Global Cyber Security News
Keep up to date with some of the latest news articles in the cyber security landscape, worldwide.
- Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerabilityby [email protected] (The Hacker News) on September 14, 2024 at 4:12 am
Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain circumstances. "An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows
- Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackersby [email protected] (The Hacker News) on September 13, 2024 at 1:51 pm
Details have emerged about a now-patched security flaw impacting Apple's Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device's virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE identifier CVE-2024-40865. "A novel attack that can infer eye-related biometrics from the avatar image to
- 17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for Londonby [email protected] (The Hacker News) on September 13, 2024 at 1:29 pm
British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). "The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September," the U.K. National Crime Agency (NCA) said. The teenager, who's from Walsall, is said to have been
- TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraudby [email protected] (The Hacker News) on September 13, 2024 at 11:17 am
Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims' banking credentials. "The mechanisms include using malformed ZIP files in combination with JSONPacker," Cleafy security researchers Michele Roviello and Alessandro Strino said. "In addition,
- Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theftby [email protected] (The Hacker News) on September 13, 2024 at 11:17 am
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible. However, most tools available on the market today cannot offer a complete defense against this attack vector because they were architected to
- Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flawby [email protected] (The Hacker News) on September 13, 2024 at 11:04 am
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of the Summoning Team, who
- New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrencyby [email protected] (The Hacker News) on September 13, 2024 at 5:39 am
Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining and deliver botnet malware. The activity, which specifically singles out the Oracle Weblogic server, is designed to deliver a malware strain dubbed Hadooken, according to cloud security firm Aqua. "When Hadooken is executed, it drops a Tsunami malware and deploys
- New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegramby [email protected] (The Hacker News) on September 12, 2024 at 4:12 pm
Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2023 with the goal of harvesting financial information and intercepting two-factor authentication (2FA) messages. Singapore-headquartered Group-IB, which discovered the threat in May 2024, said the malware is propagated via a network of Telegram channels
- Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Executionby [email protected] (The Hacker News) on September 12, 2024 at 3:55 pm
GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an attacker to run pipeline jobs as an arbitrary user. The issue, tracked as CVE-2024-6678, carries a CVSS score of 9.9 out of a maximum of 10.0 "An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to
- Beware: New Vo1d Malware Infects 1.3 Million Android-based TV Boxes Worldwideby [email protected] (The Hacker News) on September 12, 2024 at 1:46 pm
Nearly 1.3 million Android-based TV boxes running outdated versions of the operating system and belonging to users spanning 197 countries have been infected by a new malware dubbed Vo1d (aka Void). "It is a backdoor that puts its components in the system storage area and, when commanded by attackers, is capable of secretly downloading and installing third-party software," Russian antivirus
- Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjackingby [email protected] (The Hacker News) on September 12, 2024 at 12:56 pm
Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and proxyjacking campaigns. "Selenium Grid is a server that facilitates running test cases in parallel across different browsers and versions," Cado Security researchers Tara Gould and Nate Bill said in an analysis published today. "However, Selenium Grid's default configuration lacks
- Top 3 Threat Report Insights for Q2 2024by [email protected] (The Hacker News) on September 12, 2024 at 10:51 am
Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical findings based on the analysis of a staggering 1.38 trillion network flows from more than 2,500 of Cato’s global customers, between April and June 2024. Key Insights from the Q2 2024 Cato CTRL SASE Threat Report The report is packed with unique insights that are based on
- Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attackby [email protected] (The Hacker News) on September 12, 2024 at 10:49 am
Iraqi government networks have emerged as the target of an "elaborate" cyber attack campaign orchestrated by an Iran state-sponsored threat actor called OilRig. The attacks singled out Iraqi organizations such as the Prime Minister's Office and the Ministry of Foreign Affairs, cybersecurity company Check Point said in a new analysis. OilRig, also called APT34, Crambus, Cobalt Gypsy, GreenBug,
- Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europeby [email protected] (The Hacker News) on September 12, 2024 at 10:32 am
The Irish Data Protection Commission (DPC) has announced that it has commenced a "Cross-Border statutory inquiry" into Google's foundational artificial intelligence (AI) model to determine whether the tech giant has adhered to data protection regulations in the region when processing the personal data of European users. "The statutory inquiry concerns the question of whether Google has complied
- WordPress Mandates Two-Factor Authentication for Plugin and Theme Developersby [email protected] (The Hacker News) on September 12, 2024 at 4:57 am
WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate two-factor authentication (2FA) mandatorily. The enforcement is expected to come into effect starting October 1, 2024. "Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress sites worldwide," the
- Quad7 Botnet Expands to Target SOHO Routers and VPN Appliancesby [email protected] (The Hacker News) on September 11, 2024 at 4:20 pm
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TP-LINK, Zyxel, Asus, Axentra, D-Link, and NETGEAR, according to a new report by French cybersecurity company Sekoia. "The Quad7 botnet operators appear to be
- DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europeby [email protected] (The Hacker News) on September 11, 2024 at 3:39 pm
A "simplified Chinese-speaking actor" has been linked to a new campaign that has targeted multiple countries in Asia and Europe with the end goal of performing search engine optimization (SEO) rank manipulation. The black hat SEO cluster has been codenamed DragonRank by Cisco Talos, with victimology footprint scattered across Thailand, India, Korea, Belgium, the Netherlands, and China. "
- Singapore Police Arrest Six Hackers Linked to Global Cybercrime Syndicateby [email protected] (The Hacker News) on September 11, 2024 at 12:07 pm
The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their alleged involvement in illicit cyber activities in the country. The development comes after a group of about 160 law enforcement officials conducted a series of raids on September 9, 2024, simultaneously at several locations. The six men, aged between 32 and 42, are suspected of
- Why Is It So Challenging to Go Passwordless?by [email protected] (The Hacker News) on September 11, 2024 at 10:41 am
Imagine a world where you never have to remember another password. Seems like a dream come true for both end users and IT teams, right? But as the old saying goes, "If it sounds too good to be true, it probably is." If your organization is like many, you may be contemplating a move to passwordless authentication. But the reality is that a passwordless security approach comes with its own
- Developers Beware: Lazarus Group Uses Fake Coding Tests to Spread Malwareby [email protected] (The Hacker News) on September 11, 2024 at 9:46 am
Cybersecurity researchers have uncovered a new set of malicious Python packages that target software developers under the guise of coding assessments. "The new samples were tracked to GitHub projects that have been linked to previous, targeted attacks in which developers are lured using fake job interviews," ReversingLabs researcher Karlo Zanki said. The activity has been assessed to be part of