impacts roughly 1 million WordPress sites. Attackers can exploit the Bahamian vulnerable sites by sending malicious requests, which could lead to performance issues or complete takeover of the site.
GDPR complaints filed against TikTok, Temu for sending user data to China
The article is about GDPR complaints filed against companies that sent user data to China, including video app TikTok and Temu. The reasons for the data sharing are to offer better services or to provide access to certain content.
FCC orders telecoms to secure their networks after Salt Tyhpoon hacks
The Federal Communications Commission (FCC) has ordered telecom companies to bolster their networks against attacks following the devastating hacks during the recent Hurricane Sandy. The order ensures the critical infrastructure is secure for consumers.
Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover
The article discusses how the new Biden administration is tightening software security requirements to prevent future supply chain bottlenecks. It also covers the particular focus on security protocols, federal funding, and the potential for further action.
Trump’s Truth Social Users Targeted by Rampant Scams Online
The article warns of a new surge in social media scams targeting Trump supporters. It describes how accounts impersonating US politicians, including the President, began liking and sharing messages related to conspiracy theories, false news, and attacks. particular a way of harassment and intimidation.
Middle Eastern Real Estate Fraud Grows with Online Listings
The article warns of the increasing fraud in the Middle Eastern real estate market due to online listings. It details how the particular are using fake listings, price manipulation, and other deceptive tactics. The article also emphasizes the fraud is causing financial losses and trust issues for property seekers and legitimate brokers.
DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
The article discusses the ongoing challenges and pressures facing financial firms in staying compliant with various regulations. It highlights facts and insights into the ongoing regulatory environment financial institutions are navigating.
Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants
The article discusses how TikTok and five Chinese tech companies have been hit with GDPR complaints over data protection issues. The article also mentions the important details such privacy and data protection concerns, as well as the number of complaints filed.
Star Blizzard Targets WhatsApp in New Campaign
Star Blizzard is launching a new campaign targeting WhatsApp, with the goal of creating more mobile games. The campaign aims to leverage the popularity of WhatsApp and deliver engaging mobile content to users.
Lazarus Group Targets Developers in New Data Theft Campaign
The article discusses how the Lazarus Group, a cybercriminal group, has been targeting developers to steal data and launch attacks. The group is known for its sophisticated social engineering and use of multiple attack vectors, and has recently focused on stealing cryptocurrency and data.
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
The article discusses critical flaws found in certain switches that can lead to remote code execution and network exploitation. The flaws can potentially allow unauthorized access to sensitive systems. The critical details include the vulnerabilities, affected switch models, and recommended mitigation measures.
PowerSchool breach worse than thought, company says "all" student and teacher data accessed
The article reveals that the PowerSchool data breach was far more extensive than initially reported. The breach involved unauthorized access to all student and teacher data including personal information. The company is now confirming that the impact was far worse than initially thought.
Google Search ads are being hacked to steal account info
The article warns that Google search ads are being hacked to steal personal account information. It suggests that hackers are using malicious ads to gather and steal login credentials and other private data. The also mentions that this issue poses serious risks for account security and privacy, and could lead to significant financial losses.
Popular online bill paying site leaks data of thousands of users
A popular online bill paying service has suffered a data leak, potentially exposing sensitive information about thousands of users. The leak involved financial data, account numbers, and personal details. The incident raises serious concerns about data privacy and security.
Many firms see cyberattacks as their top business concern this year
The article reports that many companies are concerned about cyberattacks as their top business worry this year. It goes on to explore the risks and impacts of successful cyberattacks against critical operations and productivity.
Dangerous Microsoft Outlook flaw could let hackers send out malware via email
The article warns about a critical Microsoft Outlook flaw that could potentially allow hackers to send malware via email. The flaw is related to a lack of proper handling of certain email attachments, which could be abused for malicious purposes. The recommended solution is to update your Outlook to address this issue.
Major new online tunneling vulnerability could put millions of devices at risk
Summary: A major new vulnerability in online tunneling could potentially put millions of devices at risk. The vulnerability could allow attackers to exploit critical flaws in networking protocols, enabling them to intercept and manipulate data transmission. Potential consequences are severe, including man-in-the-middle attacks, data breaches, and unauthorized access. The vulnerability impacts devices with VPN and tunneling capabilities, and is recommended to update software and use reputable security measures promptly.
One of the largest data leaks ever sees info on 1.5 billion people leaked online
The article discusses the largest data leak ever, where personal information on nearly everyone on earth was leaked. The leak involved details like phone numbers, addresses, and other things. The leak is a massive security concern and raises questions about the protection of private data.
Russian criminal gang Star Blizzard found hitting WhatsApp accounts
The article reveals that a Russian criminal group called Star Blizzard was found hitting WhatsApp accounts, stealing login credentials and potentially extorting money from victims. The group's focus on social engineering and technical hacking methods. The also may be a threat to international security and privacy concerns.
Biden orders review, new rules governing US national cybersecurity
President Biden issues new rules and review for US national cybersecurity, including measures to improve supply chain protection and critical infrastructure. The establishment of standards for secure network architectures.
Over a million WordPress sites exposed to attack from W3 Total Cache plugin flaw
The article warns that over a million WordPress sites have been vulnerable to a potential attack due to a flaw in the W3 Total Cache plugin. The vulnerability potentially allows an attacker to exploit sites with cached content, leading to potential data theft and other security issues.
Chinese Innovations Spawn Wave of Toll Phishing Via SMS
The article warns of a new trend in China where innovative services are creating a wave of toll-style phishing attacks via SMS. It poses concerns over users' particular mobile services and apps are enabling the mass creation of such attacks.
Over 660,000 Rsync servers exposed to code execution attacks
The article warns about a critical security issue involving 660,000 Rsync servers globally. It describes how attackers managed to execute arbitrary code on these servers, potentially allowing unauthorized access, data theft, or even complete control over the server.
Hackers use Google Search ads to steal Google Ads accounts
The article warns about hackers using Google Ads search ads to gain access to people's Google Ads accounts, potentially for malicious purposes. The article suggests ways to protect accounts from such.
Label giant Avery says website hacked to steal credit cards
The article warns of a hacked website of Label Giant Avery, where credit card information was stolen. The article suggests measures to address the issue, such as improved security measures and potential legal actions.
MikroTik botnet uses misconfigured SPF DNS records to spread malware
The article discusses how MikroTik botnets spread malware by using misconfigured Security Protection System (SPF) DNS records. The botnets use these compromised DNS records to make the malware look legitimate and trick potential victims into connecting to malicious servers.
CISA shares guidance for Microsoft expanded logging capabilities
Here's a brief summary: "CISA shares guidance for Microsoft's expanded logging capabilities to help organizations detect, investigate, and respond to security threats faster." The key points are about Microsoft improving logging and monitoring capabilities to enhance threat intelligence and incident response, which is useful guidance for organizations.
SAP fixes critical vulnerabilities in NetWeaver application servers
SAP has addressed a number of critical vulnerabilities in its NetWeaver application servers, potentially enabling attacks on custom applications. The flaws affected components that handle HTTP requests and responses, and could be exploited for remote code execution attacks. The company advises customers to upgrade to fixed versions.
Hackers leak configs and VPN credentials for 15,000 FortiGate devices
The article discusses a data breach where hackers gained access to VPN and configuration data of 15,000 Fortigate devices. The breach potentially impacts security and operations of many organizations that use these devices. The also poses risks of unauthorized access and potential cyberattacks.
MFA Failures - The Worst is Yet to Come
The article warns of potential MFA failures and the risks involved. It emphasizes the critical details of the potential impacts on security, privacy, and access issues.
New UEFI Secure Boot flaw exposes systems to bootkits, patch now
The article warns about a critical security flaw in UEFI Secure Boot that could allow an attacker to plant malicious code into a system's boot process during bootkits. The flaw could allow the critical system updates to be tampered with and untrusted code execution.
FTC sues GoDaddy for years of poor hosting security practices
The article is about a lawsuit against GoDaddy by FTC for years of inadequate security practices. The lawsuit is over the practices of hosting that did not protect consumers' data privacy and were in violation of existing laws.
Thousands of WordPress websites hit in new malware attack, here's what we know
The article warns of a new malware attack impacting the thousands of WordPress websites. It could lead to unauthorized access, data breaches and potential customer data loss. The recommends immediate security measures and regular audits for better protection.
Everything you need to know about phishing
Phishing attacks are sophisticated and dangerous. The article covers the important facts and tips to protect yourself and your organization. It highlights the essential information about what phishing attacks look like, the tools attackers use, signs of a potential attack, prevention strategies, and the significant damage these attacks can cause.
AI deepfakes estimated to cause $40 billion in losses by 2027
The article warns that AI deepfakes will cause a staggering $40 billion in losses by 2027. It also suggests strategies and technologies to mitigate the risks associated with this growing problem.
Top file synchronization tool Rsync security flaws mean up to 660,000 servers possibly affected
The article warns of critical security flaws in the Rsync tool that could potentially affect up to 660,000 servers. It describes remote code access vulnerabilities that could allow unauthorized access, data breaches and potential exploitation.
GoDaddy told to up security practices by FTC
The article advises online platforms and service providers to enhance security measures and compliance with laws and regulations by paying attention to user data protection, implementing robust authentication protocols, and adhering to industry best practices.
Avery label maker confirms attack on its site, customer credit card info stolen
The article reports that Avery label maker confirms that its website was attacked, and customer credit card information was stolen. The article suggests that the provides no further details about the attack or any potential consequences.
Millions of hotel users see personal info checked out in huge data leak
The article warns of a massive data leak affecting millions of hotel users. It exposed personal information being accessed and sold without proper consent. The leak is concerning the data breach raises serious concerns regarding data privacy and security.
Governments call for spyware regulations in UN Security Council meeting
Governments are pushing for stricter regulations on spyware in a meeting of the UN Security Council. The call aims to balance between protecting citizens from digital surveillance and addressing the growing threats posed by malicious software.
Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute breaches
The article shares the names of several companies that were allegedly hit by the Clop ransomware gang, which is known for its mass-hack attack using the Cleo virus. The article also briefly mentions that some of these companies are denying the claims of the ransomware group, raising questions about the actual number of victims and the extent of the attacks.
CISA Launches Playbook to Boost AI Cybersecurity Collaboration
The article discusses how CISA (Cybersecurity Infrastructure and Security Agency) has launched a Playbook to foster AI cybersecurity collaboration. The Playbook is designed to help organizations address critical challenges in AI by providing guidance and best practices for secure development, model deployment, and human element integration.
EU To Launch New Support Centre by 2026 to Boost Healthcare Cybersecurity
The article discusses the EU's plan to launch a new support centre by 2026 to enhance and strengthen cybersecurity across the healthcare sector. The centre will provide specialized services and guidance to protect medical institutions and patient data against cyberattacks and vulnerabilities.
Hackers Use Image-Based Malware and GenAI to Evade Email Security
The article discusses how hackers are using advanced AI and image-based malware to trick email security systems. It poses examples of how these malicious images can bypass standard email security tests. The also highlights the critical details: 1. Advanced AI-generated images. 2. Unauthorized content 3 particular particular hackers' use AI-generated content to create deceptive messages. 3. Unauthorized images with malicious code.
GoDaddy Accused of Serious Security Failings by FTC
The article warns of serious security failures at the Federal Trade Commission (FTC), including inadequate security practices, data breaches, and failure to protect consumers from fraud and predatory business practices. The highlights the critical details of the situation, which puts consumers privacy and security at risk and may result in further consequences.
New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls
The article reveals a new hacking group that broke into 15,000 Fortinet firewalls. The group is responsible for large-scale breaches and the ability to pivot to other attack frameworks quickly.
DORA Compliance Costs Soar Past €1m for Many UK and EU Businesses
The article discusses the rising costs of UK and EU businesses to comply with new EU data rules, which have now surpassed €1m. The article also highlights the important facts to consider for businesses, including the impact of non-compliance and the need to invest in relevant systems and processes.
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog
The article warns of a new vulnerability in BeyondTrust, which was already a known issue. The article also mentions that this vulnerability poses a potential threat to organizations using the affected products.
Attackers Hijack Google Advertiser Accounts to Spread Malware
The article warns of a serious case of advertisers' accounts being hacked by attackers, who use the access to spread malware and launch malicious campaigns. The article suggests practical steps such important to address and mitigate these types of attacks.
Trusted Apps Sneak a Bug Into the UEFI Boot Process
Summary: A critical bug has been found in trusted apps that are authorized to run in the UEFI (Unified Extensible Firmware) boot process on certain devices. This bug allows these apps to make unauthorized changes or access, potentially compromising system security and data. The vulnerability is serious and can lead to unauthorized control, data breaches, or even device malfunction.
Startup necromancy: Dead Google Apps domains can be compromised by new owners
The article warns about the dangers of newly acquired dead Google Apps domains. It suggests that these can be compromised by new owners who may misuse the private data of former users.
Microsoft patches Windows to eliminate Secure Boot bypass threat
Microsoft has addressed a security vulnerability in Windows that allows for the bypass of Secure Boot. The patch prevents unauthorized OS loading, protecting against malware attacks that attempt to compromise boot processes.
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
The article reveals critical security flaws in several versions of Ivanti Endpoint Manager, a widely used IT management software. These flaws provide opportunities for malicious attacks, data breaches, and operational vulnerabilities. The researcher emphasizes the critical security risks and potential impacts, and suggests timely patches and additional security measures.
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
The article discusses Python-based malware that powers ransomware, taking advantage of network flaws to compromise systems. It poses potential security implications and challenges to detect and prevent similar attacks.
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
The article discusses how hackers use image files to hide malware, such as VIP Keylogger and 0bj3ctivity stealer, which record keyboard inputs and capture sensitive information. The also reveals how hackers use file-based malware and malicious code libraries to create and distribute these threats. The also talks about anti-malware solutions and new methods for detection and prevention of these sophisticated attacks. This
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Researchers have discovered an exploit that bypasses active directory restrictions, allowing an attacker to compromise Windows systems that rely on NTLMv1 authentication. The vulnerability could provide an entry point for attackers, highlighting the importance of addressing future security updates.
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
The article discusses a potential security flaw in UEFI Secure Boot that could allow attackers to load malicious bootkits, potentially enabling them to take control of a device during bootup. The critical details are the potential impact on device security and the need for researchers and users to take immediate action to address this issue.
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
The article discusses the $10 cyber threat that will likely dominate and cause the biggest breaches in 2024. It covers various threats like, including ETERNAL ROWS, SQL injection, and command injection. The article suggests focusing on these areas to strengthen defenses against potential breaches.
Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
The article talks about simplifying trust management with a focus on joining the upcoming free webinar on DigiCert ONE in Action. It covers topics like how businesses can benefit from streamlined processes, increased efficiency, and cost savings with trust management solutions. The highlights the important facts are the benefits of improved security, faster implementation, and simplified processes for trust management, along with the offer of a free webinar to explore those ideas.
iPhone USB-C is hackable, but users don't need to worry yet
The article warns about the hackability of iPhone charging via USB-C. It suggests that malicious USB devices can provide dangerous code to iPhones, but users are not at risk yet due to current limitations and protections.
UK could ban ransomware payments by the public sector and critical infrastructure companies
The article suggests the UK could ban or severely restrict payments to ransomware attackers, targeting public sector and critical infrastructure companies. It's a aim to mitigate future attacks and encourage victims to report such incidents. The aim is to create a balanced approach between rewarding victims and preventing future harm.
Fortinet Warns of New Zero-Day Used in Attacks on Firewalls with Exposed Interfaces
The article warns of a potential new zero-day vulnerability affecting web application firewalls with exposed interfaces. It could potentially allow an attacker to gain unauthorized access. The article suggests precautions and best practices to mitigate this potential threat.
UnitedHealth hid its Change Healthcare data breach notice for months
The article reveals that UnitedHealth, one of the largest healthcare providers in the US, hid the notification of a significant data breach involving their subsidiary Change Healthcare for months. The breach is said to have resulted from unauthorized access to employee information including names, dates of birth, and health insurance details. The also provided a information on the number affected and the types of data compromised.
PowerSchool data breach victims say hackers stole ‘all’ historical student and teacher data
The article talks about a recent data breach at PowerSchool where hackers allegedly stole all historical data of students and teachers including personal information. The article is short and to the point, stating the severity of the breach, and the potential risks involved.
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
The article warns of critical flaws in simple help systems that allow attackers to compromise systems, gain privileges, and exploit remote code execution. The summary is that these issues pose serious risks of file theft, privilege escalation, and remote code execution attacks.
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
Microsoft just released a new security update, addressing 3 previously unknown and actively exploited zero-day flaws. The update patches critical vulnerabilities that could have been exploited to gain unauthorized access.
Product Walkthrough: How Reco Discovers Shadow AI in SaaS
The article discusses how Reco discovers and leverages Shadow AI techniques to improve SaaS product performance, focusing on critical facts like: using AI-powered insights, reducing customer churn, and driving revenue growth through innovative approaches. The actionable insights include leveraging AI-powered recommendations, personalizing interactions, and automating low-touch tasks to enhance the overall user experience. The overall summary captures the main points of the article.
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
The FBI has successfully removed PlugX malware from 4,250 hacked computers, which is a large-scale operation that took multiple months to complete. The malware had been infecting computers for a long time, causing significant damage. The fact of the malicious software and potential harm, this is a positive development.
The High-Stakes Disconnect For ICS/OT Security
The article discusses the urgent need for improved Industrial Control Systems (ICS) and Operational Technology (OT) security measures. It emphasizes the critical vulnerabilities and potential impacts on critical infrastructure, urging accelerated efforts to address and mitigate these risks.
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
Google Cloud researchers found vulnerabilities in Rsync file synchronization tool that could have allowed unauthorized access, data leaks, or even server crashes. The article shares insights into the security flaws and potential impacts.
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
The article reveals that North Korean IT workers were involved in a massive crowdfunding scam linked to fake domains. The article also discusses the fraud and IP theft.
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
The article warns of a new hacking group targeting Web3 developers with fake LinkedIn profiles, creating social engineering attacks. The group is believed to be behind a series of blockchain project hacks using this tactic. The also appears to be using malware to trick developers into downloading a malicious version of the Metamask browser extension. The also appears to be using a fake community on Discord, and to impersonate well-known developers. This
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
The article warns of a recent Google Ads malvertising scam that abused user credentials and 2FA codes. It suggests that the critical details of this type of attack involve targeting users with specific credentials to gain trust and access.
FBI forces Chinese malware to delete itself from thousands of US computers
The article talks about how the FBI forced Chinese malware to self-delete from thousands of US computers. It is a way to prevent attacks and protect national security.
Fortinet warns a critical vulnerability in its systems could let attackers breach company networks
Fortinet alerts about critical vulnerability in its systems that could lead attackers to breach company networks. The vulnerability is related to a potential attack surface and provides recommendations for mitigation.
Microsoft patches three worrying security flaws in its latest critical update, so update now
Microsoft has addressed three critical security issues by releasing a new update. It patches three serious vulnerabilities that could have given an attacker an undue advantage. It's recommended to update immediately to mitigate any potential risks.
A major FBI operation has deleted Chinese malware from thousands of US computers
The article talks about how the FBI has taken action against Chinese malware, successfully removing it from thousands of US computers. The article is short and does not mention any further details about the operation.
A flaw in Google OAuth system is exposing millions of users via abandoned accounts
The article warns about a critical flaw in Google's OAuth system. It exposes millions of users due to abandoned accounts that are accessible, potentially exposing personal data. The issue is that Google wasn't properly deleting old sessions after logout, leaving these accounts vulnerable. The solution is to now ensure proper session deletion. This critical data security concern.
Microsoft Patches Eight Zero-Days to Start the Year
Microsoft has released updates addressing 8 zero-days vulnerabilities, including critical remote code execution flaws. These patches aim to fix critical issues and provide protection against potential future attacks.
Secureworks Exposes North Korean Links to Fraudulent Crowdfunding
North Korea's links to fraudulent crowdfunding activities have been exposed by cybersecurity firm Secureworks. The company uncovered the particular connections and revealed that the fraud may have been facilitated by North Korean cybercriminals.
Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls
The article confirms that Fortinet discovered a critical zero-day vulnerability in firewalls. It allows remote attackers to potentially take control of the firewall and access to the network. The article provides details on the nature of the vulnerability, what it means for security, and what protective measures are available.
Illicit Crypto-Inflows Set to Top $51bn in a Year
The article reveals that illegal crypto asset flows have surpassed $51 billion in the past year, a trend that reflects the increasing role of crypto in money laundering activities. The also notes the critical details: the fast-rising amount of crypto-linked crime and the need for proper regulation to prevent future harm.
Chinese PlugX Malware Deleted in Global Law Enforcement Operation
The article is about how law enforcement has taken down the Chinese PlugX malware, which was a threat to many organizations. It is a removal of this malware that impacted many businesses and individuals, and the success of global law enforcement in combating cybercrime.
Multi-Cloud Adoption Surges Amid Rising Security Concerns
The article discusses how organizations are adopting multiple cloud services to improve operations and performance, and address rising security concerns. The piece also highlights the important details such: cloud security, hybrid cloud adoption, and the need for enhanced security infrastructure.
Microsoft Rings in 2025 With Record Security Update
Microsoft has announced a record-breaking security update for 2025, focusing on protecting customers from emerging threats. The update aims to provide comprehensive protection against cyberattacks, with an emphasis on modern concepts and unique capabilities.
As Tensions Mount With China, Taiwan Sees Surge in Cyberattacks
The article warns of a surge in cyberattacks against Taiwan, along with China's role in them. It suggests the critical that Taiwan strengthen its cybersecurity defense and improve communication with private industry sectors.
North Korea's Lazarus APT Evolves Developer-Recruitment Attacks
North Korea's cybercriminal group Lazarus APT has been using social engineering and malware attacks to target developers, creating a new strategy for hire recruitment.
FBI deletes Chinese PlugX malware from thousands of US computers
The article talks about how the FBI has removed Chinese PlugX malware from thousands of computers in the US. It is a removal of malicious software and provides protection to these computers.
Microsoft: Happy 2025. Here’s 161 Security Updates
Microsoft is making a big push towards security updates and new features with the aim of making things "Happy" by 2025. The focus is on creating a positive user experience with enhanced security tools across multiple platforms.
Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware
The article warns of Russian-linked hackers targeting Kazakhstan with espionage campaign using HATVEME malware. The piece focuses on the details of the attack, the use of malware, and potential consequences.
Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions
The illicit Hydra market has been surpassed, according to The Hacker News, with the "HuiOne Telegram Market" now taking the title of the world's largest illegal darknet marketplace for crypto transactions. The largest platform for crypto-related crimes.
Secure Your Azure: Proactive Tips for Cloud Protection
The article offers a cheat sheet for securing Azure cloud services, highlighting proactive measures such as using encryption, implementing identity, monitoring, offloading sensitive data, and more. The article advises following strategies: keep sensitive data in transit and at rest encrypted, enforce strong authentication and validate identities, implement visibility and monitoring of resources and activities, enable intelligent threat protection and respond quickly to attacks.
4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
The article emphasizes the importance of addressing SaaS security. It lists 4 key reasons: 1. Focuses on the growing attack surface due to SaaS products, services, and APIs. 2. Requires protection against vulnerabilities, misconfigurations, and limited visibility 3. Requires protection against business-critical data in SaaS applications 4. Requires proactive identification and mitigation of threats.
Russia Carves Out Commercial Surveillance Success Globally
Russia's commercial surveillance technology has been successfully implemented globally, providing robust solutions for businesses and governments to combat threats and maintain security. The article highlights the critical details such focusing on the development and implementation of cutting-edge surveillance technologies, like facial recognition and behavioral analysis, to identify and prevent crime, terrorism, and other threats.
Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic
The article warns of a new strategy among hackers to create fake online job interviews to lure in and gather information from potential targets. The tactic adds another layer of sophistication to social engineering and psychological manipulation tactics used against individuals in the industry.
Threat Actors Exploit a Critical Ivanti RCE Bug, Again
The article warns of critical vulnerabilities in Ivanti's products, which could allow remote code execution. It describes how threat actors are exploiting these flaws to deliver malware and potentially disrupt core business operations.
Telefonica Breach Exposes Jira Tickets, Customer Data
The article reveals a data breach from Telefonica, exposing customer information and potential Jira tickets details. The breach is associated with unauthorized access and potential consequences for customers' privacy and security.
Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results
The article warns of hackers hiding malware in YouTube comments and Google search results. It suggests the critical information about how hackers are using comments and search as a new attack vector, putting up legitimate-looking content that actually carries malware.
Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw
The article warns of a critical vulnerability in Aviatrix, which could allow remote code execution. It describes how attackers exploited this flaw to take control of the target system.
Microsoft Cracks Down on Malicious Copilot AI Use
Microsoft has taken measures to restrict the use of malicious AI chatbot Copilot, which provided inaccurate responses and generated significant security risks. The update limits the particular use of the ChatGPT for academic and non-commercial research purposes, and users must comply with content restrictions and adhere to responsible usage principles.
Zero-Day Security Bug Likely Fueling Fortinet Firewall Attacks
The article discusses the urgent threat posed by a critical zero-day security bug in Fortinet firewalls. It allows remote attackers to exploit vulnerabilities and potentially take control of targeted networks. The bug is associated with severe risks, and urgent patches are recommended.
FBI Wraps Up Eradication Effort of Chinese 'PlugX' Malware
The article talks about how the FBI successfully concluded its long-term effort to eradicate the Chinese malware called PlugX. It was a malware that was used to attack and create severe damage to its victims.
Apple Bug Allows Root Protections Bypass Without Physical Access
Summary: Apple users are at risk of unauthorized access due to a bug that bypasses root protections without physical access. This creates vulnerabilities that can be exploited, potentially allowing unauthorized data access and system compromise.
US government charges operators of crypto mixing service used by North Korea and ransomware gangs
The US government has charged crypto mixer operators who provided services to North Korea and ransomware gangs. The charges are part of an ongoing effort to curb money laundering and illicit activities involving cryptocurrency.
Meet the Chinese ‘Typhoon’ hackers preparing for war
The article discusses how Chinese hackers are creating powerful tools to face the new "typhoon" of cyber attacks, focusing on the fast development of offensive capabilities, including large-scale data breaches, advanced hacking tools, and next-generation encryption techniques.
Microsoft accuses group of developing tool to abuse its AI service in new lawsuit
Microsoft has filed a lawsuit against a group accused of creating a tool that allegedly abuses its AI services, violating its policies and terms of use. The lawsuit is about a platform designed to create and sell AI services, and the complaint is based on violations of Microsoft's policies.
UK domain giant Nominet confirms cybersecurity incident linked to Ivanti VPN hacks
Nominet, the UK's largest domain name provider, has confirmed a cybersecurity incident that is linked to recent Ivanti VPN hacks. The company is investigating the critical vulnerabilities in its systems that were abused during the attack, and has advised customers to implement additional security protections.
A breach of Gravy Analytics’ huge trove of location data threatens the privacy of millions
The article warns of a data breach that threatens the privacy of millions, and the potential for malicious use of a huge trove of location data belonging to Gravy Analytics. The potential risks of this misuse of this data is highlighted, along with the possible consequences for individuals whose privacy has been compromised.
How Barcelona became an unlikely hub for spyware startups
Barcelona has become an unlikely center for spyware startups, harnessing its allure for creativity and attracting developers despite governmental scrutiny. The region's growing ecosystem of surveillance software companies, with focus on financial gain and addressing security concerns.
UK plans to ban public sector organizations from paying ransomware hackers
The article discusses the UK government's plan to ban public sector organizations from directly paying ransomware rewards to hackers, instead encouraging insurance coverage and cyber alerts. The also focus on the need for better cybersecurity strategies and policies to tackle ransomware threats.
North Korea stole over $659M in crypto heists during 2024, deployed fake job seekers
The article reveals that North Korea has been stealing crypto assets through various heists and fake job applications. It estimates over $659 million USD was stolen from various attacks.
DOJ confirms FBI operation that mass-deleted Chinese malware from thousands of US computers
The article confirms that the Department of Justice confirmed a recent FBI operation that eradicated Chinese malware from thousands of US computers. The article provides some details about the action and its potential impact on national security concerns related to cyber attacks.
Hackers are exploiting a new Fortinet firewall bug to breach company networks
The article warns of a critical vulnerability in Fortinet firewalls allowing hackers to breach company networks. It describes how hackers are exploiting a new bug to gain unauthorized access to sensitive information.
Hacker in Snowflake Extortions May Be a U.S. Soldier
The article suggests that a former soldier may be involved in cyber extortion and is linked to a case of possible blackmail in a company called Snowflake. The fact is a potential criminal who may have compromised data and is using fear and pressure to conduct unauthorized activities.
Why Phishers Love New TLDs Like .shop, .top and .xyz
The article explains that new top-level domains (TLDs) like .shop, .top and .xyz are popular among hackers and phishing attackers because they offer a sense of credibility, brand recognition, and trust. particular users who fall victim to their tactics.
U.S. Offered $10M for Hacker Just Arrested by Russia
The article reveals that the US offered 10 million dollars to a hacker who was just arrested by Russia. The offer was a way to entice the hacker to cooperate with US authorities and provide valuable information on cybercriminal organizations.
Patch Tuesday, December 2024 Edition
The article talks about the December 2024 Edition of Patch Tuesday, a monthly patch update from Microsoft's Windows. It covers new security patches and updates, highlighting the importance of timely installation to address potential vulnerabilities.
How Cryptocurrency Turns to Cash in Russian Banks
Russian banks now accept cryptocurrency as a form of cash, thanks to a new law. This move makes it cryptocurrency accessible for everyday transactions and is a significant step towards mainstream adoption of crypto in Russia.
How to Lose a Fortune with Just One Bad Click
The article offers advice on how a single bad click can lead to substantial financial loss. It suggests caution against investing heavily in volatile markets, highlighting the importance of due diligence and not relying solely on emotional cues.
Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm
The article reveals that a Turkish IT firm is linked to a web hacking service 'Araneida', which offers hacking services to clients worldwide. It also discusses how such services and data breaches can pose serious risks to individuals and organizations.
Happy 15th Anniversary, KrebsOnSecurity!
Happy 15th anniversary, KrebsOnSecurity! The article is celebrating this significant milestone and provides insights into the success through unique and impactful storytelling. It also covers topics like news, events, and unique perspectives in cybersecurity, offering a fresh take on industry developments.
U.S. Army Soldier Arrested in AT&T, Verizon Extortions
The article reports that a U. soldier soldier was arrested for allegedly extorting millions from businesses by manipulating phone systems and using threats. The case involves allegations of cybercrime and espionage, with the suspect using sophisticated tactics to gain an unfair advantage.
A Day in the Life of a Prolific Voice Phishing Crew
The article delves into the day-to-day life of a prolific voice phishing crew. It reveals insights into their particular tactics, tools and targets used to carry out their fraudulent activities, highlighting how phishing attacks are orchestrated and the challenges they face.
Apple users facing new security risks after critical USB component hacked
Apple users are facing new security challenges after critical USB components are hacked, potentially allowing unauthorized access to private data. The hack is a potential risk for many Apple devices and could lead to new vulnerabilities.
Top cannabis brand Stiiizy says hackers got access to its systems
The article shares insights from Stiiizy, a top cannabis company, on a recent security breach where hackers gained unauthorized access to their systems. The article emphasizes the critical details: (1) Data breaches and unauthorized access are a significant concern for the company, and (2) Stiiizy is implementing further security measures and reviewing internal protocols to prevent future breaches.
WordPress users targeted by devious new credit card skimmer malware
The article warns of a new credit card skimmer malware targeting WordPress users. It describes how the particular malware is designed to steal credit card details from websites using WordPress as a platform.
Nominet says it was hit by cyberattack following recent Ivanti VPN security issue
The article reveals that Nominet, the .uk's largest commercial registry, was hit by a cyberattack following the recent vulnerabilities discovered in Ivanti VPN solutions. The attack provides insight into the critical vulnerabilities and the need for continued vigilance with IT security measures.
UK Government launches ransomware protection proposals
The article discusses the UK government's proposal to combat ransomware through protective measures. These proposals include enhanced education and awareness programs, technical solutions to prevent or mitigate attacks, and incentives for the private sector to adopt best practices. The critical details are the focus on the proposed education agenda for organizations and individuals to avoid future attacks, as well as the commitment to provide proper tools and resources to deal with potential threats.
Best identity theft protection of 2025
The article recommends various identity theft protection services with advanced features, monitoring, and high customer satisfaction ratings. It suggests that these top picks offer comprehensive protection, credit monitoring, identity restoration, and cost recovery services. The list includes reliable brands with proven track records in identity protection.
CISA tells agencies to patch BeyondTrust bug now
The article advises federal agencies to patch a critical bug in the BeyondTrust application immediately, due to the potential for remote code execution attacks. The also mentions the criticality of the issue and the need for prompt action to mitigate potential security risks.
AWS S3 feature exploited by ransomware hackers to encrypt storage buckets
The article warns about how ransomware hackers are using AWS S3 feature to encrypt storage buckets. It talks about how these hackers exploit vulnerabilities to gain unauthorized access and use encryption keys to lock files in users' buckets, potentially holding them for ransom.
Microsoft reveals more on a potentially major Apple macOS security flaw
Microsoft has come forward to reveal a potentially critical security flaw in macOS that could allow malicious programs to bypass typical security protections. The flaw potentially impacts Apple's macOS Big Sur and Monterey operating systems released in late 2020. Microsoft also provided a details on how an attacker could execute malicious code and potential workarounds to mitigate the issue.
Blood donation firm reveals donor personal data stolen in cyberattack
The article reveals that a blood donation firm suffered a data breach, potentially exposing sensitive donor information. The incident is concerning as it could lead to identity theft and harm due to compromised data, including names, addresses, and donor profiles. The article suggests measures to address potential impacts and calls for improved cybersecurity measures to safeguard donor data.
Chrome Manifest V3 blamed for security risks as EditThisCookie extension becomes a victim
The Chrome Manifest V3 framework is blamed for security issues, and the "EditThisCookie" extension is affected, which was used for illegal cookie management. The extension was removed from the Google Chrome web store due to security risks.
Google searches for "free VPN" skyrocket in Florida after porn ban goes live
The Google search for "free VPN" in Florida spiked dramatically after the state's new ban on adult content went live. The related to the increased demand for digital privacy and uncensored content blocking, the search trend shows an increased interest in free VPN services.
Widespread cyberattack targets Google Chrome extensions, compromises 2.6 million devices
The article discusses a massive cyberattack that compromised over 26 million Google Chrome extensions. The attack allows unauthorized extensions to be installed, giving access to potentially harmful activities.
Bosch's new e-bike battery theft solution looks great, but it's locked behind a paywall
The article reveals Bosch's new battery lock system for e-bikes that prevents theft. The system uses an unique code system and a smartphone app, but it's behind a paywall, so it's not free. The system is a security feature for higher-value bikes.
End of Windows 10 support this year threatens over 60% of active Windows PCs
The article warns that the end of Windows 10 support this year will impact over 60% of active Windows PCs. It suggests concern about businesses and users having to upgrade or find alternative software to maintain their operations. The highlights the importance of managing software lifecycle and preparing for future transitions. The also emphasizes the need for clear communication and planning to manage this change effectively. This important for organizations to address compatibility and support needs for Windows 11 and future OS releases. This important
Telegram's pivot to a law-abiding platform: fulfilled requests of user data have skyrocketed
The article talks about how Telegram has become a law-abiding platform that complies with user data requests and provides more secure services. The key facts are about the rapid increase in fulfilled requests for user data sharing.
Apple denies using Siri recordings to serve targeted ads
Apple has denied using Siri recordings to serve targeted ads, violating users' privacy expectations. The company insists it has no plans to use voice recordings for advertising. This unique and personal voice commands and interactions are not used for advertising purposes. This unique and personal voice commands and interactions are not used for advertising purposes. The company focuses on improving Siri's functionality and quality.
Chrome extensions are abusing Google's lousy security policies to come first in search results
Google's security policies are being gamed by Chrome extensions. They are abuse the particular to rank higher in search results. The use of shady tactics to game Google's system.
Mobile apps exploited to harvest location data on massive scale, hacked files reveal
The article reveals that mobile apps are exploited to collect and share massive amounts of location data, violating user privacy. It describes how hacked files contain extensive information on app usage and location accuracy. Actionable details: The article emphasizes the need to address and clarify the collection and use of location data, as well as provide transparency and control to users regarding data collection practices.
DOJ clears path to sell $6.3B in Bitcoin seized from Silk Road marketplace
The article is about the Department of Justice announcing that they have cleared the path for the sale of over $6.3 billion worth of Bitcoin seized from the Silk Road marketplace. The details are about the announcement clearing the way for the sale of Bitcoin that was seized from the notorious marketplace for illegal drugs and other goods.
VPN used for VR game cheat sells access to your home network
The article warns about the dangers of a VPN service that is being used to cheat in online multiplayer VR games and is selling access to users' home networks. It selling users' access to your home network, which could potentially lead to serious security risks, data breaches, and privacy concerns.
Health care giant Ascension says 5.6 million patients affected in cyberattack
The article discusses that Ascension, a health care giant, has suffered a massive data breach impacting 5.6 million patients. The attack is a critical data including personal and medical information. The impact of the scale and scope of this attack underscores the urgent need for improved cybersecurity measures.
Passkey technology is elegant, but it’s most definitely not usable security
The article discusses the potential of a new technology called Passkey, which aims to improve security but may end up being less user-friendly. The summary is that while the technology offers innovative ideas, it falls short in its actual usability and effectiveness.
AI-generated phishing emails are getting very good at targeting executives
The article warns about the effectiveness of AI-generated phishing emails that trick people, especially executives. It talks about how clever tactics like using legitimate business language, mimicking trust, and staying ahead of security trends are crucial to stay safe.
Time to check if you ran any of these 33 malicious Chrome extensions
Sure, the article is a quick update on a massive number of malicious Chrome extensions discovered on around 2.6 million devices devices. These extensions are particular maliciously modified user experiences and potentially compromise privacy and security for users.
Widely used DNA sequencer still doesn’t enforce Secure Boot
The article warns that despite its wide use of DNA sequencers enforcing secure boot is not a priority. It raises concerns about potential vulnerabilities this highlights the lack of security measures.
Misconfigured license plate readers are leaking data and video in real time
The article warns of the dangers of poorly configured license plate readers that are spreading surveillance cameras and gathering license plate data in real-time. The also pose a risk of exposing individuals' movements and behavior, raising serious privacy concerns.
Here’s how hucksters are manipulating Google to promote shady Chrome extensions
The article warns of the rise of Google Chrome extensions that are potentially harmful and are being manipulated to appear in search rankings. It suggests that the particular store has a serious spam problem with the promotions of shady extensions.
Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware
The article warns of ongoing attacks that install malware to Ivanti VPN users. The article emphasizes the critical vulnerability that attackers are exploiting to install sneaky malware, providing a urgent need for users and organizations to patch vulnerabilities quickly.
Microsoft sues service for creating illicit content with its AI platform
Microsoft has filed a lawsuit against a service provider for creating and selling illicit and illegal content using Microsoft's AI platform without proper authorization. The illegal content involved deep fakes, misinformation, and other abuses. The lawsuit aims to stop the defendant from using Microsoft's technology for such activities.
Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks
The Mirai botnet variant attacks a vulnerability in the Four-Faith router, enabling attackers to bring down routers with large-scale DDoS attacks. The also leverages known vulnerabilities to compromise devices remotely.
Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
The article discusses a critical vulnerability found in Ivanti's products Connect Secure and Policy Secure which allows attackers to exploit the vulnerability and take control over the system remotely. The vulnerability is rated critical and requires immediate attention to mitigate potential security risks. The also highlights the potential impacts of this vulnerability, such as unauthorized access, data breaches, and operational downtime.
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection
The article warns of a critical RCE (remote code execution) vulnerability in KerioControl, potentially allowing remote code execution via CRLF injection. The flaw could be exploited to take control of a target system remotely. The details are provided to help understand the article and take appropriate actions.
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
The article discusses critical vulnerabilities found in SonicWall, Palo Alto Networks, and Aviatrix controllers. The article provides information about the critical vulnerabilities that can be exploited for potential cyberattacks. The summary is that the article shares details on the patches and fixes applied to mitigate these risks.
Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
The article discusses how hackers exploited a vulnerability in Aviatrix Controller to deploy backdoors and crypto miners on target networks. The story reveals the critical details of the attack surface, the nature of the exploit, and the potential impact. The article offers a timely warning for network administrators and highlights the importance of updating and securing network devices.
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
CISA adds a second flaw to the BeyondTrust library, exposing systems to potential attacks. This new issue could flaws the particular security vulnerability, which could have serious consequences for organizations that use this library.
Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces
The article warns about a potential zero-day vulnerability in Fortinet Firewalls. It could affect multiple products and could provide potential access to exposed interfaces. The details are recommended patches and advice to review and address potential risks.
Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year
The article is about the cybersecurity community's loss of some talented individuals and their notable work. It highlights some of the names of experts who recently left or passed away, and the piece explores their achievements and influence.
Google OAuth Vulnerability Exposes Millions via Failed Startup Domains
The article warns of a critical OAuth vulnerability that could allow unauthorized access to millions of Google accounts if exploited. The vulnerability could enable attackers to craft malicious startup pages that could compromise login sessions. The details are provided on the potential impact and the nature of the security breach.
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
Microsoft has identified a vulnerability in macOS that allows rootkit installation on Mac systems. The vulnerability is related to a missing check in a kernel driver, and could potentially allow an attacker to install unauthorized software. The critical security issue, it is recommended to update macOS immediately.
New Ransomware Group Uses AI to Develop Nefarious Tools
The article discusses the emergence of a new ransomware group that creates and deploys sophisticated and customized ransomware tools using AI techniques. The group's focus on generating large ransom demands through its unique and targeted attacks.
Microsoft 365 MFA Outage Fixed
Microsoft 365 users can breathe a sigh of relief as the MFA outage issue has been resolved. The article highlights that the outage affected multiple services including access, and the quick response from Microsoft to fix the problem.
Russian Malware Campaign Hits Central Asian Diplomatic Files
The article warns of a Russian malware attack that impacted diplomatic files in several Central Asian countries. The attack is said to be sophisticated and targeted, affecting government agencies and possibly interfering with international relations.
Critical Infrastructure Urged to Scrutinize Product Security During Procurement
The article discusses the importance of product security during the procurement process for critical infrastructure. It emphasizes the critical need to ensure that products and services used for communication networks, energy systems, and other infrastructure are secure and reliable. The article suggests strategies such critical infrastructure owners and operators can employ to secure products and services, including rigorous security evaluations during the procurement process.
UK Registry Nominet Breached Via Ivanti Zero-Day
The UK Registry Nominet was breached by Ivanti Zero-Day, a hacking group. The group accessed and stole personal information of several users. The group used social engineering to target specific individuals with tailored attacks via instant messaging platforms.
Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges
The article discusses how remediation times drop significantly as cyber hygiene increases. It talks about how adopting better cyber hygiene practices and standards, such as regular patch management and unique complex threats, can reduce remediation times by orders of magnitude.
UK Considers Ban on Ransomware Payments by Public Bodies
The article discusses the UK government's potential plan to ban organizations paying ransoms to cybercriminals who demand it in return for encrypted data. The government hopes to mitigate the impact on legitimate businesses that may help them recover.
Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data
A top UK law firm has led over 15,000 people in a landmark lawsuit against Google and Microsoft over the use of AI data. The suit alleges that these tech giants have been illegally collecting and using personal data without proper consent.
Browser-Based Cyber-Threats Surge as Email Malware Declines
The article discusses how browser-based attacks are on the rise while email-based malware is in decline. The focus is on the shift towards more powerful and dangerous browser attacks, as well as the need for proper security measures. The provides insights for readers interested in staying ahead of evolving cyber threats and strategies for cyber defense.
New AI Rule Aims to Prevent Misuse of US Technology
The article discusses the new AI rule that aims to prevent the misuse of US technology for mass surveillance or other purposes that may harm the public or individual rights. The rule will require companies to seek special permission for AI systems to handle sensitive information or face potential abuse.
Stolen Path of Exile 2 admin account used to hack player accounts
The article reveals that an admin account vulnerability allowed access to hack into other player PoE2 accounts. The issue is related to a lack of proper security measures and could have serious consequences for the player community. The also outlines the general advice for preventing such type of issues, like using updated security patches and monitoring.
CISA orders agencies to patch BeyondTrust bug exploited in attacks
The article is about the CISA ordering agencies to patch a critical remote code execution vulnerability in order to mitigate the risk of potential cyber attacks exploiting the BeyondTrust bug. The vulnerability is in a popular password-management software. The allows attackers to execute arbitrary code remotely.
OneBlood confirms personal data stolen in July ransomware attack
OneBlood confirms that personal data of its customers was stolen as a result of the July ransomware attack. The company states it is taking necessary measures to address the incident and ensure the security of customer information.
Fortinet warns of auth bypass zero-day exploited to hijack firewalls
Fortinet alerts about a zero-day exploit that bypasses authentication on firewalls. The article warns of a critical security vulnerability that could be used to hijack firewalls.
Hackers use FastHTTP in new high-speed Microsoft 365 password attacks
Microsoft 365 users are again at risk of a new attack using the fast HTTP protocol, which hackers can exploit to run wild with password-breaking attempts at incredible speed. attackers use the fast HTTP headers to perform a large number of password guesses simultaneously.
FBI wipes Chinese PlugX malware from over 4,000 US computers
The article shares that the FBI has removed Chinese PlugX malware from over 4k computers in the US. It is a result of a coordinated effort by security teams to block malicious domains and identify and contain the malware.
Google OAuth flaw lets attackers gain access to abandoned accounts
The article warns of a critical Google OAuth flaw that could allow attackers to access abandoned accounts. The issue is that Google's implementation of OAuth, the industry-standard authorization system for mobile apps, is not working as intended, potentially enabling attackers to bypass account security measures. The critical flaw could potentially lead to serious security issues and identity theft.
Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws
Microsoft January's 2025 Patch Tuesday is fixing 8 zero-days and 159 known flaws. The patch addresses critical vulnerabilities to prevent potential cyberattacks. It fixes multiple types of issues across Windows, Windows Server, and Microsoft Products.
US govt says North Korea stole over $659 million in crypto last year
The US government claims that North Korea stole over $659 million in cryptocurrency last year through various cyber heists. The also alleges that the country used some of these funds for nuclear weapons development.
WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites
The article reveals a massive attack on WordPress sites by a new variant of malware, resulting in rogue admins gaining unauthorized access to over 5,000 sites. The attack is a result of a complex new method that bypasses protection mechanisms. The malicious activity can be further exploited to potentially carry out further attacks.
Set a Daily Reminder
Stay updated with the latest cybersecurity news by setting a daily reminder.