FreshRSS

๐Ÿ”’
โ˜ โ˜† โœ‡ The Hacker News

Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam

By Newsroom โ€” May 19th 2024 at 09:46
The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering scam that laundered at least $73 million from victims through shell companies. The individuals, Daren Li, 41, and Yicheng Zhang, 38, were arrested in Atlanta and Los Angeles on April 12 and May 16, respectively. The foreign nationals have been "charged for leading a scheme
โ˜ โ˜† โœ‡ The Hacker News

Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

By Newsroom โ€” May 19th 2024 at 07:59
The threat actors behind the Windows-basedย Grandoreiroย banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The large-scale phishing attacks, likely facilitated by other cybercriminals via a malware-as-a-service (MaaS) model, target over 1,500 banks across the world, spanning more than 60 countries in Central and South
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] PopojiCMS 2.0.1 - Remote Command Execution (RCE)

May 19th 2024 at 00:00
PopojiCMS 2.0.1 - Remote Command Execution (RCE)
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] Backdrop CMS 1.27.1 - Remote Command Execution (RCE)

May 19th 2024 at 00:00
Backdrop CMS 1.27.1 - Remote Command Execution (RCE)
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] Apache OFBiz 18.12.12 - Directory Traversal

May 19th 2024 at 00:00
Apache OFBiz 18.12.12 - Directory Traversal
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] Wordpress Theme XStore 9.3.8 - SQLi

May 19th 2024 at 00:00
Wordpress Theme XStore 9.3.8 - SQLi
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] htmlLawed 1.2.5 - Remote Code Execution (RCE)

May 19th 2024 at 00:00
htmlLawed 1.2.5 - Remote Code Execution (RCE)
โ˜ โ˜† โœ‡ Exploit-DB Updates

[webapps] Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)

May 19th 2024 at 00:00
Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

RomHack CFP Closes May 31!

By /u/smaury โ€” May 18th 2024 at 19:07

Hey hackers! RomHack 2024 Call for Papers closes on May 31, if you plan to present your awesome research in Rome ๐Ÿ‡ฎ๐Ÿ‡น make sure to submit before that date!

See you in Rome ๐Ÿ•๐Ÿ๐Ÿท!

submitted by /u/smaury
[link] [comments]
โ˜ โ˜† โœ‡ The Register - Security

An attorney says she saw her library reading habits reflected in mobile ads. That's not supposed to happen

May 18th 2024 at 17:04

Follow us down this deep rabbit hole of privacy policy after privacy policy

Feature In April, attorney Christine Dudley was listening to a book on her iPhone while playing a game on her Android tablet when she started to see in-game ads that reflected the audiobooks she recently checked out of the San Francisco Public Library.โ€ฆ

โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

A Basic Guide to Discovering Attack Surface with Ghidra and GDB

By /u/cy1337 โ€” May 18th 2024 at 14:18

A walkthrough of using Ghidra to produce a GDB script for tracing function calls.

submitted by /u/cy1337
[link] [comments]
โ˜ โ˜† โœ‡ The Register - Security

Gawd, after that week, we wonder what's next for China and the Western world

May 18th 2024 at 12:35

For starters: Crypto, import tariffs, and Microsoft shipping out staff

Kettle It's been a fairly troubling week in terms of the relationship between China and the Western world.โ€ฆ

โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

Freeway for Network Pentesting

By /u/Material-Tonight8924 โ€” May 18th 2024 at 10:45

Hi, came here for some feedback and to share the tool with other red teamers.

Every opinion is very welcome.

The Freeway features: - Network monitor - Deauth attack - Beacon Flood - Packet Fuzzer - Network Audit - Channel Hopper

submitted by /u/Material-Tonight8924
[link] [comments]
โ˜ โ˜† โœ‡ WIRED

US Official Warns a Cell Network Flaw Is Being Exploited for Spying

By Andy Greenberg โ€” May 18th 2024 at 10:00
Plus: Three arrested in North Korean IT workers fraud ring, Tesla staffers shared videos from ownersโ€™ cars, and more.
โ˜ โ˜† โœ‡ The Register - Security

How two brothers allegedly swiped $25M in a 12-second Ethereum heist

May 18th 2024 at 06:29

Feds scoff at blockchain integrity while software bug said to have been at heart of the matter

The US Department of Justice has booked two brothers on allegations that they exploited open source software used in the Ethereum blockchain world to bag $25 million (ยฃ20 million).โ€ฆ

โ˜ โ˜† โœ‡ The Register - Security

Aussie cops probe MediSecure's 'large-scale ransomware data breach'

May 17th 2024 at 23:31

Throw another healthcare biz on the barby, mate

Australian prescriptions provider MediSecure is the latest healthcare org to fall victim to a ransomware attack, with crooks apparently stealing patients' personal and health data.โ€ฆ

โ˜ โ˜† โœ‡ The Register - Security

Three cuffed for 'helping North Koreans' secure remote IT jobs in America

May 17th 2024 at 18:34

Your local nail tech could be a secret agent for Kimโ€™s cunning plan

Three individuals accused of helping North Korea fund its weapons programs using US money are now in handcuffs.โ€ฆ

โ˜ โ˜† โœ‡ WeLiveSecurity

The who, where, and how of APT attacks โ€“ Week in security with Tony Anscombe

May 17th 2024 at 16:09
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape
โ˜ โ˜† โœ‡ Security Tool Files โ‰ˆ Packet Storm

Zeek 6.0.4

May 17th 2024 at 15:26
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6778-1

May 17th 2024 at 15:25
Ubuntu Security Notice 6778-1 - Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6776-1

May 17th 2024 at 15:24
Ubuntu Security Notice 6776-1 - Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6777-1

May 17th 2024 at 15:24
Ubuntu Security Notice 6777-1 - Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6774-1

May 17th 2024 at 15:23
Ubuntu Security Notice 6774-1 - Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service. Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida discovered that the Linux kernel mitigations for the initial Branch History Injection vulnerability were insufficient for Intel processors. A local attacker could potentially use this to expose sensitive information.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6775-1

May 17th 2024 at 15:23
Ubuntu Security Notice 6775-1 - Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Ubuntu Security Notice USN-6773-1

May 17th 2024 at 15:23
Ubuntu Security Notice 6773-1 - It was discovered that .NET did not properly handle memory in it's Double Parse routine. An attacker could possibly use this issue to achieve remote code execution. It was discovered that .NET did not properly handle the usage of a shared resource. An attacker could possibly use this to cause a dead-lock condition, resulting in a denial of service.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2889-03

May 17th 2024 at 15:20
Red Hat Security Advisory 2024-2889-03 - An update for gnutls is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include an information leakage vulnerability.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2890-03

May 17th 2024 at 15:20
Red Hat Security Advisory 2024-2890-03 - An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2891-03

May 17th 2024 at 15:20
Red Hat Security Advisory 2024-2891-03 - An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a denial of service vulnerability.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2888-03

May 17th 2024 at 15:18
Red Hat Security Advisory 2024-2888-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2886-03

May 17th 2024 at 15:18
Red Hat Security Advisory 2024-2886-03 - An update for firefox is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2887-03

May 17th 2024 at 15:18
Red Hat Security Advisory 2024-2887-03 - An update for firefox is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2882-03

May 17th 2024 at 15:17
Red Hat Security Advisory 2024-2882-03 - An update for firefox is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2883-03

May 17th 2024 at 15:17
Red Hat Security Advisory 2024-2883-03 - An update for firefox is now available for Red Hat Enterprise Linux 9. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2884-03

May 17th 2024 at 15:17
Red Hat Security Advisory 2024-2884-03 - An update for Firefox is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2885-03

May 17th 2024 at 15:17
Red Hat Security Advisory 2024-2885-03 - An update for firefox is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2881-03

May 17th 2024 at 15:16
Red Hat Security Advisory 2024-2881-03 - An update for firefox is now available for Red Hat Enterprise Linux 7. Issues addressed include bypass and use-after-free vulnerabilities.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2784-03

May 17th 2024 at 15:16
Red Hat Security Advisory 2024-2784-03 - Red Hat OpenShift Container Platform release 4.12.57 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a code execution vulnerability.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2834-03

May 17th 2024 at 15:16
Red Hat Security Advisory 2024-2834-03 - An update for Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available. The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products. Issues addressed include a server-side request forgery vulnerability.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2781-03

May 17th 2024 at 15:15
Red Hat Security Advisory 2024-2781-03 - Red Hat OpenShift Container Platform release 4.12.57 is now available with updates to packages and images that fix several bugs.
โ˜ โ˜† โœ‡ Advisory Files โ‰ˆ Packet Storm

Red Hat Security Advisory 2024-2782-03

May 17th 2024 at 15:15
Red Hat Security Advisory 2024-2782-03 - Red Hat OpenShift Container Platform release 4.12.57 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
โ˜ โ˜† โœ‡ The Hacker News

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

By Newsroom โ€” May 17th 2024 at 17:20
The cryptojacking group known asย Kinsingย has demonstrated an ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities to the exploit arsenal and expand its botnet. Theย findingsย come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining
โ˜ โ˜† โœ‡ The Register - Security

First LockBit, now BreachForums: Are cops winning the war or just a few battles?

May 17th 2024 at 11:37

TLDR: Peace in our time is really really hard

Interview On Wednesday the FBI and international cops celebrated yet another cybercrime takedown โ€“ of ransomware brokerage site BreachForums โ€“ just a week after doxing and imposing sanctions on the LockBit ransomware crew's kingpin, and two months after compromising the gang's website.โ€ฆ

โ˜ โ˜† โœ‡ The Hacker News

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

By The Hacker News โ€” May 17th 2024 at 11:29
A new report from XM Cyber has found โ€“ among other insights - aย dramaticย gap between where most organizations focus their security efforts, and where the most serious threatsย actuallyย reside. The new report, Navigating the Paths of Risk: The State of Exposure Management in 2024, is based on hundreds of thousands of attack path assessments conducted by theย XM Cyber
โ˜ โ˜† โœ‡ The Hacker News

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

By Newsroom โ€” May 17th 2024 at 11:20
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linkedย BlackTechย hacking group as part of a cyber espionage campaign targeting the Asia-Pacific region this year. "Deuterbear, while similar to Waterbear in many ways, shows advancements in capabilities such as including support for shellcode plugins, avoiding handshakes
โ˜ โ˜† โœ‡ Security โ€“ Cisco Blog

Accessing Secure Client Cloud Management after the SecureX EoL

By Pete Davis โ€” May 17th 2024 at 12:00
Secure Client Management capabilities arenโ€™t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
โ˜ โ˜† โœ‡ The Hacker News

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks

By Newsroom โ€” May 17th 2024 at 08:46
Theย Kimsukyย (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea's Reconnaissance General Bureau (RGB), has been observed deploying a Linux version of its GoBear backdoor as part of a campaign targeting South Korean organizations. The backdoor, codenamedย Gomir, is "structurally almost identical to GoBear, with extensive sharing of code between
โ˜ โ˜† โœ‡ The Hacker News

CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now

By Newsroom โ€” May 17th 2024 at 06:43
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursdayย addedย two security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2014-100005ย - A cross-site request forgery (CSRF) vulnerability impacting D-Link DIR-600 routers that allows an
โ˜ โ˜† โœ‡ The Register - Security

Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware

May 16th 2024 at 23:30

Spoiler alert: it's not really IT support controlling your device

A cybercrime gang has been abusing Microsoft's Quick Assist application in social engineering attacks that ultimately allow the crew to infect victims with Black Basta ransomware.โ€ฆ

โ˜ โ˜† โœ‡ WeLiveSecurity

To the Moon and back(doors): Lunar landing in diplomatic missions

May 15th 2024 at 09:15
ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs
โ˜ โ˜† โœ‡ The Hacker News

New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks

By Newsroom โ€” May 16th 2024 at 16:02
Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 Wi-Fi standard that tricks victims into connecting to a less secure wireless network and eavesdrop on their network traffic. Theย SSID Confusionย attack,ย tracked as CVE-2023-52424, impacts all operating systems and Wi-Fi clients, including home and mesh networks that are based on
โ˜ โ˜† โœ‡ The Register - Security

EU probes Meta over its provisions for protecting children

May 16th 2024 at 15:45

Has social media biz done enough to comply with Digital Services Act? Maybe not

The European Commission has opened formal proceedings to assess whether Meta, the provider of Facebook and Instagram, may have breached the Digital Services Act (DSA) in areas linked to the protection of minors.โ€ฆ

โ˜ โ˜† โœ‡ The Register - Security

Stifling Beijing in cyberspace is now British intelligenceโ€™s number-one mission

May 16th 2024 at 14:45

Annual conference of cyber intel unit shows UK's alarm over China blaring louder than ever

CyberUK Regular attendees of CYBERUK, the annual conference hosted by British intelligence unit the National Cyber Security Centre (NCSC), will know that in addition to the expected conference panels, there is usually an interwoven theme to proceedings.โ€ฆ

โŒ