no alarms and no surprises please..
-
Chrome Security Update, Patch For Multiple Vulnerabilities
Chrome Security Update, Patch For Multiple Vulnerabilities Google has released a new update on the Stable channel for its Chrome browser, addressing a series of security vulnerabilities.The update has been… Go to gbhackers.com
-
WPForms Vulnerability Let Users Issues Subscription Payments
WPForms Vulnerability Let Users Issues Subscription Payments A critical security vulnerability, tracked as CVE-2024-11205, was recently discovered in the popular WordPress plugin, WPForms, which boasts over 6 million active installations globally.This flaw,… Go to gbhackers.com
-
Microsoft Patch Tuesday December 2024, 71 Vulnerabilities Fixed Including 1 Zero-day
Microsoft Patch Tuesday December 2024, 71 Vulnerabilities Fixed Including 1 Zero-day In its final Patch Tuesday of 2024, Microsoft has released a significant security update addressing a total of 71 vulnerabilities, including 16 critical vulnerabilities… Go to gbhackers.com
-
RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate, and targets entrepreneurs automating… Go to gbhackers.com
-
Wyden proposes bill to secure US telecoms after Salt Typhoon hacks
Wyden proposes bill to secure US telecoms after Salt Typhoon hacks U.S. Senator Ron Wyden of Oregon announced a new bill to secure the networks of American telecommunications companies breached by Salt Typhoon Chinese state hackers earlier this year. […] Sergiu Gatlan Go to bleepingcomputer
-
WPForms bug allows Stripe refunds on millions of WordPress sites
WPForms bug allows Stripe refunds on millions of WordPress sites A vulnerability in WPForms, a WordPress plugin used in over 6 million websites, could allow subscriber-level users to issue arbitrary Stripe refunds or cancel subscriptions. […] Bill Toulas Go to bleepingcomputer
-
Ivanti warns of maximum severity CSA auth bypass vulnerability
Ivanti warns of maximum severity CSA auth bypass vulnerability Ivanti warned customers on Tuesday about a new maximum-severity authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. […] Sergiu Gatlan Go to bleepingcomputer
-
Windows 10 KB5048652 update fixes new motherboard activation bug
Windows 10 KB5048652 update fixes new motherboard activation bug Microsoft has released the KB5048652 cumulative update for Windows 10 22H2, which contains six fixes, including a fix that prevented Windows 10 from activating when you change a device’s motherboard. […] Lawrence Abrams Go to bleepingcomputer
-
Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws
Microsoft December 2024 Patch Tuesday fixes 1 exploited zero-day, 71 flaws Today is Microsoft’s December 2024 Patch Tuesday, which includes security updates for 71 flaws, including one actively exploited zero-day vulnerability. […] Lawrence Abrams Go to bleepingcomputer
-
Governments, Telcos Ward Off China’s Hacking Typhoons
Governments, Telcos Ward Off China’s Hacking Typhoons Infiltrating other nations’ telecom networks is a cornerstone of China’s geopolitical strategy, and it’s having the unintended consequence of driving the uptake of encrypted communications. Robert Lemos, Contributing Writer Go to gbhackers.com
-
U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls
U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020. Guan Tianfeng (aka gbigmao and gxiaomao), who is said to have worked at Sichuan Silence Information Technology Company, Limited, has been…
-
Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities
Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and Connect Secure products that could lead to privilege escalation and code execution. The list of vulnerabilities is as follows – CVE-2024-11639 (CVSS score: 10.0) – An authentication…
-
Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged
Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully patched systems. Cybersecurity company Huntress said it discovered evidence of threat actors exploiting the…
-
Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam
Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as recruiters, luring unsuspecting victims with job offers,” Zimperium zLabs Vishnu Pratapagiri researcher said in…
-
The Future of Network Security: Automated Internal and External Pentesting
The Future of Network Security: Automated Internal and External Pentesting In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs, resource requirements, and infrequent implementation. Automated internal and external network pentesting is a game-changing solution,…
-
Full-Face Masks to Frustrate Identification
Full-Face Masks to Frustrate Identification This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual scrutiny. And they’re cheap and easy to swap. Bruce Schneier Go to bruce schneier
-
CVE-2024-11639 (CVSS 10) – Critical Flaw in Ivanti Cloud Services Application: Immediate Patch Recommended
CVE-2024-11639 (CVSS 10) – Critical Flaw in Ivanti Cloud Services Application: Immediate Patch Recommended Ivanti, a leading provider of IT management and security solutions, has released critical security updates for the Ivanti Cloud Services Application (CSA). These updates address vulnerabilities that could lead to… Go to gbhackers.com
-
UAC-0185 APT Leverages Social Engineering to Target Ukrainian Defense Industrial Base
UAC-0185 APT Leverages Social Engineering to Target Ukrainian Defense Industrial Base The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a security advisory (CERT-UA#12414) detailing a sophisticated phishing campaign targeting organizations within Ukraine’s defense industrial base. The attacks, attributed to… Go to gbhackers.com
-
Ivanti Connect Secure and Policy Secure Updates Address Critical Vulnerabilities
Ivanti Connect Secure and Policy Secure Updates Address Critical Vulnerabilities Ivanti, a leader in unified endpoint and enterprise service management, has issued patches for several high and critical vulnerabilities affecting its Connect Secure and Policy Secure solutions. These updates are… Go to gbhackers.com
-
Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS
Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS Jamf Threat Labs has identified a vulnerability in Apple’s Transparency, Consent, and Control (TCC) security framework. Designated as CVE-2024-44131, this flaw enables malicious applications to bypass user consent mechanisms and… Go to gbhackers.com
-
Microsoft Strengthens Default Security Posture Against NTLM Relay Attacks
Microsoft Strengthens Default Security Posture Against NTLM Relay Attacks Microsoft has announced significant enhancements to its default security configuration, aimed at mitigating the risk of NTLM relay attacks across its ecosystem. In a recent blog post, the company detailed… Go to gbhackers.com
-
CVE-2024-52335 (CVSS 9.8): Siemens Healthineers Addresses Critical Flaw in Medical Imaging Software
CVE-2024-52335 (CVSS 9.8): Siemens Healthineers Addresses Critical Flaw in Medical Imaging Software Siemens Healthineers has released a critical security update to address an unauthenticated SQL injection vulnerability in its syngo.plaza VB30E medical imaging software. The vulnerability, identified as CVE-2024-52335 and assigned a… Go to gbhackers.com
-
Exploiting CDN Integrations: A WAF Bypass Threatening Global Web Applications
Exploiting CDN Integrations: A WAF Bypass Threatening Global Web Applications In a recently disclosed analysis, Zafran’s research team has unveiled a pervasive misconfiguration vulnerability affecting some of the world’s largest web application firewall (WAF) vendors, including Akamai, Cloudflare, Fastly, and… Go to gbhackers.com
-
No Warning, No Data: Hetzner Terminates Kiwix Account Abruptly
No Warning, No Data: Hetzner Terminates Kiwix Account Abruptly A recent incident involving Hetzner, a well-known European cloud hosting provider, and Kiwix, a non-profit organization dedicated to offline access to Wikipedia, has brought to light critical considerations regarding cloud… Go to gbhackers.com
-
“CP3O” pleads guilty to multi-million dollar cryptomining scheme
“CP3O” pleads guilty to multi-million dollar cryptomining scheme A man faces up to 20 years in prison after pleading guilty to charges related to an illegal cryptomining operation that stole millions of dollars worth of cloud computing resources. Read more in my article on the Hot for Security blog. Graham Cluley Go to grahamcluley
-
3AM ransomware: what you need to know
3AM ransomware: what you need to know The 3AM ransomware first emerged in late 2023. Like other ransomware, 3AM exfiltrates victims’ data (demanding a ransom is paid) and encrypts the copies left behind. Here’s what you need to know. Read more in my article on the Tripwire State of Security blog. Graham Cluley Go to…
-
The AI Fix #28: Robot dogs with bombs, and who is David Mayer?
The AI Fix #28: Robot dogs with bombs, and who is David Mayer? In episode 28 of The AI Fix, the new version of ChatGPT does a surprisingly good job of telling Mark how to defend himself from a flame thrower-wielding robot dog in his living room, Graham loses 30,000 robots on the head of…
-
Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday
Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday The zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season. Tara Seals, Managing Editor, News, Dark Reading Go to gbhackers.com
-
‘Termite’ Ransomware Likely Behind Cleo Zero-Day Attacks
‘Termite’ Ransomware Likely Behind Cleo Zero-Day Attacks The threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks. Jai Vijayan, Contributing Writer Go to gbhackers.com
-
Scottish Parliament TV at Risk From Deepfakes
Scottish Parliament TV at Risk From Deepfakes Because the streaming service website offers no content restrictions, attackers are able to hijack and manipulate live streams. Kristina Beek, Associate Editor, Dark Reading Go to gbhackers.com
-
Cybercrime Gangs Abscond With Thousands of AWS Credentials
Cybercrime Gangs Abscond With Thousands of AWS Credentials The Nemesis and ShinyHunters attackers scanned millions of IP addresses to find exploitable cloud-based flaws, though their operation ironically was discovered due to a cloud misconfiguration of their own doing. Elizabeth Montalbano, Contributing Writer Go to gbhackers.com
-
Lessons From the Largest Software Supply Chain Incidents
Lessons From the Largest Software Supply Chain Incidents The software supply chain is a growing target, and organizations need to take special care to safeguard it. Eldan Ben-Haim Go to gbhackers.com
-
Sprawling ‘Operation Digital Eye’ Attack Targets European IT Orgs
Sprawling ‘Operation Digital Eye’ Attack Targets European IT Orgs A Chinese threat actor infiltrated several IT and security companies in a bring-your-own VS code, with an eye to carrying out a supply-chain-based espionage attack. Nate Nelson, Contributing Writer Go to gbhackers.com
-
Dell Warns of Critical Code Execution Vulnerability in Power Manager
Dell Warns of Critical Code Execution Vulnerability in Power Manager Dell Technologies has issued a security advisory, DSA-2024-439, to alert users of a critical vulnerability in its Dell Power Manager software.The vulnerability, identified… Go to gbhackers.com
-
Researchers Uncovered Hackers Infrastructre Using Passive DNS Technique
Researchers Uncovered Hackers Infrastructre Using Passive DNS Technique Cybersecurity researchers have unveiled an advanced technique to uncover hackers’ operational infrastructure using passive DNS data.This groundbreaking method sheds light on how attackers establish… Go to gbhackers.com
-
Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP)
Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP) Let’s Encrypt has officially announced its timeline to phase out support for the Online Certificate Status Protocol (OCSP).The nonprofit Certificate Authority (CA) plans… Go to gbhackers.com
-
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins Cybercriminals online take advantage of well-known events to register malicious domains with keywords related to the event, with the intention of tricking users through… Go to gbhackers.com
-
New Meeten Malware Attacking macOS And Windows Users To Steal Logins
New Meeten Malware Attacking macOS And Windows Users To Steal Logins A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors behind this campaign have employed AI-generated content to create fake… Go to gbhackers.com
-
Ransomware attack hits leading heart surgery device maker
Ransomware attack hits leading heart surgery device maker Artivion, a leading manufacturer of heart surgery medical devices, has disclosed a November 21 ransomware attack that disrupted its operations and forced it to take some systems offline. […] Sergiu Gatlan Go to bleepingcomputer
-
OpenWrt Sysupgrade flaw let hackers push malicious firmware images
OpenWrt Sysupgrade flaw let hackers push malicious firmware images A flaw in OpenWrt’s Attended Sysupgrade feature used to build custom, on-demand firmware images could have allowed for the distribution of malicious firmware packages. […] Bill Toulas Go to bleepingcomputer
-
Ubisoft fixes Windows 11 24H2 conflicts causing game crashes
Ubisoft fixes Windows 11 24H2 conflicts causing game crashes Microsoft has now partially lifted a compatibility hold blocking the Windows 24H2 update on systems with some Ubisoft games after the French video game publisher has fixed bugs causing crashes, freezes, and audio issues. […] Sergiu Gatlan Go to bleepingcomputer
-
Radiant links $50 million crypto heist to North Korean hackers
Radiant links $50 million crypto heist to North Korean hackers Radiant Capital now says that North Korean threat actors are behind the $50 million cryptocurrency heist that occurred after hackers breached its systems in an October 16 cyberattack. […] Bill Toulas Go to bleepingcomputer
-
Outdated Google Workspace Sync blocks Windows 11 24H2 upgrades
Outdated Google Workspace Sync blocks Windows 11 24H2 upgrades Microsoft now blocks the Windows 11 24H2 update on computers with outdated Google Workspace Sync installs because they’re causing Outlook launch issues. […] Sergiu Gatlan Go to bleepingcomputer
-
CVE-2024-47578 (CVSS 9.1): SAP Issues Critical Patch for NetWeaver AS for JAVA
CVE-2024-47578 (CVSS 9.1): SAP Issues Critical Patch for NetWeaver AS for JAVA SAP’s latest Security Patch Day, released today, detailed 10 new Security Notes alongside updates to three previously released notes. Among the newly disclosed vulnerabilities, multiple critical and high-priority flaws demand… Go to gbhackers.com
-
CVE-2024-50623: Critical Vulnerability in Cleo Software Actively Exploited in the Wild
CVE-2024-50623: Critical Vulnerability in Cleo Software Actively Exploited in the Wild Huntress Labs has raised the alarm over the active exploitation of a critical vulnerability (CVE-2024-50623) in Cleo’s Harmony, VLTrader, and LexiCom software, commonly used for managing file transfers. Threat actors… Go to gbhackers.com
-
How Can You Unblock Your IP Address in 5 Easy Ways?
How Can You Unblock Your IP Address in 5 Easy Ways? Method Quick Overview Restart Your Router Gets you a new IP address from your ISP Use a VPN Changes your IP address via a VPN server Use a Proxy Server… Go to gbhackers.com
-
TR-24-1881 (Eryaz Bilgi Teknolojileri – NatraCar B2B Bayi Yönetim Programı Güvenlik Bildirimi)
TR-24-1881 (Eryaz Bilgi Teknolojileri – NatraCar B2B Bayi Yönetim Programı Güvenlik Bildirimi) Go to usom.gov
-
TR-24-1880 (Siemens syngo.plaza VB30E Güvenlik Bildirimi)
TR-24-1880 (Siemens syngo.plaza VB30E Güvenlik Bildirimi) Go to usom.gov
-
Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering
Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering tactics, distributing a different set of payloads such as Zbot and DarkGate since early October 2024. “Users within the target environment will be email bombed by…
-
⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)
⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8) This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are…
-
Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI
Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack. Security researcher Johann Rehberger, who has chronicled…
-
Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions
Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model. But IDs have their limits, and there are many use cases when a business should add other layers of security…
-
Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices
Socks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devices A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from Bitsight. “Proxy malware and services enable other types of criminal activity adding uncontrolled layers of anonymity to the threat actors, so they can perform all kinds of malicious…
-
Trust Issues in AI
Trust Issues in AI For a technology that seems startling in its modernity, AI sure has a long history. Google Translate, OpenAI chatbots, and Meta AI image generators are built on decades of advancements in linguistics, signal processing, statistics, and other fields going back to the early days of computing—and, often, on seed funding from…
-
CVE-2024-54143: Critical Vulnerability in OpenWrt’s Attended SysUpgrade Server Allows for Firmware Poisoning
CVE-2024-54143: Critical Vulnerability in OpenWrt’s Attended SysUpgrade Server Allows for Firmware Poisoning OpenWrt, a popular open-source operating system for embedded devices, has disclosed a critical vulnerability (CVE-2024-54143) that could allow attackers to compromise the integrity of firmware updates delivered through its Attended… Go to gbhackers.com
-
Let’s Encrypt to Deprecate OCSP in Favor of CRLs, Enhancing User Privacy
Let’s Encrypt to Deprecate OCSP in Favor of CRLs, Enhancing User Privacy Let’s Encrypt, a leading certificate authority renowned for its commitment to a secure and privacy-respecting internet, has formally announced the deprecation of the Online Certificate Status Protocol (OCSP). This strategic… Go to gbhackers.com
-
International Operation Dismantles Phone Phishing Ring Targeting Vulnerable Individuals Across Europe
International Operation Dismantles Phone Phishing Ring Targeting Vulnerable Individuals Across Europe A sophisticated phone phishing operation targeting vulnerable individuals, primarily the elderly, has been dismantled in a joint operation conducted by Belgian and Dutch law enforcement agencies, with support from Europol… Go to gbhackers.com
-
Bulletproof Hosting: The Dark Infrastructure Behind Global Cybercrime
Bulletproof Hosting: The Dark Infrastructure Behind Global Cybercrime A recent report by the Knownsec 404 team highlights the pivotal role of bulletproof hosting services in facilitating global cybercriminal activities. These specialized hosting providers, often referred to as “dark… Go to gbhackers.com
-
CVE-2024-11205: WPForms Plugin Vulnerability Impacts 6 Million WordPress Sites
CVE-2024-11205: WPForms Plugin Vulnerability Impacts 6 Million WordPress Sites A critical vulnerability (CVE-2024-11205) discovered in WPForms, a prevalent WordPress form builder plugin with over 6 million active installations, exposed websites to significant financial risk. The vulnerability, assigned a CVSS… Go to gbhackers.com
-
FCC Takes Action to Strengthen Cybersecurity in Response to Salt Typhoon Cyberattack
FCC Takes Action to Strengthen Cybersecurity in Response to Salt Typhoon Cyberattack The Federal Communications Commission (FCC) is taking decisive action to bolster the cybersecurity of U.S. telecommunications networks in the wake of the Salt Typhoon cyberattack, a sophisticated intrusion attributed to… Go to gbhackers.com
-
Microsoft NTLM Zero-Day to Remain Unpatched Until April
Microsoft NTLM Zero-Day to Remain Unpatched Until April The second zero-day vulnerability found in Windows NTLM in the past two months paves the way for relay attacks and credential theft. Microsoft has no patch, but released updated NTLM cyberattack mitigation advice. Jai Vijayan, Contributing Writer Go to gbhackers.com
-
Millionaire Airbnb Phishing Ring Busted Up by Police
Millionaire Airbnb Phishing Ring Busted Up by Police Scammers set up call centers in luxury rentals to run bank help-desk fraud, as well as large-scale phishing campaigns, across at least 10 European countries, according to law enforcement. Becky Bracken, Senior Editor, Dark Reading Go to gbhackers.com
-
Attackers Can Use QR Codes to Bypass Browser Isolation
Attackers Can Use QR Codes to Bypass Browser Isolation Researchers demonstrate a proof-of-concept cyberattack vector that gets around remote, on-premises, and local versions of browser isolation security technology to send malicious communications from an attacker-controlled server. Elizabeth Montalbano, Contributing Writer Go to gbhackers.com
-
Genetec Physical Security Report Shows Accelerating Hybrid Cloud Adoption
Genetec Physical Security Report Shows Accelerating Hybrid Cloud Adoption More than 4% of US attempted e-commerce transactions between Thanksgiving and Cyber Monday suspected to be fraudulent. Go to gbhackers.com
-
Large-Scale Incidents & the Art of Vulnerability Prioritization
Large-Scale Incidents & the Art of Vulnerability Prioritization We can anticipate a growing number of emerging vulnerabilities in the near future, emphasizing the need for an effective prioritization strategy. Audra Streetman Go to gbhackers.com
-
Qlik Sense for Windows Vulnerability Allows Remote Code Execution
Qlik Sense for Windows Vulnerability Allows Remote Code Execution Qlik has identified critical vulnerabilities in its Qlik Sense Enterprise for Windows software that could lead to remote code execution (RCE) if exploited. Security… Go to gbhackers.com
-
QNAP High Severity Vulnerabilities Let Remote attackers to Compromise System
QNAP High Severity Vulnerabilities Let Remote attackers to Compromise System QNAP Systems, Inc. has identified multiple high-severity vulnerabilities in its operating systems, potentially allowing attackers to compromise systems and execute malicious activities.These issues… Go to gbhackers.com
-
Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks
Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks The Federal Bureau of Investigation (FBI) has issued a warning about a growing trend in cybercrime, hackers leveraging generative artificial intelligence (AI) to develop… Go to gbhackers.com
-
QR codes bypass browser isolation for malicious C2 communication
QR codes bypass browser isolation for malicious C2 communication Mandiant has identified a novel method to bypass contemporary browser isolation technology and achieve command-and-control C2 operations. […] Bill Toulas Go to bleepingcomputer
-
TR-24-1879 (WordPress Eklenti Güvenlik Bildirimi)
TR-24-1879 (WordPress Eklenti Güvenlik Bildirimi) Go to usom.gov
-
CVE-2024-55579 & CVE-2024-55580: Qlik Sense Users Face Serious Security Risk
CVE-2024-55579 & CVE-2024-55580: Qlik Sense Users Face Serious Security Risk Qlik, a leading provider of business intelligence and data analytics platforms, has disclosed two vulnerabilities affecting Qlik Sense Enterprise for Windows. These vulnerabilities, identified as CVE-2024-55579 and CVE-2024-55580, could allow… Go to gbhackers.com
-
CVE-2024-55563: Transaction-Relay Jamming Vulnerability Poses Threat to Bitcoin Lightning Network
CVE-2024-55563: Transaction-Relay Jamming Vulnerability Poses Threat to Bitcoin Lightning Network A recently disclosed vulnerability, identified as CVE-2024-55563, has revealed a critical security risk within the Bitcoin network’s transaction-relay mechanism, with potential implications for the stability and security of the Lightning… Go to gbhackers.com
-
Activation Context Hijacking: “Eclipse” PoC Weaponizes Trusted Processes
Activation Context Hijacking: “Eclipse” PoC Weaponizes Trusted Processes Kurosh Dabbagh Escalante, a Red Team Operator at BlackArrow, has introduced Eclipse, a proof-of-concept (PoC) tool designed to exploit Activation Context hijacking. By leveraging a technique known as Activation Context… Go to gbhackers.com
-
Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published
Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published A critical use-after-free vulnerability, identified as CVE-2024-38193, has been discovered in the afd.sys Windows driver. This vulnerability, with a CVSS score of 7.8, poses a significant threat to Windows systems,… Go to gbhackers.com
-
Mauri Ransomware Exploits Apache ActiveMQ Flaw (CVE-2023-46604)
Mauri Ransomware Exploits Apache ActiveMQ Flaw (CVE-2023-46604) The AhnLab Security Intelligence Response Center (ASEC) has revealed that threat actors exploiting a critical vulnerability in Apache ActiveMQ, identified as CVE-2023-46604, have begun deploying Mauri ransomware in their attacks…. Go to gbhackers.com
-
QNAP Addresses High Severity Vulnerabilities in License Center and Operating Systems
QNAP Addresses High Severity Vulnerabilities in License Center and Operating Systems QNAP, a leading provider of network-attached storage (NAS) solutions, has issued a security advisory addressing multiple vulnerabilities affecting its License Center and QTS/QuTS hero operating systems. The vulnerabilities range in… Go to gbhackers.com
-
Google Fixes Critical RCE Vulnerabilities in December 2024 Pixel Security Update
Google Fixes Critical RCE Vulnerabilities in December 2024 Pixel Security Update Google has rolled out its December 2024 security update for Pixel devices, addressing a total of 28 vulnerabilities, including two critical remote code execution (RCE) flaws in the Cellular baseband… Go to gbhackers.com
-
The Rise of Mac Malware: 2024 Threat Report Reveals Alarming Trends
The Rise of Mac Malware: 2024 Threat Report Reveals Alarming Trends For years, macOS enjoyed a reputation as a secure platform, relatively untouched by malware. However, a 60% surge in macOS market share over the past three years has made it… Go to gbhackers.com
-
Weekly Update 429
Weekly Update 429 A super quick intro today as I rush off to do the next very Dubai thing: drive a Lambo through the desert to go dirt bike riding before jumping in a Can-Am off-roader and then heading to the kart track for a couple of afternoon sessions. I post lots of pics to…
-
Anna Jaques Hospital ransomware breach exposed data of 300K patients
Anna Jaques Hospital ransomware breach exposed data of 300K patients Anna Jaques Hospital has confirmed on its website that a ransomware attack it suffered almost precisely a year ago, on December 25, 2023, has exposed sensitive health data for over 316,000 patients. […] Bill Toulas Go to bleepingcomputer
-
Manjaro 24.2 “Yonada” Released: A Refined and Feature-Rich Update
Manjaro 24.2 “Yonada” Released: A Refined and Feature-Rich Update Manjaro Linux, the acclaimed Arch-based distribution renowned for its user-centric approach, has announced the release of version 24.2, codenamed “Yonada.” This latest iteration delivers a compelling blend of stability, performance,… Go to gbhackers.com
-
Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar
Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots…
-
Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions
Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package…
-
Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data
Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. “The threat actors behind the malware have set up fake…
-
Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok
Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take…
-
CVE-2024-12209 (CVSS 9.8): WP Umbrella Plugin Vulnerability Exposes 30,000 Websites to Compromise
CVE-2024-12209 (CVSS 9.8): WP Umbrella Plugin Vulnerability Exposes 30,000 Websites to Compromise A critical security vulnerability has been discovered in the popular WordPress plugin, WP Umbrella, which is used by over 30,000 websites. The flaw, identified as CVE-2024-12209 and assigned a CVSS… Go to gbhackers.com
-
Google’s Vanir: A Powerful New Open-Source Tool for Supercharging Security Patch Validation
Google’s Vanir: A Powerful New Open-Source Tool for Supercharging Security Patch Validation In a move set to redefine security patch validation, Google announced the public availability of Vanir, an open-source tool designed to revolutionize how developers identify and address security vulnerabilities. Initially… Go to gbhackers.com
-
SystemRescue 11.03 Boots Up with a Powerful New Kernel and Updated Tools!
SystemRescue 11.03 Boots Up with a Powerful New Kernel and Updated Tools! SystemRescue, the renowned open-source system recovery toolkit, announces the release of version 11.03. This iteration delivers crucial updates to the kernel and core utilities, further solidifying its position as a… Go to gbhackers.com
-
BlueAlpha Exploits Cloudflare Tunnels for GammaDrop Malware Infrastructure
BlueAlpha Exploits Cloudflare Tunnels for GammaDrop Malware Infrastructure The Insikt Group has uncovered a sophisticated cyber-espionage operation conducted by BlueAlpha, a state-sponsored threat actor with links to the Russian Federal Security Service (FSB). The campaign targets Ukrainian entities… Go to gbhackers.com
-
FSB-Tampered Device Returned with Monokle-Type Spyware, Experts Reveal
FSB-Tampered Device Returned with Monokle-Type Spyware, Experts Reveal A joint investigation by the First Department and cybersecurity researchers has exposed the covert implantation of spyware resembling the Monokle family on a confiscated device returned to a Russian programmer…. Go to gbhackers.com
-
DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory
DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory Security researchers have identified a significant vulnerability dubbed “DaMAgeCard Attack” in the new SD Express card standard that could allow attackers to directly access… Go to gbhackers.com
-
Deloitte Denies Breach, Claims Only Single System Affected
Deloitte Denies Breach, Claims Only Single System Affected Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish the data it had stolen earlier this week.However, despite the… Go to gbhackers.com
-
Top Five Industries Most Frequently Targeted by Phishing Attacks
Top Five Industries Most Frequently Targeted by Phishing Attacks Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top five industries targeted by subject-customized emails, which often leverage personal… Go to gbhackers.com
-
Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware
Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing emails with malicious HTML attachments to deliver GammaLoad malware. To… Go to gbhackers.com
-
Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication
Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the Pakistani group Storm-0156, which allows Secret Blizzard to access… Go to gbhackers.com
-
Microsoft expands Recall preview to Intel and AMD Copilot+ PCs
Microsoft expands Recall preview to Intel and AMD Copilot+ PCs Microsoft is now testing its AI-powered Recall feature on AMD and Intel-powered Copilot+ PCs enrolled in the Windows 11 Insider program. […] Sergiu Gatlan Go to bleepingcomputer
-
Ultralytics AI model hijacked to infect thousands with cryptominer
Ultralytics AI model hijacked to infect thousands with cryptominer The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions 8.3.41 and 8.3.42 from the Python Package Index (PyPI) […] Bill Toulas Go to bleepingcomputer
-
Blue Yonder SaaS giant breached by Termite ransomware gang
Blue Yonder SaaS giant breached by Termite ransomware gang The Termite ransomware gang has officially claimed responsibility for the November breach of software as a service (SaaS) provider Blue Yonder. […] Sergiu Gatlan Go to bleepingcomputer
-
New Windows zero-day exposes NTLM credentials, gets unofficial patch
New Windows zero-day exposes NTLM credentials, gets unofficial patch A new zero-day vulnerability has been discovered that allows attackers to capture NTLM credentials by simply tricking the target into viewing a malicious file in Windows Explorer. […] Bill Toulas Go to bleepingcomputer