FreshRSS

πŸ”’
☐ β˜† βœ‡ The first stop for security news | Threatpost

Ransomware Attacks are on the Rise

By Nate Nelson β€” August 26th 2022 at 16:44
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

By Nate Nelson β€” August 25th 2022 at 18:47
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Firewall Bug Under Active Attack Triggers CISA Warning

By Threatpost β€” August 23rd 2022 at 13:19
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Fake Reservation Links Prey on Weary Travelers

By Nate Nelson β€” August 22nd 2022 at 13:59
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
☐ β˜† βœ‡ The first stop for security news | Threatpost

iPhone Users Urged to Update to Patch 2 Zero-Days

By Elizabeth Montalbano β€” August 19th 2022 at 15:25
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Patches Chrome’s Fifth Zero-Day of the Year

By Elizabeth Montalbano β€” August 18th 2022 at 14:31
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

U.K. Water Supplier Hit with Clop Ransomware Attack

By Elizabeth Montalbano β€” August 16th 2022 at 14:30
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Xiaomi Phone Bug Allowed Payment Forgery

By Nate Nelson β€” August 16th 2022 at 12:26
Mobile transactions could’ve been disabled, created and signed by attackers.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Black Hat and DEF CON Roundup

By Threatpost β€” August 15th 2022 at 13:56
β€˜Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics

By Elizabeth Montalbano β€” August 12th 2022 at 18:20
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Microsoft Patches β€˜Dogwalk’ Zero-Day and 17 Critical Flaws

By Threatpost β€” August 10th 2022 at 12:48
August Patch Tuesday tackles 121 CVEs, 17 critical bugs and one zero-day bug exploited in the wild.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Phishers Swim Around 2FA in Coinbase Account Heists

By Elizabeth Montalbano β€” August 8th 2022 at 15:26
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Open Redirect Flaw Snags Amex, Snapchat User Data

By Elizabeth Montalbano β€” August 5th 2022 at 13:17
Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.
☐ β˜† βœ‡ The first stop for security news | Threatpost

VMWare Urges Users to Patch Critical Authentication Bypass Bug

By Elizabeth Montalbano β€” August 3rd 2022 at 15:23
Vulnerabilityβ€”for which a proof-of-concept is forthcomingβ€”is one of a string of flaws the company fixed that could lead to an attack chain.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Universities Put Email Users at Cyber Risk

By Elizabeth Montalbano β€” August 2nd 2022 at 23:02
DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protections to prevent domain spoofing and lack protections to block fraudulent emails.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Securing Your Move to the Hybrid Cloud

By Infosec Contributor β€” August 1st 2022 at 13:29
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Malicious Npm Packages Tapped Again to Target Discord Users

By Elizabeth Montalbano β€” July 29th 2022 at 15:07
Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

By Elizabeth Montalbano β€” July 28th 2022 at 17:24
Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.
☐ β˜† βœ‡ The first stop for security news | Threatpost

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

By Sponsored Content β€” July 26th 2022 at 12:38
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. This is a dangerous warning that the possibility of a sophisticated DDoS attack and a prolonged service outage will prevent businesses from growing.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

By Elizabeth Montalbano β€” July 20th 2022 at 12:14
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Authentication Risks Discovered in Okta Platform

By Nate Nelson β€” July 19th 2022 at 15:33
Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Boots Multiple Malware-laced Android Apps from Marketplace

By Elizabeth Montalbano β€” July 18th 2022 at 12:32
Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.
☐ β˜† βœ‡ The first stop for security news | Threatpost

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

By Threatpost β€” July 18th 2022 at 12:19
Feds urge U.S. agencies to patch a Microsoft July Patch Tuesday 2022 bug that is being exploited in the wild by August 2.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Large-Scale Phishing Campaign Bypasses MFA

By Elizabeth Montalbano β€” July 13th 2022 at 11:45
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
☐ β˜† βœ‡ The first stop for security news | Threatpost

β€˜Callback’ Phishing Campaign Impersonates Security Firms

By Elizabeth Montalbano β€” July 12th 2022 at 11:43
Victims instructed to make a phone call that will direct them to a link for downloading malware.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Hack Allows Drone Takeover Via β€˜ExpressLRS’ Protocol

By Nate Nelson β€” July 7th 2022 at 11:31
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Latest Cyberattack Against Iran Part of Ongoing Campaign

By Nate Nelson β€” July 5th 2022 at 12:35
Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Patches Actively Exploited Chrome Bug

By Elizabeth Montalbano β€” July 5th 2022 at 11:54
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.
☐ β˜† βœ‡ The first stop for security news | Threatpost

ZuoRAT Can Take Over Widely Used SOHO Routers

By Elizabeth Montalbano β€” June 30th 2022 at 17:20
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Leaky Access Tokens Exposed Amazon Photos of Users

By Nate Nelson β€” June 29th 2022 at 20:18
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

By Sagar Tiwari β€” June 29th 2022 at 13:00
Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Mitel VoIP Bug Exploited in Ransomware Attacks

By Sagar Tiwari β€” June 28th 2022 at 12:42
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

β€˜Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

By Elizabeth Montalbano β€” June 28th 2022 at 12:17
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

By Sagar Tiwari β€” June 28th 2022 at 11:57
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Warns Spyware Being Deployed Against Android, iOS Users

By Elizabeth Montalbano β€” June 24th 2022 at 11:02
The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano β€” June 23rd 2022 at 12:21
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

By Elizabeth Montalbano β€” June 22nd 2022 at 12:34
Culture of β€˜insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Kazakh Govt. Used Spyware Against Protesters

By Nate Nelson β€” June 21st 2022 at 12:48
Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders.
☐ β˜† βœ‡ The first stop for security news | Threatpost

China-linked APT Flew Under Radar for Decade

By Nate Nelson β€” June 17th 2022 at 13:34
Evidence suggests that a just-discovered APT has been active since 2013.
☐ β˜† βœ‡ The first stop for security news | Threatpost

U.S. Water Utilities Prime Cyberattack Target, Experts

By Nate Nelson β€” June 10th 2022 at 13:27
Environmentalists and policymakers warn water treatment plants are ripe for attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Follina Exploited by State-Sponsored Hackers

By Nate Nelson β€” June 7th 2022 at 12:45
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw

By Elizabeth Montalbano β€” June 7th 2022 at 11:21
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
❌