News Items

  • news

    Visible to the public "TP-Link Smart Bulbs Can Let Hackers Steal Your Wi-Fi Password"

    Researchers from Universita di Catania and the University of London have discovered four vulnerabilities in the TP-Link Tapo L530E smart bulb and the TP-Link Tapo app that could enable attackers to steal the Wi-Fi password of their target. The TP-Link Tapo L530E smart bulb is a best-seller on multiple online marketplaces, including Amazon. TP-Link Tapo is an app for managing smart devices that has been downloaded 10 million times from Google Play. Their research aims to highlight security vulnerabilities in the billions of smart Internet of Things (IoT) devices used by consumers, many of which use risky data transmission and inadequate authentication safeguards. This article continues to discuss the vulnerabilities found in TP-Link smart bulbs that can allow attackers to steal Wi-Fi passwords.

    Bleeping Computer reports "TP-Link Smart Bulbs Can Let Hackers Steal Your Wi-Fi Password"

  • news

    Visible to the public "Spoofing an Apple Device and Tricking Users Into Sharing Sensitive Data"

    At the DEF CON hacker conference, white hat hackers demonstrated how to spoof an Apple device and deceive users into divulging sensitive information. Conference attendees who use iPhones saw pop-up messages prompting them to connect their Apple ID or share their password with a nearby Apple TV. The messages were part of a study conducted by security researcher Jae Bochs. According to Bochs, data was not collected during the experiment. He was sending out Bluetooth Low Energy (BLE) advertisement packets that do not require pairing. He used inexpensive equipment consisting of a Raspberry Pi Zero 2 W, two antennas, a Bluetooth adapter compatible with Linux, and a portable battery. This article continues to discuss the demonstrated spoofing of an Apple device that could trick users into sharing their sensitive data.

    Security Affairs reports "Spoofing an Apple Device and Tricking Users Into Sharing Sensitive Data"

  • news

    Visible to the public "Software Must Be Secure by Design, and Artificial Intelligence Is No Exception"

    In discussions about Artificial Intelligence (AI), the functioning of an AI system is often shrouded in mystery. However, the truth is much simpler as AI is a software system. According to the Cybersecurity and Infrastructure Security Agency's (CISA) Christine Lai, AI Security Lead, and Dr. Jonathan Spring, like any software system, AI must be designed with security in mind, thus requiring AI system manufacturers to consider customer security as a fundamental business requirement, not just a technical feature. They must also prioritize security throughout the entire product lifecycle. It also calls for AI systems to be secure out-of-the-box, requiring little to no configuration or additional cost. This article continues to discuss why AI is powerful, the importance of building AI software with security in mind, AI community risk management, and AI system assurance.

    CISA reports "Software Must Be Secure by Design, and Artificial Intelligence Is No Exception"

  • news

    Visible to the public "Thousands of Illicit Cyber Networks Disrupted in Africa Operation"

    INTERPOL and AFRIPOL coordinated an operation across 25 African countries that led to the arrest of 14 suspected cybercriminals and the identification of 20,674 suspicious cyber networks, underscoring the rise of digital insecurity and cyber threats in the region. The identified networks were linked to losses of over $40 million. The four-month Africa Cyber Surge II operation centered on identifying cybercriminals and compromised infrastructure. It facilitated communication, provided analysis, and shared intelligence between countries. Cooperation was streamlined between African law enforcement agencies through the operation in order to prevent, mitigate, investigate, and disrupt cyber extortion, phishing, Business Email Compromise (BEC), and more. This article continues to discuss highlights from the operation.

    HSToday reports "Thousands of Illicit Cyber Networks Disrupted in Africa Operation"

  • news

    Visible to the public "CISA Conducts Largest Annual Election Security Drills Amid Threats Targeting Voting Systems"

    The Cybersecurity and Infrastructure Security Agency (CISA) recently led the largest annual election security exercise in the US, collaborating with the Justice Department, the FBI, and other federal participants to strengthen voting systems in the US. According to CISA Director Jen Easterly, the exercise aimed to promote information sharing among federal, state, and local election officials and the protection of equipment and systems before the 2023 and 2024 elections. Local election workers encountered increased cyberattacks during the 2022 midterms, as the FBI warned that cybercriminals were targeting election systems and critical infrastructure. In recent years, CISA has launched several initiatives to strengthen election security and published election security tools and guidelines, such as a cybersecurity toolkit and additional resources to protect voting systems and election operations. This article continues to discuss the election security exercise in which CISA officials coordinated with federal, state, and local agencies to explore hypothetical cybersecurity scenarios that could affect election operations.

    NextGov reports "CISA Conducts Largest Annual Election Security Drills Amid Threats Targeting Voting Systems"

  • news

    Visible to the public "FBI, Air Force Warn of Cyberattacks on Space Industry by 'Foreign Intelligence Operations'"

    According to US intelligence agencies, unnamed Foreign Intelligence Entities (FIEs) are escalating cyberattacks against US-based space companies. The FBI, the National Counterintelligence and Security Center (NCSC), and the Air Force Office of Special Investigations (AFOSI) recently released an advisory warning of cyberattacks on the space industry. The agencies noted that FIEs recognize the significance of the commercial space industry to the US economy and national security, as well as the rising dependence of critical infrastructure on space-based assets. They consider the innovation and assets of the US in space as both potential threats and opportunities to acquire critical technologies and expertise. FIEs gain access to the US space industry through cyberattacks, strategic investments, and targeting key supply chain nodes, among other methods. This article continues to discuss the increase in cyberattacks on the US space industry by FIEs.

    The Record reports "FBI, Air Force Warn of Cyberattacks on Space Industry by 'Foreign Intelligence Operations'"

  • news

    Visible to the public "Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability"

    Ivanti's problems with security defects in its enterprise-facing products are starting to pile up. The IT software company recently shipped urgent patches for a critical-severity vulnerability in the Ivanti Sentry (formerly MobileIron Sentry) product and warned that hackers could exploit the issue to access sensitive API data and configurations. In an advisory, Ivanti said the vulnerability, tagged as CVE-2023-38035, affects Ivanti Sentry versions 9.18 and prior and could be exploited by malicious hackers to change configuration, run system commands, or write files onto the system. Ivanti noted that if exploited, this vulnerability enables an unauthenticated actor to access some sensitive APIs that are used to configure the Ivanti Sentry on the administrator portal (port 8443, commonly MICS). While the issue carries a 9.8/10 CVSS severity score, Ivanti noted that there is a low risk of exploitation for enterprise administrations who do not expose port 8443 to the internet. The company has recommended that customers restrict access to MICS to internal management networks and not expose this to the internet. Ivanti said it was "aware of a limited number of customers impacted by CVE-2023-38035," but it is unclear if the issue is being exploited as zero-day in the wild. Ivanti's security problems have escalated in recent months with the release of patches for critical flaws in the Avalanche Enterprise MDM Product line, in-the-wild exploitation of vulnerabilities in Ivanti EPMM, and documented APT activity targeting Ivanti zero-day flaws.

    SecurityWeek reports: "Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability"

  • news

    Visible to the public "Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"

    The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) issued a warning that cyber actors could target the US' most sensitive information now and use future quantum computing technology to break traditional cryptographic algorithms that are not quantum-resistant. This could be especially detrimental for sensitive data with long-term confidentiality requirements. The joint Cybersecurity Information Sheet (CSI), titled "Quantum-Readiness: Migration to Post-Quantum Cryptography," helps the Department of Defense (DoD), National Security System (NSS) owners, the Defense Industrial Base (DIB), and others in protecting the confidentiality, integrity, and authenticity of sensitive information. This article continues to discuss the CSI on migrating to post-quantum cryptography.

    NSA reports "Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"

  • news

    Visible to the public "Unveiling the Risks of Routing Protocols"

    Routing protocols are essential to the functioning of the Internet and the services that rely on them. However, many of these protocols were created without security in mind. Initially, the Border Gateway Protocol (BGP) did not account for the possibility of peer-to-peer attacks. Origin and path validation in BGP has been the subject of considerable effort over the past decades, but disregarding the security of BGP implementations, especially message parsing, has led to multiple vulnerabilities that could be exploited for Denial-of-Service (DoS) attacks. There is a tendency to disregard security auditing due to the misconception that these types of vulnerabilities are less severe than origin and path validation issues. This article continues to discuss the creation of vulnerabilities by the neglect of routing protocol security.

    Dark Reading reports "Unveiling the Risks of Routing Protocols"

  • news

    Visible to the public "Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"

    The BlackCat/ALPHV ransomware group has added Seiko to its leak website, claiming responsibility for a cyberattack disclosed by the Japanese company. Seiko is one of the largest and oldest watchmakers in the world, with around 12,000 employees and an annual revenue of more than $1.6 billion. On August 10, 2023, the company published a data breach notice revealing that an unauthorized third party accessed or exfiltrated data from at least a part of its Information Technology (IT) infrastructure. The BlackCat ransomware group claimed responsibility for the attack on Seiko, posting samples of the data stolen during the attack. In the listing, the threat actors leak what appear to be production plans, employee passport scans, new model release plans, and specialized lab test results. This article continues to discuss the cyberattack on Seiko and the BlackCat ransomware gang claiming to have been behind it.

    Bleeping Computer reports "Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"

  • news

    Visible to the public "New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"

    A high-severity security vulnerability has been found in the WinRAR utility, which a threat actor could exploit for Remote Code Execution (RCE) on Windows systems. The vulnerability, tracked as CVE-2023-40477 with a CVSS score of 7.8, stems from improper validation while processing recovery volumes. According to the Zero Day Initiative (ZDI), the vulnerability is caused by improper validation of user-supplied data, which can lead to memory access beyond the end of an allocated buffer. This vulnerability allows an attacker to execute code in the context of the current process. Successful exploitation of the vulnerability requires user interaction, as the target must be lured to a malicious website or tricked into opening a booby-trapped archive file. This article continues to discuss findings regarding the new WinRAR vulnerability.

    THN reports "New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"

  • news

    Visible to the public "Organizations Invest in AI Tools to Elevate Email Security"

    According to IRONSCALES and Osterman Research, specialized email security vendors are leveraging a combination of Artificial Intelligence (AI) and human insights to improve email security and combat emergent threat methods enhanced by AI. The threat posed by AI-generated email attacks is expected to increase exponentially. More than 74 percent of respondents have witnessed an increase in the use of AI by cybercriminals over the past six months, and more than 85 percent believe that AI will be used to bypass their existing email security technologies. Seventy-seven percent of organizations now rank email security among their top three priorities, and almost all of the security leaders surveyed predict that AI will be moderately or extremely important to their future email defenses. This article continues to discuss cybercriminals using AI in email attacks, strengthening defenses with AI-enabled email security solutions, and organizations still relying on human insights for complementary protection.

    Help Net Security reports "Organizations Invest in AI Tools to Elevate Email Security"

  • news

    Visible to the public "Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"

    Australian financial services company Latitude Financial recently reported that the cyberattack disclosed earlier this year has cost it tens of millions of dollars. In a financial report covering the first half of 2023, the consumer lender reported roughly $50 million of pre-tax costs and provisions relating to the cyber incident. The company previously estimated a total cost of approximately $70 million. In addition, the company said in its financial report that the cyberattack has negatively impacted various aspects of the business. The company noted that the attack, which is believed to have been carried out by a ransomware group, has exposed information belonging to roughly 7.9 million people in Australia and New Zealand. The compromised information includes contact details, dates of birth, driver's license and passport numbers, driver's license and passport copies, account statements, and income and expense information such as bank account numbers and payment card numbers.

    SecurityWeek reports: "Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"

  • news

    Visible to the public "Tesla Discloses Data Breach Related to Whistleblower Leak"

    Tesla has recently disclosed a data breach impacting roughly 75,000 people, but the incident is the result of a whistleblower leak rather than a malicious cyberattack. Tesla recently told US authorities that a data breach discovered in May resulted in the exposure of the personal information, including social security numbers, of more than 75,700 individuals. A notification letter sent to impacted people reveals that the data breach is related to a couple of former employees sending confidential information to German media outlet Handelsblatt. Tesla said the ex-workers "misappropriated the information in violation of Tesla's IT security and data protection policies." The compromised information includes names, contact information, and employment-related records associated with current and former employees. Impacted individuals are being offered credit monitoring and identity protection services. The leak came to light in May when Handelsblatt reported that it had received 100 Gb of confidential Tesla data from a whistleblower. The leaked files, dubbed "Tesla Files," reportedly included information on more than 100,000 current and former employees, customer bank details, production secrets, and customer complaints regarding driver assistance systems. Handelsblatt has assured Tesla that it does not intend to publish the personal data provided by the whistleblower. Tesla stated that the chances of the exposed data being misused are slim, given the circumstances of the incident.

    SecurityWeek reports: "Tesla Discloses Data Breach Related to Whistleblower Leak"

  • news

    Visible to the public "Cuba Ransomware Group Steals Credentials Via Veeam Exploit"

    According to security researchers at BlackBerry, a notorious Russian-speaking ransomware group has updated its attack tooling to include a Veeam exploit designed to harvest logins. The researchers stated that their discovery came from investigations into attacks by the Cuba group on a US critical national infrastructure provider and a South American IT integrator. Now in its fourth year of operation, the group appears to be using a slightly tweaked set of tactics, techniques, and procedures (TTPs), blending old and new tools and methods. Among the new discoveries made by the researchers was Cuba's exploitation of CVE-2023-27532, which impacts Veeam Backup & Replication software and is being used to steal credentials from configuration files on the victim's device. The researchers noted that the exploit works by accessing an exposed API on a component of the Veeam application (Veeam.Backup.Service.exe). This vulnerability exists on any version of the Veeam Backup & Replication software prior to version 11a (build 11.0.1.1261 P20230227) and version 12 (build 12.0.0.1420 P20230223). The researchers noted that elsewhere, Cuba exploited a legacy flaw in Microsoft NetLogon (CVE-2020-1472) and used custom and off-the-shelf tools such as custom downloader BugHatch, a Metasploit DNS stager, host enumeration tool Wedgecut, BurntCigar malware, and numerous evasive techniques including Bring Your Own Vulnerable Driver (BYOVD). The researchers stated that initial access in these studied compromises came from an administrator-level login via Remote Desktop Protocol (RDP). The researchers noted that it is likely that the Cuba group bought this from an initial access broker (IAB) or achieved it via vulnerability exploitation.

    Infosecurity reports: "Cuba Ransomware Group Steals Credentials Via Veeam Exploit"

  • news

    Visible to the public "Research Hack Reveals Call Security Risk in Smartphones"

    Advanced smartphone features entice users who want more from their devices, especially in regard to health and entertainment, but the question is whether these features pose a security risk when making or receiving actual calls. A team of researchers from Texas A&M University and four other institutions developed malware to answer that question. The researchers' malware, dubbed EarSpy, uses Machine Learning (ML) algorithms to filter caller information from ear speaker vibration data recorded by an Android smartphone's motion sensors without evading protections or needing user permissions. This article continues to discuss the malware created by academic researchers that shows how call security can be compromised in three areas.

    Texas A&M University reports "Research Hack Reveals Call Security Risk in Smartphones"

  • news

    Visible to the public "Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"

    In a recent study titled "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers," Amogh Pradeep, a doctoral student at Khoury College, and his multinational research team set out to examine the personal data collected by browsers and how to prevent such collection. After analyzing the largest dataset of these browsers ever compiled, the researchers discovered numerous Android browsers engaged in privacy-harming activities. Pradeep and his team analyzed 424 browsers, which included Google Chrome, UC Browser, Mozilla Firefox, and Opera. They conducted a series of experiments on each browser and hypothesized that the browsers were replacing or modifying content in ways that compromised user privacy. This article continues to discuss findings from the privacy analysis of Android browsers.

    Northeastern University reports "Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"

  • news

    Visible to the public "MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"

    Due to their complexity, hybrid cyber threats are dangerous. Oftentimes, cyberattacks are accompanied by an information component designed to achieve specific objectives, such as misleading the public or convincing them of things favorable to the nation launching the attack. The cybersecurity experts and professionals, Dr. Darius Stitilis and Associate Professor Marius Laurinaitis from Mykolas Romeris University (MRU), along with Professor Matthew Warren, the Director of the Cyber Security Center at the Royal Melbourne Institute of Technology (RMIT) in Adelaide, Australia, are sharing their insights on new generation hybrid threats and the need to expand the application of the hybrid threat model developed within the European Union (EU) beyond its borders. This article continues to discuss insights on combating hybrid cyberattacks.

    Mykolas Romeris University reports "MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"

  • news

    Visible to the public "Bug Hunter’s Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"

    A team led by the University of Maryland received a distinguished paper award for examining the challenges encountered by bug bounty hunters or ethical hackers who discover and report vulnerabilities or bugs to a platform's developer. The paper, titled "Bug Hunter's Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem," provides insight into the obstacles faced by participants in bug bounty programs. When the ecosystem functions properly, bug bounties can enhance organizations' security posture at a low cost. According to the researchers, communication issues, such as unresponsiveness and disputes, are most likely to discourage bug hunters. They provide recommendations to make the bug bounties ecosystem more accommodating and increase participation in an underutilized market. This article continues to discuss the winning paper on challenges faced by bug bounty hunters and other papers presented at the 32nd USENIX Security Symposium.

    The University of Maryland reports "Bug Hunter's Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"

  • news

    Visible to the public "Hackers Figured Out 3 separate Ways to Break Into US Air Force Satellites, And Won up to $50K For Doing it"

    Hackers recently managed to break into a US Air Force satellite in orbit and took home prizes of up to $50,000 for exposing the vulnerabilities. Italian team "mHACKeroni" were the winners of the US Space Force annual "Hack-A-Sat" competition, which took place at the hacker international conference DEF CON in Las Vegas on Friday and Saturday. The event was designed to figure out gaps in US cyber defenses before they can be exploited by rival states like Russia and China. For the first time, the hackers were asked to attack a real satellite in space, the US Air Force Moonlighter, which was deployed specifically for the event. Five teams were picked out of more than 700 applicants to strategically hack into the satellite. The participants aimed to break in and build a data link to the satellite while keeping competing teams out. The Italian team beat last year's winners, Poland-based "Poland Can Into Space." They came second and won $30,000, while the UK-US joint team "jmp fs:[rcx]" took $20,000 home. While the event had a decidedly fun-and-games tone to it, it reflects a serious and growing security threat. Satellite hacking can cause real geopolitics problems.

    Business Insider reports: "Hackers Figured Out 3 separate Ways to Break Into US Air Force Satellites, And Won up to $50K For Doing it"

  • news

    Visible to the public "Cisco Patches High-Severity Vulnerabilities in Enterprise Applications"

    Cisco recently announced security updates for several enterprise applications to patch high-severity vulnerabilities leading to privilege escalation, SQL injection, directory traversal, and denial-of-service (DoS). The most severe of these impacts the web management interface of Cisco Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM SME). The bug is tracked as CVE-2023-20211 (CVSS score of 8.1), and is described as an improper validation of user-supplied input that could allow a remote, authenticated attacker to perform an SQL injection attack. Cisco noted that an attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges. Cisco addressed the flaw with the release of Unified CM and Unified CM SME versions 12.5(1)SU8 and also released a patch file for version 14 of the applications. Cisco warned that proof-of-concept (PoC) exploit code targeting the vulnerability has been released. Cisco also announced patches for CVE-2023-20224, an elevation of privilege bug in the ThousandEyes Enterprise Agent, Virtual Appliance installation type. Also rooted in the insufficient input validation of user-supplied input, Cisco noted that the issue could allow an attacker to authenticate to an affected device via crafted commands. The attacker could then execute commands with root privileges. Cisco pointed out that the attacker must have valid credentials to exploit this vulnerability. The bug was addressed in ThousandEyes Enterprise Agent version 0.230. The article continues to talk about the other vulnerabilities Cisco patched.

    SecurityWeek reports: "Cisco Patches High-Severity Vulnerabilities in Enterprise Applications"

  • news

    Visible to the public "Bronze Starlight Targets the Southeast Asian Gambling Sector"

    SentinelOne observed Bronze Starlight, also known as APT10, Emperor Dragonfly, and Storm-0401, an Advanced Persistent Threat (APT) group with ties to China, targeting the Southeast Asian gambling sector. The malware and infrastructure used in the campaign are similar to those observed in Operation ChattyGoblin, which the security company ESET attributed to threat actors linked to China. According to SentinelOne, the threat actors used DLL hijacking of executables of Adobe Creative Cloud, Microsoft Edge, and McAfee VirusScan executables to launch Cobalt Strike beacons. Bronze Starlight is a nation-state group known for using ransomware as a distraction or misattribution technique. The perpetrators used modified chat application installers to download .NET malware loaders. The loaders then retrieve a second-stage payload contained in a password-protected ZIP archive from Alibaba buckets. This article continues to discuss the ongoing campaign attributed to China-linked Bronze Starlight targeting the Southeast Asian gambling sector.

    Security Affairs reports "Bronze Starlight Targets the Southeast Asian Gambling Sector"

  • news

    Visible to the public "Thousands of Android APKs Use Compression Trick to Thwart Analysis"

    Threat actors are increasingly distributing malicious Android APKs (packaged app installers) that can resist decompilation through unsupported, unknown, or highly adjusted compression algorithms. The main benefit of this strategy is evading detection by security tools using static analysis and impeding examination by researchers, thus delaying the discovery of how an Android malware strain works. Zimperium, a member of the 'App Defense Alliance' dedicated to identifying and removing malware from Google Play, analyzed the landscape of decompilation resistance in response to a tweet by Joe Security showcasing an APK that evades analysis but functions properly on Android devices. According to a new report by zLab, 3,300 APKs use these unusual anti-analysis techniques, which may cause many of them to crash. This article continues to discuss the compression trick used by thousands of Android APKs to avoid analysis.

    Bleeping Computer reports "Thousands of Android APKs Use Compression Trick to Thwart Analysis"

  • news

    Visible to the public "Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins"

    Open source software development automation server Jenkins recently announced patches for high and medium severity vulnerabilities impacting multiple plugins. The patches address three high severity cross-site request forgery (CSRF) and cross-site scripting (XSS) issues in the Folders, Flaky Test Handler, and Shortcut Job plugins. Jenkins noted that the first bug, tracked as CVE-2023-40336, exists because no POST requests were required for an HTTP endpoint in version 6.846.v23698686f0f6 and earlier of the Folders plugin, leading to CSRF. This vulnerability allows attackers to copy an item, which could potentially automatically approve unsandboxed scripts and allow the execution of unsafe scripts. The second high severity bug, CVE-2023-40342, impacts Flaky Test Handler plugin versions 1.2.2 and earlier, which do not escape JUnit test contents when they are displayed in the Jenkins UI, allowing attackers to perform XSS attacks. Jenkins noted that Shortcut Job plugin versions 0.4 and earlier do not escape the shortcut redirection URL, leading to an XSS flaw tracked as CVE-2023-40346. Another high severity XSS flaw was identified in Docker Swarm plugin versions 1.11 and earlier, which do not escape values returned from Docker before they are inserted into the Docker Swarm Dashboard view. However, no patch was released for this bug. Jenkins also recently announced fixes for medium-severity vulnerabilities in the Folders, Config File Provider, NodeJS, Blue Ocean, Fortify, and Delphix plugins. According to Jenkins, these flaws could lead to information disclosure, credential leaks, CSRF attacks, HTML injection, and credential ID enumeration. Fixes were included in Blue Ocean version 1.27.5.1, Config File Provider version 953.v0432a_802e4d2, Delphix version 3.0.3, Flaky Test Handler version 1.2.3, Folders version 6.848.ve3b_fd7839a_81, Fortify version 22.2.39, NodeJS version 1.6.0.1, and Shortcut Job version 0.5. Additionally, Jenkins warned that no patches have been released for three medium severity flaws in the Maven Artifact ChoiceListProvider (Nexus), Gogs, and Favorite View plugins that could lead to credential exposure, information disclosure, and CSRF attacks.

    SecurityWeek reports: "Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins"

  • news

    Visible to the public "New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools"

    Microsoft disclosed a new variant of the BlackCat ransomware, also known as ALPHV and Noberus, which incorporates tools such as Impacket and RemCom to facilitate lateral movement and Remote Code Execution (RCE). The Impacket tool has modules for credential dumping and remote service execution that could be used for widespread deployment of the BlackCat ransomware, according to the company's threat intelligence team. This version of BlackCat also includes the RemCom hacking tool for RCE. RemCom, an open-source alternative to PsExec, has been used by Chinese and Iranian nation-state threat actors such as Dalbit and Chafer to traverse victim environments. Redmond said it first observed the new variant in BlackCat affiliate attacks in July 2023. This article continues to discuss the new version of the BlackCat ransomware.

    THN reports "New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools"

  • news

    Visible to the public "Researchers Trick an iPhone Into Faking Airplane Mode"

    Researchers have discovered how to manipulate the iPhone's user interface to fake airplane mode while secretly maintaining Internet connectivity. Jamf Threat Labs detailed in a new report how the code controlling the different elements of iOS 16's airplane mode experience can be manipulated to simulate the real thing. They say that mobile device attackers could use this technique post-exploitation to enable 24/7 persistence without the user's knowledge. According to Jamf's vice president of portfolio strategy, Michael Covington, this is a different form of social engineering attack in which the user is duped into believing something that is false. This article continues to discuss the research on how mobile attackers could deceive iPhone users and provide the ideal cover for post-exploitation malicious activity.

    Dark Reading reports "Researchers Trick an iPhone Into Faking Airplane Mode"

  • news

    Visible to the public "Zimbra Users in Europe, Latin America Face Phishing Threat"

    Researchers at ESET have discovered a widespread phishing campaign designed to steal the credentials of Zimbra account holders. The collaborative software platform Zimbra Collaboration is a popular alternative to enterprise email solutions. At least since April 2023, the campaign has been active, targeting various small to medium-sized businesses (SMBs) and government entities. According to ESET telemetry, most targets are located in Poland, but there are also victims in other European countries, such as Ukraine, Italy, France, and the Netherlands. Latin American countries have also been impacted, with Ecuador topping the list of detections in that region. This article continues to discuss the mass-spreading phishing campaign targeting Zimbra users.

    Help Net Security reports "Zimbra Users in Europe, Latin America Face Phishing Threat"

  • news

    Visible to the public "North Korean Cybercriminals Have Already Stolen $200 Million in Crypto Hacks in 2023"

    According to security researchers at TRM Labs, North Korea has stolen around $200 million in cryptocurrencies across 30 hacks so far in 2023, less than in 2022 but still a sum "10 times larger than attacks by other actors." The researchers noted that although this year has witnessed a considerable downturn in crypto hacks, largely attributable to the decrease in digital asset prices and the ongoing bear market, many cybercriminal groups remain undeterred. North Korean state-affiliated hacking groups were one of the most prolific actors in 2022, a record-breaking year for hacks, with nearly $4 billion stolen. In June, the Wall Street Journal reported the nation had netted more than $3 billion over the last five years, with stolen digital currency funding about 50% of the country's ballistic missile program. The researchers at TRM Labs puts that figure at $2 billion. U.S. officials say the North Korean government relies on a workforce of thousands of IT workers operating worldwide, including in China and Russia, earning as much as $300,000 a year. Officials noted that the operations also rely on "front people" who will apply for jobs at crypto firms and then make small changes to products to allow them to be hacked or slip malicious code to employees at targeted companies. The researchers at TRM Labs stated that although the proceeds from North Korean crypto hacks are down around 75% so far in 2023 compared with last year, the country is still responsible for over 20% of all crypto stolen so far this year. The most lucrative hack in 2023 targeted a non-custodial wallet provider called Atomic Wallet.

    Forune reports: "North Korean Cybercriminals Have Already Stolen $200 Million in Crypto Hacks in 2023"

  • news

    Visible to the public "Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days"

    The National Credit Union Administration (NCUA) recently announced that it is updating its cyberattack reporting rules, requiring all federally insured credit unions to report incidents within 72 hours of discovery. The new policy, NCUA announced, comes into effect on September 1 and will cover all incidents that impact information systems or the integrity, confidentiality, or availability of data on those systems. NCUA defines reportable incidents as those leading to network or system compromise following unauthorized access to or exposure of sensitive information or to the disruption of services or operational systems. The organization noted that incidents involving unauthorized tampering with information systems or erroneous exposure of sensitive data are also reportable. NCUA stated that credit unions will continue to rely on the previous reporting framework for incidents that do not trigger reporting under the new regulation but involve unauthorized access to user information.

    SecurityWeek reports: "Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days"

  • news

    Visible to the public "Down the Tubes: Common PVC Pipes Can Hack Voice Identification Systems"

    Researchers are trying to keep up with hackers and prevent data theft. Some standard tools include multi-factor authentication (MFA) systems, fingerprint technology, and retinal scans. Automatic speaker identification, which uses a person's voice as a passcode, is a type of security system growing in popularity. These systems, already in place for phone banking and other applications, effectively detect digitally-manipulated attempts to fake a user's voice. However, digital security engineers at the University of Wisconsin-Madison have discovered that these systems are not as foolproof in the face of an innovative analog attack. They found that speaking through customized PVC pipes, commonly found in hardware stores, can trick Machine Learning (ML) algorithms supporting automatic speaker identification systems. This article continues to discuss the method of defeating automatic speaker identification systems using the type of PVC pipe found at any hardware store.

    The University of Wisconsin-Madison reports "Down the Tubes: Common PVC Pipes Can Hack Voice Identification Systems"

  • news

    Visible to the public "Alarming Lack of Cybersecurity Practices on World's Most Popular Websites"

    The Cybernews research team has explored an issue that developers often overlook: HTTP security headers. They analyzed the top 100 most-visited websites, such as PayPal, Wikipedia, and AliExpress. HTTP security headers provide instructions on how the browser should interact with the webpage. They help protect websites from attacks, such as clickjacking, and ensure secure connections. HTTP security headers are effective firewalls that can prevent the exploitation of many common vulnerabilities. These security headers are especially useful for client-side attacks, which aim to exploit security flaws on the user's device in order to gain unauthorized access, steal information, and perform other malicious activities. This article continues to discuss popular websites lacking security headers.

    Cybernews reports "Alarming Lack of Cybersecurity Practices on World's Most Popular Websites"

  • news

    Visible to the public "Play Ransomware Using MSPs and N-Days to Attack"

    Adlumin security researchers are warning of the Play ransomware group targeting security Managed Service Providers (MSPs) to gain initial access and exploit up to five-year-old security appliance vulnerabilities. According to Kevin O'Connor, director of threat research at Adlumin, it is a clever tactic to attack companies via their security vendor. Cyber defenders find it difficult to detect the attack because it initially masquerades as legitimate administrative access and grants attackers unrestricted access to the target's network and Infomation Technology (IT) assets. According to the security firm, the gang also uses intermittent encryption to avoid triggering defenses that check for entire file modifications. The latest campaign targets the financial, software, legal, and logistics industries in the US, Australia, the UK, and Italy. The Play ransomware group is responsible for cyberattacks on the city of Oakland, the Judiciary of Cordoba in Argentina, and more. TrendMicro reported that the group's activities are similar to those of the ransomware groups Hive and Nokoyawa, indicating a possible affiliation. This article continues to discuss the Play ransomware group's history and most recent campaign.

    BankInfoSecurity reports "Play Ransomware Using MSPs and N-Days to Attack"

  • news

    Visible to the public "Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"

    The U.S. Department of Health and Human Services recently announced that it is investigating Dallas' ransomware attack from earlier this year. The city reported the data breach to the agency earlier this month, saying personal information from 30,253 people through Dallas' self-insured group health plans were exposed during the breach, which started April 7 but wasn't detected by the city until May 3. The number of individuals affected recently reported is higher than the 26,212 people the city reported earlier this month as being affected by the cyberattack to the state attorney general's office. City officials still haven't publicly disclosed all the departments where information was possibly stolen and several other key details of the data breach, such as how it happened. The city has sent around 27,000 letters to mostly employees, retirees, and their relatives giving notice that their names, home addresses, social security numbers, date of birth, medical diagnoses, and other information were exposed to hackers, and offering two years of free credit monitoring and identity theft insurance.

    Dallas Morning News reports: "Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"

  • news

    Visible to the public "GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"

    A new cybersecurity technology that relies on the unique digital fingerprint of a semiconductor chip could help defend the equipment of electrical utilities from malicious attacks in which software updates are exploited on devices controlling critical infrastructure. The GridTrust project, successfully tested in a US municipal power system substation, combines the digital fingerprint with cryptographic technology to enhance security for utilities and other critical industrial systems that must update control device software or firmware. The project was led by researchers at the Georgia Institute of Technology (Georgia Tech) in collaboration with the City of Marietta, Georgia. It was supported by the US Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER). Researchers from Sandia National Laboratories and Protect Our Power, a security-focused not-for-profit organization, also contributed to the project. This article continues to discuss the GridTrust project.

    Georgia Tech reports "GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"

  • news

    Visible to the public "New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities"

    A new, financially motivated operation named LABRAT has been exploiting a now-patched critical vulnerability in GitLab to conduct cryptojacking and proxyjacking. According to Sysdig, the attacker used undetected signature-based tools, sophisticated cross-platform malware, command-and-control (C2) tools that bypass firewalls, and kernel-based rootkits to hide their presence. In addition, the attacker used TryCloudflare to cover their C2 network. Proxyjacking enables the attacker to rent out the compromised host to a proxy network, monetizing the unused bandwidth. In contrast, cryptojacking refers to abusing system resources for cryptocurrency mining. A notable aspect of the campaign is the use of compiled binaries written in Go and .NET to avoid detection, with LABRAT also providing backdoor access to infected systems. This may pave the way for a follow-on attack, data theft, or ransomware. This article continues to discuss the LABRAT campaign.

    THN reports "New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities"

  • news

    Visible to the public "Massive 400,000 Proxy Botnet Built With Stealthy Malware Infections"

    Researchers have discovered an extensive campaign that distributed proxy server apps to at least 400,000 Windows systems. The devices function as residential exit nodes without the users' permission. A company is charging for the proxy traffic running through the systems. Residential proxies are advantageous to cybercriminals because they facilitate the deployment of massive credential stuffing attacks from new IP addresses. Additionally, they serve legitimate functions such as ad verification, data scraping, website testing, and privacy-enhancing rerouting. Some proxy companies sell access to residential proxies and offer monetary incentives to users who agree to share their bandwidth. This article continues to discuss findings and observations regarding the 400,000 proxy botnet.

    Bleeping Computer reports "Massive 400,000 Proxy Botnet Built With Stealthy Malware Infections"

  • news

    Visible to the public "Passwordless Is More Than a Buzzword Among Cybersecurity Pros"

    Even though cybersecurity strategies are moving toward a passwordless future, password security remains critical. Fifty-four percent of the 100 Black Hat USA 2023 attendees surveyed by Delinea deemed passwordless a viable concept, while 79 percent agreed that passwords are evolving or becoming obsolete. When asked how they protect their passwords, most said they use an additional authentication method to protect their credentials and identity. Seventy-three percent of respondents use some form of multi-factor authentication (MFA), 57 percent specifically reported using an authenticator app, and 40 percent use biometrics. Fifty-two percent use a password manager, while 34 percent use a Privileged Access Management (PAM) solution to securely store credentials. Twenty-one percent reported using passkeys in place of or in addition to passwords. This article continues to discuss the concept and perceptions of passwordless security.

    Help Net Security reports "Passwordless Is More Than a Buzzword Among Cybersecurity Pros"

  • news

    Visible to the public "PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks"

    According to Aqua Nautilus researchers, Microsoft's PowerShell Gallery poses a software supply chain risk due to its relatively weak protection against attackers uploading malicious packages to the online repository. Recent testing of the repository's policies regarding package names and owners revealed that a threat actor could easily exploit them to spoof legitimate packages and make it difficult for users to identify a true package owner. This article continues to discuss the software supply chain risk posed by Microsoft's PowerShell Gallery.

    Dark Reading reports "PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks"

  • news

    Visible to the public "AnonFiles Shuts Down After Massive User Abuse"

    A popular anonymous file sharing service used by security researchers and threat actors has recently closed down, citing "extreme volumes" of users abusing it. AnonFiles was a going concern for two years, enabling anyone to share files without fear of being tracked online. It became a popular way for malicious hackers to share stolen data such as logins and personally identifiable information (PII). The company stated, "After trying endlessly for two years to run a file sharing site with user anonymity, we have been tired of handling the extreme volumes of people abusing it and the headaches it has created for us. The admins noted that they banned file names and usage patterns connected to "abusive material" to the point where they didn't care even about accidentally deleting thousands of false positives in the process. The site admins are now trying to find a buyer for the domain.

    Infosecurity reports: "AnonFiles Shuts Down After Massive User Abuse"

  • news

    Visible to the public "'Distilling' Outdated Software Could Save Defense Dept. Millions in Time and Money"

    Many highly sophisticated systems, such as those that power drones, fighter jets, and even secure authentication programs, are custom software developed at great expense. It is not as simple as downloading the latest software patch and clicking "Install" to update them. It often requires an expensive and time-consuming rewrite or reverse engineering process. Therefore, Georgia Tech engineers, computer scientists, and cybersecurity researchers are working to accelerate the process with a Defense Advanced Research Projects Agency (DARPA)-funded project. Their goal is to unpack these legacy systems, incorporate updates, and redeploy them in weeks or months as opposed to years. About halfway through the five-year project, the team has a prototype pipeline that automates significant portions of the process using Georgia Tech-developed software analysis techniques. This article continues to discuss the DARPA-funded effort to update critical defense software.

    Georgia Tech reports "'Distilling' Outdated Software Could Save Defense Dept. Millions in Time and Money"

  • news

    Visible to the public "Think Twice Before Accepting Notifications on Chrome: Threats on the Rise"

    Many websites request permission to display notifications upon arrival. Many users unknowingly expose themselves to risk because they are accustomed to agreeing to generic prompts. Oren Koren, co-founder of the cybersecurity company Veriti, warns that sometimes a single permission is enough to white-list malware delivery. A user visits a website where the browser pops up an alert asking to show notifications for the website. If the user agrees, this website will push notifications to any browser tabs and even among system notifications. Similar to operating system notifications, these notifications appear on the main computer or phone screen. This can be an easy and effective method to deliver malware. It is embedded in the user profile connected to the browser. This article continues to discuss websites exploiting push notification functionality to serve ads, malware, or phish users' credentials.

    Cybernews reports "Think Twice Before Accepting Notifications on Chrome: Threats on the Rise"

  • news

    Visible to the public "Jefferson Cherry Hill Warns of Possible Data Breach. What Info May Have Been Exposed?"

    A missing piece of electronic equipment at Jefferson Health's hospital in Cherry Hill may have compromised the personal information of some of its patients, the health care provider recently revealed. Jefferson Health said it began mailing letters Tuesday to alert patients whose information may have been involved in a potential breach it describes as a "recent privacy incident." According to the hospital, the possible privacy breach involved a backup DEXA scan drive that contained partial information about patients. The hospital did not provide the number of patients that may have been impacted there but said the potential breach was recognized by a maintenance technician working on the machine. Jefferson said the information on the drive could be viewable and would include names, dates of birth, medical record numbers, the dates of studies, and, in some cases, mailing addresses. However, the hospital noted that other sensitive patient information, such as Social Security numbers, driver's licenses, phone numbers, and insurance numbers, are only viewable with the appropriate credentials, exact system software, and additional technology.

    Courier Post reports: "Jefferson Cherry Hill Warns of Possible Data Breach. What Info May Have Been Exposed?"

  • news

    Visible to the public "CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan"

    As part of its 2023 Planning Agenda, the US Cybersecurity and Infrastructure Security Agency (CISA) has released the Cyber Defense Plan for Remote Monitoring and Management (RMM), the first proactive plan developed by industry and government partners through the Joint Cyber Defense Collaborative (JCDC). This plan provides a roadmap for improving the security and resilience of the RMM ecosystem, as well as advancing efforts in the National Cyber Strategy to scale public-private collaboration and the CISA Cybersecurity Strategic Plan to drive the adoption of the most effective security measures. Organizations use RMM products to gain efficiency and benefit from scalable services. However, adversaries are increasingly targeting these benefits to compromise large numbers of downstream customer organizations. By focusing on RMM products, threat actors attempt to dodge detection and maintain persistent access, also known as "living off the land." This article continues to discuss the Cyber Defense Plan for RMM.

    CISA reports "CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan"

  • news

    Visible to the public "Web App Warning: 74% Of Apps With PII Are Vulnerable to a 'Major Exploit'"

    An analysis of 3.5 million business assets revealed that most Internet-exposed web apps containing Personal Identifiable Information (PII) are vulnerable to cyberattacks. Hackers use PII for financial, credential, and phishing-related attacks. Seventy-four percent of the web apps the security company CyCognito examined contain PII vulnerable to at least one known major exploit, such as Apache Superset, Papercut, or MOVEit. The report discovered that 11 percent of vulnerable assets had multiple "easily exploitable" flaws, including misconfiguration, lack of secure HTTPS encryption, and the absence of a Web Application Firewall (WAF). According to the report, the average enterprise has over 12,000 web apps, of which at least 30 percent, or more than 3,000 assets, contain at least one exploitable or high-risk vulnerability. This article continues to discuss key findings from CyCognito's analysis.

    SC Magazine reports "Web App Warning: 74% Of Apps With PII Are Vulnerable to a 'Major Exploit'"

  • news

    Visible to the public "A Third of UK University Students Targeted By Fraud"

    Security researchers at NatWest discovered that one in three students at British universities encountered fraud attempts online last year. The researchers polled over 3000 UK university students from 63 towns and cities back in May. The most common fraud attempts the researchers came across over the period were delivery scams, which 14% of respondents said they'd seen. The researchers noted that these are effectively phishing emails impersonating a well-known courier brand. They claim the recipient has a parcel waiting but needs to click through and enter their personal details, sometimes including financial information, to reschedule the delivery. The researchers stated that social media and HMRC tax scams were also frequently encountered by respondents. However, fraud relating to high street banks appeared to drop from 2022 figures, hitting just 10% of those polled for the study. The researchers said women were "slightly more likely" to have encountered a scam in the past 12 months and were over twice as likely to lose money than men. The average amount lost by victims of fraud was around $102. Students living in Bournemouth were most likely to have been hit by scams, with 44% of respondents living in the south coast city saying they had encountered fraud over the previous year. Next came Edinburgh and Oxford. Students in Bristol and Leicester were least likely to be on the receiving end of a fraud attempt (25%).

    Infosecurity reports: "A Third of UK University Students Targeted By Fraud"

  • news

    Visible to the public "DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities"

    OpenAI, Google, Meta, and other companies tested their Large Language Models (LLMs) at the DEF CON hacker conference. Results from the event have provided the White House Office of Science and Technology Policy and the Congressional AI Caucus with a new corpus of information. The Generative Red Team Challenge, organized by AI Village, SeedAI, and Humane Intelligence, provides greater insight into the potential misuse of generative Artificial Intelligence (AI) and what methods could secure it. During the challenge, hackers were tasked with forcing generative AI to produce personal or harmful information, contrary to its intended function. The AI Village team is still analyzing the event's data and expects to present it in September 2023. This article continues to discuss the Generative Red Team Challenge influencing AI security policy, the vulnerabilities LLMs are likely to have, and how to prevent these vulnerabilities.

    TechRepublic reports "DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities"

  • news

    Visible to the public "Ransomware Hit Disrupts Real Estate Property Listings in US"

    A ransomware attack has disrupted property listings across the US. Real estate agents lost the ability to list or update property information due to an attack on the California-based data services company Rapattoni, which hosts Multiple Listing Services (MLS). Regional MLS databases are used by the real estate industry so that brokers can share information. This information powers listing websites and enables cooperating brokers to market one another's properties. Many regional MLS providers rely on Rapattoni's services to identify new properties on the market, update home listings, connect buyers and sellers to facilitate offers, track commissions for listing agents, and more. This article continues to discuss the impact of the cyberattack on the Rapattoni-hosted MLS.

    BankInfoSecurity reports "Ransomware Hit Disrupts Real Estate Property Listings in US"

  • news

    Visible to the public "Chrome 116 Patches 26 Vulnerabilities"

    Google recently announced the release of Chrome 116 to the stable channel with patches for 26 vulnerabilities, including 21 reported by external researchers. Of the externally reported bugs, eight have a severity rating of "high," with most of them being memory safety issues. Based on the bug bounty reward paid out, the most important of these is CVE-2023-2312, a use-after-free flaw in the Offline component. Google noted that the reporting researcher was awarded a $30,000 bounty for the finding. Next in line is CVE-2023-4349, a use-after-free issue in Device Trust Connectors, followed by an inappropriate implementation in Fullscreen (CVE-2023-4350), and a use-after-free bug in Network (CVE-2023-4351), for which Google paid out bounties of $5,000, $3,000, and $2,000, respectively. Google noted that the remaining four high-severity vulnerabilities that Chrome 116 resolves include a type confusion flaw in the V8 JavaScript engine, a heap buffer overflow bug in ANGLE, another in Skia, and an out-of-bounds memory access issue in the V8 engine. These issues were reported by researchers at Google Project Zero and Microsoft Vulnerability Research, and, per Google's policy, no bug bounty reward will be issued for them. Google stated that all the remaining externally-reported vulnerabilities addressed in Chrome 116 are medium-severity: six inappropriate implementation bugs, three use-after-free issues, two insufficient policy enforcement flaws, one insufficient validation of untrusted input, and one heap buffer overflow vulnerability. Overall, Google gave the reporting researchers $63,000 in bug bounty rewards. The internet giant does not mention any of these vulnerabilities being exploited in attacks. The latest Chrome iteration is rolling out as version 116.0.5845.96 for Mac and Linux and as versions 116.0.5845.96/.97 for Windows.

    SecurityWeek reports: "Chrome 116 Patches 26 Vulnerabilities"

  • news

    Visible to the public "Monti Ransomware Targets Legal and Gov't Entities With New Linux-Based Variant"

    According to new research, the Monti hacker group appears to have reemerged after a two-month hiatus, claiming to target legal and government entities with a new Linux-based ransomware variant. Monti was discovered in June 2022, following the infamous Conti ransomware group ceasing operations. The hackers imitated their predecessors by using a similar name, copying Conti's attack methods, and using Conti's leaked source code to create tools. However, according to Allan Liska, an expert on ransomware at Recorded Future, the group behind the Monti ransomware seems to be relatively inexperienced. According to Trend Micro, at least 13 apparent victims from the legal, financial, and healthcare sectors have been listed on Monti's leak site since March. Liska noted that their victims have not been widespread, but the group appears to have struck enough to likely reinvest a portion of their ransom payments in developing new and improved code. This article continues to discuss the reemergence of the Monti hacker gang with a new Linux-based variant.

    The Record reports "Monti Ransomware Targets Legal and Gov't Entities With New Linux-Based Variant"

  • news

    Visible to the public "Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations"

    Multiple critical security vulnerabilities have been discovered in Ivanti Avalanche, an enterprise mobile device management solution used by 30,000 organizations. Ivanti Avalanche WLAvanacheServer.exe v6.4.0.0 contains the vulnerabilities, collectively tracked as CVE-2023-32560, with a CVSS score of 9.8. According to the cybersecurity company Tenable, they are stack-based buffer overflows. Tenable said the flaws stem from buffer overflows caused by processing certain data types. An unauthenticated remote attacker could specify a long hex string or long type 9 item to overflow the buffer. Exploiting both issues enables a remote adversary to achieve code execution or a system crash. This article continues to discuss the security flaws found in Ivanti Avalanche.

    THN reports "Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations"