FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

How the Most Popular Cars in the US Track Drivers

By Matt Burgess
Vehicles from Toyota, Honda, Ford, and more can collect huge volumes of data. Here’s what the companies can access.

Going on vacation soon? Stay one step ahead of travel scams

By Phil Muncaster

From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels

The post Going on vacation soon? Stay one step ahead of travel scams appeared first on WeLiveSecurity

New Condi Malware Hijacking TP-Link Wi-Fi Routers for DDoS Botnet Attacks

By Ravie Lakshmanan
A new malware calledΒ CondiΒ has been observed exploiting a security vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers to rope the devices into a distributed denial-of-service (DDoS) botnet. Fortinet FortiGuard LabsΒ saidΒ the campaign has ramped up since the end of May 2023. Condi is the work of a threat actor who goes by the online alias zxcr9999 on Telegram and runs a Telegram channel

Alert! Hackers Exploiting Critical Vulnerability in VMware's Aria Operations Networks

By Ravie Lakshmanan
VMware has flagged that a recently patched critical command injection vulnerability in Aria Operations for Networks (formerly vRealize Network Insight) has come under active exploitation in the wild. The flaw, tracked asΒ CVE-2023-20887, couldΒ allowΒ a malicious actor with network access to the product to perform a command injection attack, resulting in remote code execution. It impacts VMware

Oreo cookie maker says crooks gobbled up staff info

50K-plus employees' personal info swiped after law firm rolled

Mondelez International has warned 51,000 of its past and present employees that their personal information has been stolen from a law firm hired by the Oreo and Ritz cracker giant.…

  • June 20th 2023 at 21:01

Researchers Expose New Severe Flaws in Wago and Schneider Electric OT Products

By Ravie Lakshmanan
Three security vulnerabilities have been disclosed in operational technology (OT) products from Wago and Schneider Electric. The flaws, per Forescout, are part of aΒ broaderΒ setΒ ofΒ shortcomingsΒ collectively calledΒ OT:ICEFALL, which now comprises a total of 61 issues spanning 13 different vendors. "OT:ICEFALL demonstrates the need for tighter scrutiny of, and improvements to, processes related to

Reddit confirms BlackCat gang pinched some data

Crooks demand $4.5m to keep '80GB' of corp info private – and no API price hikes

Reddit this week confirmed ransomware gang BlackCat, aka AlphaV, broke into its corporate systems in February.…

  • June 20th 2023 at 18:34

ASUS warns router customers: Patch now, or block all inbound requests

By Paul Ducklin
"Do as we say, not as we do!" - The patches took ages to come out, but don't let that lure you into taking ages to install them.

Zyxel Releases Urgent Security Updates for Critical Vulnerability in NAS Devices

By Ravie Lakshmanan
Zyxel has rolled out security updates to address a critical security flaw in its network-attached storage (NAS) devices that could result in the execution of arbitrary commands on affected systems. Tracked asΒ CVE-2023-27992Β (CVSS score: 9.8), the issue has been described as a pre-authentication command injection vulnerability. "The pre-authentication command injection vulnerability in some Zyxel

SaaS in the Real World: How Global Food Chains Can Secure Their Digital Dish

By The Hacker News
The Quick Serve Restaurant (QSR) industry is built on consistency and shared resources. National chains like McDonald's and regional ones like Cracker Barrel grow faster by reusing the same business model, decor, and menu, with little change from one location to the next.Β  QSR technology stacks mirror the consistency of the front end of each store. Despite each franchise being independently

Experts Uncover Year-Long Cyber Attack on IT Firm Utilizing Custom Malware RDStealer

By Ravie Lakshmanan
A highly targeted cyber attack against an East Asian IT company involved the deployment of a custom malware written in Golang calledΒ RDStealer. "The operation was active for more than a year with the end goal of compromising credentials and data exfiltration," Bitdefender security researcher Victor VrabieΒ saidΒ in a technical report shared with The Hacker News. Evidence gathered by the Romanian

Over 100,000 compromised ChatGPT accounts found for sale on dark web

Cybercrooks hoping users have whispered employer secrets to chatbot

UPDATED Singapore-based threat intelligence outfit Group-IB has found ChatGPT credentials in more than 100,000 stealer logs traded on the dark web in the past year.…

  • June 20th 2023 at 10:08

Passwords out, passkeys in: are you ready to make the switch?

By Phil Muncaster

With passkeys poised for prime time, passwords seem passΓ©. What are the main benefits of ditching one in favor of the other?

The post Passwords out, passkeys in: are you ready to make the switch? appeared first on WeLiveSecurity

ASUS Releases Patches to Fix Critical Security Bugs Impacting Multiple Router Models

By Ravie Lakshmanan
Taiwanese company ASUS on MondayΒ released firmware updatesΒ to address, among other issues, nine security bugs impacting a wide range of router models. Of the nine security flaws, two are rated Critical and six are rated High in severity. One vulnerability is currently awaiting analysis. The list of impacted products are GT6, GT-AXE16000, GT-AX11000 PRO, GT-AXE11000, GT-AX6000, GT-AX11000,

Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces

By Ravie Lakshmanan
Over 101,100 compromised OpenAI ChatGPT account credentials have found their way on illicit dark web marketplaces between June 2022 and May 2023, with India alone accounting for 12,632 stolen credentials. The credentials were discovered within information stealer logs made available for sale on the cybercrime underground, Group-IB said in a report shared with The Hacker News. "The number of

Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign

By Ravie Lakshmanan
Individuals in the Pakistan region have been targeted using two rogue Android apps available on the Google Play Store as part of a new targeted campaign. Cybersecurity firm Cyfirma attributed the campaign with moderate confidence to a threat actor known asΒ DoNot Team, which is also tracked as APT-C-35 and Viceroy Tiger. The espionage activity involves duping Android smartphone owners into

Data leak at major law firm sets Australia's government and elites scrambling

BlackCat attack sparks injunction preventing coverage of purloined docs

An infosec incident at a major Australian law firm has sparked fear among the nation's governments, banks and businesses – and a free speech debate.…

  • June 20th 2023 at 05:04

Megaupload duo will go to prison at last, but Kim Dotcom fights on…

By Paul Ducklin
One, sadly, has died, and two are heading to prison, but for Kim Dotcom, the saga goes on...

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions

By Ravie Lakshmanan
A new information-stealing malware calledΒ Mystic StealerΒ has been found to steal data from about 40 different web browsers and over 70 web browser extensions. First advertised on April 25, 2023, for $150 per month, the malware also targets cryptocurrency wallets, Steam, and Telegram, and employs extensive mechanisms to resist analysis. "The code is heavily obfuscated making use of polymorphic

Guess what happened to this US agency using outdated software?

Also: Hackers target security researchers, MaaS model flourishing, and this week's vulnerabilities

Infosec in brief Remember earlier this year, when we found out that a bunch of baddies including at least one nation-state group broke into a US federal government agency's Microsoft Internet Information Services (IIS) web server by exploiting a critical three-year-old Telerik bug to achieve remote code execution?…

  • June 19th 2023 at 14:32

Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems

By Ravie Lakshmanan
Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. "As of now, these samples are still largely undetected and very little information is available about any of them," Bitdefender researchers Andrei Lapusneanu and Bogdan BotezatuΒ saidΒ in a preliminary report published on Friday. The Romanian firm's

Introducing AI-guided Remediation for IaC Security / KICS

By The Hacker News
While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices, the speed and flexibility that IaC provides can also introduce the potential for misconfigurations and security vulnerabilities.Β  IaC allows organizations to define and manage their infrastructure using machine-readable configuration files, which are

State-Backed Hackers Employ Advanced Methods to Target Middle Eastern and African Governments

By Ravie Lakshmanan
Governmental entities in the Middle East and Africa have been at the receiving end of sustained cyber-espionage attacks that leverage never-before-seen and rare credential theft and Exchange email exfiltration techniques. "The main goal of the attacks was to obtain highly confidential and sensitive information, specifically related to politicians, military activities, and ministries of foreign

Outsource to infill on cyber security

Automating, simplifying, and calling in external help can increase the chances of blocking and mitigating attacks

Sponsored Feature Life is tougher than ever for security pros facing a rising tide of cyberattacks. And adversaries are becoming more adept than ever at using diverse methods and technologies to scale up assaults on their selected targets.…

  • June 19th 2023 at 08:35

With dead-time dump, Microsoft revealed DDoS as cause of recent cloud outages

Previous claims its own software updates were the issue remain almost, kinda, plausible

In the murky world of political and corporate spin, announcing bad news on Friday afternoon – a time when few media outlets are watching, and audiences are at a low ebb – is called "taking out the trash." And that’s what Microsoft appears to have done last Friday.…

  • June 19th 2023 at 00:32

How to create an hacking lab on apple silicon

By /u/XznX

Hi all,

Has anybody managed to create a functioning hacking lab on Apple silicon?

Im trying to create a hacking lab so I could practice hacking vulnhub machines.

To my understanding, there are 2 alternatives to Virtual Box: 1. Using parallels 2. Using UTM

I’m okay with buying these software, I just cant get them to work.

Things I’ve tried: 1. Following this tutorial:

https://patrick-rottlaender.medium.com/create-a-virtual-hacking-lab-on-apple-silicon-mac-a86d9b3b2e5f

I was able to create a kali vm with 2 network interfaces (one internal for contacting the target and one external for contacting the www) But when I follow the process of converting the .ova to .qcow2 and creating the machines, a lot of machines boot up with out a network interface (even though I have defined one) I will note that some machines work fine, making the problem harder to debug. (Ive tried deleting the network adapter and creating a new one, as well as changing the β€œhost only” to β€œbridged” and it didn’t work)

  1. Using parallels:

I was able to create a working kali vm but couldn’t find a guide that explains how to open vulnhub’s machines in parallel. (They are usually a .ova files or .vmdk)

My main question is if anyone was able to create a lab that works with vulnhub machines on apple silicon.

My side questions are: 1. Does anyone knows how to debug my problem with UTM? (That some machines don’t recognize the network adapter) 2. Has anyone know a guide that explains how to import vulnhub machines to parallels? 3. Is there a third alternative I’m missing?

Will appreciate any help, Thanks in advance!

submitted by /u/XznX
[link] [comments]

Humans Aren’t Mentally Ready for an AI-Saturated β€˜Post-Truth World’

By Thor Benson
The AI era promises a flood of disinformation, deepfakes, and hallucinated β€œfacts.” Psychologists are only beginning to grapple with the implications.

Weekly Update 352

By Troy Hunt
Weekly Update 352

Domain searches in HIBP - that's the story this week - and I'm grateful for all the feedback I've received. I've had a few messages in particular since this live stream where people gave me some really excellent feedback to the point where I've now got a much clearer plan in head as to what this will look like. I need to keep writing code, revising the draft blog post to announce it then sometime in hopefully about a month, push it all live. What I'm zero'ing in on now is a free tier that covers most domains, a very low entry fee for almost every personal or small business case you can think of and then a few tiers above that to cover the rest. Do keep that feedback coming, it's all read, it's all taken onboard and I'm responding to absolutely everyone that sends it to me. If you're one of those people, thank you 😊

Weekly Update 352
Weekly Update 352
Weekly Update 352
Weekly Update 352

References

  1. The kitchen renovation thread marches on (hopefully during this coming week we'll get it all done other than the stone tops)
  2. My Azure API Management woes have been well and truly solved! (just added those last stats I mentioned to the tweet thread, still don't know why it's going so damn fast now πŸ€·β€β™‚οΈ)
  3. The Zacks breach is now in HIBP (disclosure took more effort than it should have, but we got there in the end)
  4. I pushed out a whole new domain search experience along with 5 announcements (the biggy is the impending charges for larger domains, do have a listen and provide your feedback if this feature is important to you)
  5. Sponsored by Kolide can get your cross-platform fleet to 100% compliance. It's Zero Trust for Okta. Want to see for yourself? Book a demo.

A Newly Named Group of GRU Hackers is Wreaking Havoc in Ukraine

By Andy Greenberg, Andrew Couts
Plus: The arrest of an alleged Lockbit ransomware hacker, the wild tale of a problematic FBI informant, and one of North Korea’s biggest crypto heists.

Third MOVEit bug fixed a day after PoC exploit made public

Millions of people's personal info swiped, Clop leaks begin with 'Shell's stolen data'

Progress Software on Friday issued a fix for a third critical bug in its MOVEit file transfer suite, a vulnerability that had just been disclosed the day earlier.…

  • June 16th 2023 at 23:05

Clop Hacking Rampage Hits US Agencies and Exposes Data of Millions

By Lily Hay Newman
The ransomware gang Clop exploited a vulnerability in a file transfer service. The flaw is now patched, but the damage is still coming into focus.

LockBit suspect's arrest sheds more light on 'trustworthy' gang

Plus: Accused is innocent until proven guilty, but is known to be an Apple fan

FBI agents have arrested a Russian man suspected of being part of the Lockbit ransomware gang. An unsealed complaint alleges the 20-year-old was an Apple fanboy, an online gambler, and scored 80 percent of at least one ransom payment given to the criminals.…

  • June 16th 2023 at 19:01

Is a RAT stealing your files? – Week in security with Tony Anscombe

By Editor

Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?

The post Is a RAT stealing your files? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

  • June 16th 2023 at 15:20

Capita faces first legal Letter of Claim over mega breach

Barings Law claims 250 people that 'suspect' data theft signed up to class action

Capita is facing its first legal claim over the high profile digital burglary in late March that exposed some customer data to intruders and will cost the outsourcing biz around Β£20 million ($26 million) to clean up.…

  • June 16th 2023 at 13:04
❌