Today's Core Dump is brought to you by ThreatPerspective

Biz & IT Ars Technica

Mac users served info-stealer malware through Google ads

Full-service Poseidon info stealer pushed by "advertiser identity verified by Google." Mac users served info-stealer malware through Google ads Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely used ad platform has been abused to infect web sur...

Published: 2024-06-27T19:27:43



Biz & IT Ars Technica

Critical MOVEit vulnerability puts huge swaths of the Internet at severe risk

A similar flaw last year left 1,800 networks breached. Will the latest one be as potent? Critical MOVEit vulnerability puts huge swaths of the Internet at severe risk A critical vulnerability recently discovered in a widely used piece of software is putting huge swaths of the Internet at risk of devastating hacks, and attackers have already begun actively trying to exploit it in real-world attacks, researchers ...

Published: 2024-06-26T23:31:21



Biz & IT Ars Technica

Backdoor slipped into multiple WordPress plugins in ongoing supply-chain attack

Malicious updates available from WordPress.org create attacker-controlled admin account. Stylized illustration a door that opens onto a wall of computer code. WordPress plugins running on as many as 36,000 websites have been backdoored in a supply-chain attack with unknown origins, security researchers said on Monday. So far, five plugins are known to be affected in the campaign, which was active as rec...

Published: 2024-06-24T21:00:43



Biz & IT Ars Technica

High-severity vulnerabilities affect a wide range of Asus router models

Many models receive patches; others will need to be replaced. High-severity vulnerabilities affect a wide range of Asus router models Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with no authentication or interaction required of end users. The most critical vulne...

Published: 2024-06-17T18:39:41



Biz & IT Ars Technica

Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating

TellYouThePass group opportunistically infects servers that have yet to update. Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word "exploit" Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability in the PHP programming language that executes malicious code on web servers, security researchers said. As of Thursday, Internet scans performed by security firm Censys ...

Published: 2024-06-14T19:40:29



The Register - Software

SUSE Linux Enterprise 15 to receive support right up to end of Unix epoch

And there's a special offer on the CentOS-compatible Liberty Linux As SUSE ascends its self-imposed ALP, this version may be the last of the fixed release cycle for openSUSE Leap.

Published: 2024-06-26T08:26:12



The Register - Software

Ollama drama as 'easy-to-exploit' critical flaw found in open source AI server

About a thousand vulnerable instances still exposed online, we're told A now-patched vulnerability in Ollama a popular open source project for running LLMs can lead to remote code execution, according to flaw finders who warned that upwards of 1,

Published: 2024-06-24T20:34:08



The Register - Software

From network security to nyet work in perpetuity: What's up with the Kaspersky US ban?

It's been a long time coming. Now our journos speak their brains Kettle The US government on Thursday banned Kaspersky Lab from selling its antivirus and other products in America from late July, and from issuing updates and malware signatures from

Published: 2024-06-22T08:16:12



The Register - Software

Change Healthcare finally spills the tea on what medical data was stolen by cyber-crew

'Substantial proportion' of America to get a little note from next month Change Healthcare is formally notifying some of its pharmacy and hospital customers that their patients' data was stolen from it by ransomware criminals back in February and f

Published: 2024-06-21T21:33:09



The Verge - Securities

Google will address Android's Find My Device network issues over the coming weeks

Android’s Find My Device interface tracking a lost device on a Google Pixel smartphone. Google launched its upgraded Find My Device network in April, giving Android users the equivalent of Apple’s Find My network for locating trackers and offline devices. But some recent reviews have raised concerns over its ability to quickly...

Published: 2024-06-26T11:03:20



The Verge - Securities

Thwarting cyberattacks from China is DHS's top infrastructure security priority

Illustration of the seal for the US Department of Homeland Security on a red and tan background. Combatting “cyber and other threats posed by the People’s Republic of China” (PRC) is a top priority for the Department of Homeland Security (DHS) through the end of 2025, according to a guidance document the department released last Thursd...

Published: 2024-06-24T16:25:21



The Verge - Securities

Car dealerships hit with massive computer system outage

An image showing a laptop with “Error” notifications on the screen CDK Global, the company that provides management software for nearly 15,000 car dealerships in North America, is down for a second day following a cyberattack, according to a report from Automotive News. The outage has left car dealerships ...

Published: 2024-06-20T14:04:52



The Verge - Securities

Update your Windows PC to avoid a serious Wi-Fi vulnerability

Illustration of a computer screen with a blue exclamation point on it and an error box. If you’ve been putting off your next Windows update, now’s the time to install it. Last week, Microsoft patched a pretty nasty vulnerability in Windows 11 and 10 that could put your PC at risk when connected to a public Wi-Fi network, as sp...

Published: 2024-06-19T15:33:36



The Verge - Securities

AMD is investigating claims of stolen company data

Illustration of a computer screen with a blue exclamation point on it and an error box. AMD is looking into a potential cyberattack. A threat actor that goes by the alias “IntelBroker” is selling data that it claims was obtained from an AMD.com breach this month, BleepingComputer reports, and the company confirmed in a stateme...

Published: 2024-06-18T19:10:39



The Verge - Securities

A major disinformation research center's future looks uncertain

The Stanford Internet Observatory, a small but prominent research group studying abuse on social media platforms, looks to be in crisis, according to a report by Platformer. Some key staff have departed recently, including founding director...

Published: 2024-06-14T10:39:11



The Verge - Securities

Epic Games database leak hints at a trove of unannounced games

Epic Games logo An unofficial site tracking titles in the Epic Games library may have just leaked a ton of upcoming games, as reported earlier by Wccftech. The site, called EpicDB, was taken offline shortly after it posted information scraped from the Epic...

Published: 2024-06-12T12:22:47



The Verge - Securities

Life360 confirms a hacker stole Tile tracker IDs and customer info

Hand holding a black square tile tracker above a brown wooden table with a succulent plant on it. A hacker breached the systems behind Tile device trackers and stole customer data, including names, addresses, emails, and phone numbers. According to reporting from 404 Media, the hacker was able to collect customer information by accessin...

Published: 2024-06-12T12:13:30



The Verge - Securities

Ticketmaster's Snowflake data breach was just one of 165

A cartoon illustration shows a shadowy figure carrying off a red directory folder, which has a surprised-looking face on its side. Security researchers are reporting that a “significant volume of data” has been stolen from hundreds of Snowflake cloud storage customers via compromised login credentials, with the incident being linked to massive data breaches at Ticketma...

Published: 2024-06-11T10:57:56



The Verge - Securities

Apple's standalone Passwords app syncs across iOS, iPad, Mac, and Windows

Mac app, passwords At WWDC 2024, Apple revealed a new Passwords app that expands on its existing iCloud Keychain features and syncs your passwords across more devices. Now, with Passwords, Apple is releasing a standalone app to manage passwords and passkeys o...

Published: 2024-06-10T14:36:57



BleepingComputer

BlackSuit ransomware gang claims attack on KADOKAWA corporation

The BlackSuit ransomware gang claimed a recent cyberattack on KADOKAWA corporation and is now threatening to publish stolen data if a ransom is not paid. [...]

Published: 2024-06-27T18:57:29



BleepingComputer

New Unfurling Hemlock threat actor floods systems with malware

A threat actor tracked as Unfurling Hemlock has been infecting target systems with up to ten pieces of malware at the same time in campaigns that distribute hundreds of thousands of malicious files. [...]

Published: 2024-06-27T18:27:38



BleepingComputer

U.S. indicts Russian GRU hacker, offers $10 million reward

The U.S. indicted Russian national Amin Timovich Stigal for his alleged role in cyberattacks targeting Ukrainian government computer networks in an operation from the Russian foreign military intelligence agency (GRU) prior to invading the country.

Published: 2024-06-27T15:31:16



BleepingComputer

TeamViewer's corporate network was breached in alleged APT hack

The remote access software company TeamViewer is warning that its corporate environment was breached in a cyberattack yesterday, with a cybersecurity firm claiming it was by an APT hacking group. [...]

Published: 2024-06-27T14:29:25



BleepingComputer

Critical GitLab bug lets attackers run pipelines as any user

A critical vulnerability is affecting certain versions of GitLab Community and Enterprise Edition products, which could be exploited to run pipelines as any user. [...]

Published: 2024-06-27T10:53:13



BleepingComputer

Chinese Cyberspies Employ Ransomware in Attacks for Diversion

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft. [...]

Published: 2024-06-27T00:20:05



BleepingComputer

Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released

The Fortra FileCatalyst Workflow is vulnerable to an SQL injection vulnerability that could allow remote unauthenticated attackers to create rogue admin users and manipulate data on the application database. [...]

Published: 2024-06-26T12:56:06



Technology

GPT-4 autonomously hacks zero-day security flaws with 53% success rate

An unattended laptop, rendered using AI tools, quietly works away autonomously A couple of months ago, a team of researchers released a paper saying they'd been able to use GPT-4 to autonomously hack one-day (or N-day) vulnerabilities these are security flaws that are already known, but for which a fix hasn't yet been release...

Published: 2024-06-09T03:48:31



Threat Intelligence

Global Revival of Hacktivism Requires Increased Vigilance from Defenders

Written by: Daniel Kapellmann Zafra, Alden Wahlstrom, James Sadowski, Josh Palatucci, Davyn Baumann, Jose Nazario Since early 2022, Mandiant has observed the revival and intensification of threat activity from actors leveraging hacktivist tactics

Published: 2024-06-27T14:00:00



Threat Intelligence

Insights on Cyber Threats Targeting Users and Enterprises in Brazil

Written by: Kristen Dennesen, Luke McNamara, Dmitrij Lenz, Adam Weidemann, Aline Bueno Note: A Portuguese-language version of this blog post is available. Individuals and organizations in Brazil face a unique cyber threat landscape because it is

Published: 2024-06-12T14:00:00



Threat Intelligence

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion

snowflake timeline UPDATE (June 17): We have released our Snowflake threat hunting guide, which contains guidance and queries for detecting abnormal and malicious activity across Snowflake customer database instances. Default retention policies for the relevant views e...

Published: 2024-06-10T10:00:00



Threat Intelligence

Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics

Written by: Michelle Cantos, Jamie Collier Executive Summary Mandiant assesses with high confidence that the Paris Olympics faces an elevated risk of cyber threat activity, including cyber espionage, disruptive and destructive operations, finan

Published: 2024-06-05T14:00:00



Threat Intelligence

Ransomware Rebounds: Extortion Threat Surges in 2023, Attackers Rely on Publicly Available and Legitimate Tools

Written by: Bavi Sadayappan, Zach Riddle, Jordan Nuce, Joshua Shilko, Jeremy Kennelly A version of this blog post was published to the Mandiant Advantage portal on April 18, 2024. Executive Summary In 2023, Mandiant observed an increase in ranso

Published: 2024-06-03T14:00:00



Threat Intelligence

IOC Extinction? China-Nexus Cyber Espionage Actors Use ORB Networks to Raise Cost on Defenders

Written by: Michael Raggi Mandiant Intelligence is tracking a growing trend among China-nexus cyber espionage operations where advanced persistent threat (APT) actors utilize proxy networks known as “ORB networks” (operational relay box networks)

Published: 2024-05-22T14:00:00



Threat Intelligence

Uncharmed: Untangling Iran's APT42 Operations

Written by: Ofir Rozmann, Asli Koksal, Adrian Hernandez, Sarah Bock, Jonathan Leathery APT42, an Iranian state-sponsored cyber espionage actor, is using enhanced social engineering schemes to gain access to victim networks, including cloud enviro

Published: 2024-05-01T14:00:00



Threat Intelligence

Ransomware Protection and Containment Strategies: Practical Guidance for Hardening and Protecting Infrastructure, Identities and Endpoints

ransomware-report-cover Written by: Matthew McWhirt, Omar ElAhdan, Glenn Staniforth, Brian Meyer Multi-faceted extortion via ransomware and/or data theft is a popular end goal for attackers, representing a global threat targeting organizat...

Published: 2024-04-30T14:00:00



Threat Intelligence

From Assistant to Analyst: The Power of Gemini 1.5 Pro for Malware Analysis

gemini-for-malware-analysis-fig8 Executive Summary A growing amount of malware has naturally increased workloads for defenders and particularly malware analysts, creating a need for improved automation and approaches to dealing with this classic threat. With the recent rise in g...

Published: 2024-04-29T14:00:00



Threat Intelligence

Poll Vaulting: Cyber Threats to Global Elections

Written by: Kelli Vanderlee, Jamie Collier Executive Summary The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats. Elections attract threat activity from a variety of threat actors inclu

Published: 2024-04-25T10:00:00



Threat Intelligence

Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm

Written by: Gabby Roncone, Dan Black, John Wolfram, Tyler McLellan, Nick Simonian, Ryan Hall, Anton Prokopenkov, Luke Jenkins, Dan Perez, Lexie Aytes, Alden Wahlstrom With Russia's full-scale invasion in its third year, Sandworm (aka FROZENBARENT

Published: 2024-04-17T10:00:00



Threat Intelligence

Apache XML Security for C++ Library Allows for Server-Side Request Forgery

Written by: Jacob Thompson The Apache XML Security for C++ library, code named xml-security-c, is part of the Apache Santuario project. The library implements the XML Digital Signature and the XML Signature specifications, making them available t

Published: 2024-04-09T14:00:00



Threat Intelligence

Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies

Written by: Matt Lin, Austin Larsen, John Wolfram, Ashley Pearson, Josh Murchie, Lukasz Lamparski, Joseph Pisano, Ryan Hall, Ron Craft, Shawn Chew, Billy Wong, Tyler McLellan Since the initial disclosure of CVE-2023-46805 and CVE-2024-21887 on Ja

Published: 2024-04-04T14:00:00



Threat Intelligence

SeeSeeYouExec: Windows Session Hijacking via CcmExec

Written by: Andrew Oliveau Over the last several years, the security community has witnessed an uptick in System Center Configuration Manager (SCCM)-related attacks. From extracting network access account (NAA) credentials to deploying malicious

Published: 2024-03-28T13:00:00



ProPublica

Nine Takeaways From Our Investigation Into Microsoft’s Cybersecurity Failures

by ProPublica ProPublica is a nonprofit newsroom that i

Published: 2024-06-18T05:00:00



ProPublica

Microsoft President Grilled by Congress Over Cybersecurity Failures

by Renee Dudley ProPublica is a nonprofit newsroom that

Published: 2024-06-13T19:45:00



ProPublica

Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says

by Renee Dudley, with research by Doris Burke ProPublic

Published: 2024-06-13T05:00:00



The Register - Security

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

Simple jailbreak prompt can bypass safety guardrails on major models Microsoft on Thursday published details about Skeleton Key a technique that bypasses the guardrails used by makers of AI models to prevent their generative chatbots from creating harmful content.

Published: 2024-06-28T06:38:13



The Register - Security

Polyfill.io owner punches back at 'malicious defamation' amid domain shutdown

No supply-chain attacks to see over here! After having its website shut down, the polyfill.io owner is fighting back against claims it smuggled suspicious code onto websites all across the internet.

Published: 2024-06-28T03:45:46



The Register - Security

TeamViewer can't bring itself to say someone broke into its network but it happened

Claims customer data, prod environment not affected as NCC sounds alarm TeamViewer on Thursday said its security team just "detected an irregularity" within one of its networks which is a fancy way of saying someone broke in.

Published: 2024-06-28T00:37:41



The Register - Security

US lawmakers wave red flags over Chinese drone dominance

Congressman warns tech is getting the 'Huawei Playbook' treatment US Congress members warned against Chinese dominance of the drone industry on Wednesday, elevating the threat posed by Beijing's control of the technology as similar to that of semiconductors and ships.

Published: 2024-06-27T13:44:10



The Register - Security

Korean telco allegedly infected its P2P users with malware

KT may have had an entire team dedicated to infecting its own customers A South Korean media outlet has alleged that local telco KT deliberately infected some customers with malware due to their excessive use of peer-to-peer (P2P) downloading tools.

Published: 2024-06-27T01:46:12



The Register - Security

WhisperGate suspect indicted as US offers a $10M bounty for his capture

Russian national accused of attacks in lead-up to the Ukraine war The US Department of Justice has indicted a 22-year-old Russian for allegedly attacking Ukrainian government computers and destroying critical infrastructure systems in the so-called WhisperGate wiper attack that preceded Russia's illegal invasion of the European nation.

Published: 2024-06-27T00:33:07



The Register - Security

Feds put $5M bounty on 'CryptoQueen' Ruja Ignatova

OneCoin co-founder allegedly bilked investors out of $4B Uncle Sam has put a $5 million bounty on any information leading to the arrest or conviction of self-titled "CryptoQueen" Ruja Ignatova, who is wanted in the US for apparently bilking victims out of more than $4 billion in what the Feds describe as the "one of the largest global fraud schemes in history."

Published: 2024-06-26T21:58:11



The Register - Security

US convicts crypto-robbing gang leader who kidnapped victims before draining their accounts

Said to have zip tied elderly crypto investors, held them at gunpoint, and threatened to kill them The US has convicted the 24-year-old leader of an international robbery crew that kidnapped and terrorized wealthy victims during home invasions that were carried out to steal cryptocurrency tokens.

Published: 2024-06-26T18:46:05



The Register - Security

Batten down the hatches, it's time to patch some more MOVEit bugs

Exploit attempts for devastating vulnerabilities already underway Thought last year's MOVEit hellscape was well and truly behind you? Unlucky, buster. We're back for round two after Progress Software lifted the lid on fresh vulnerabilities affecting MOVEit Transfer and Gateway.

Published: 2024-06-26T13:32:10



The Register - Security

Julian Assange pleads guilty, leaves courtroom a free man

Now, about that bill for the private jet that's taking him home to Australia Julian Assange is a free man.

Published: 2024-06-26T07:02:45



The Register - Security

Yahoo! Japan to waive $189 million ad revenue after detecting fraudulent clicks

Admits it's not sure some clicks came from humans, points to bettter quality as sign not all is rotten Yahoo! Japan will waive $189 million charged to advertisers after deciding they were fraudulently charged, the portal's corporate parent revealed on Tuesday.

Published: 2024-06-26T05:16:14



The Register - Security

Organized crime and domestic violence perps are big buyers of tracking devices

Australian study finds GPS trackers and sometimes AirTags are in demand for the wrong reasons Tracking devices are in demand from organized crime groups and known perpetrators of domestic violence, according to an Australian study.

Published: 2024-06-26T03:45:06



The Register - Security

Microsoft blamed for million-plus patient record theft at US hospital giant

Probe: Worker at speech-recog outfit Nuance wasn't locked out after firing Updated American healthcare provider Geisinger fears highly personal data on more than a million of its patients has been stolen and claimed a former employee at a Microsoft subsidiary is the likely culprit.

Published: 2024-06-26T00:44:06



The Register - Security

If you're using Polyfill.io code on your site like 100,000+ are remove it immediately

Scripts turn sus after mysterious CDN swallows domain The polyfill.io domain is being used to infect more than 100,000 websites with malicious code after what's said to be a Chinese organization bought the domain earlier this year, researchers have said.

Published: 2024-06-25T23:48:13



The Register - Security

Fiend touts stolen Neiman Marcus customer info for $150K

Flash clobber chain fashionably late to Snowflake fiasco party Customer information said to have been stolen from Neiman Marcus's Snowflake instance has been put up for sale on the dark web for $150,000.

Published: 2024-06-25T20:27:13



The Register - Security

Crypto scammers circle back, pose as lawyers, steal an extra $10M in truly devious plan

Business is more lucrative than you might think The FBI says in just 12 months, scumbags stole circa $10 million from victims of crypto scams after posing as helpful lawyers offering to recover their lost tokens.

Published: 2024-06-25T18:28:12



The Register - Security

CISA says crooks used Ivanti bugs to snoop around high-risk chemical facilities

Crafty crims broke in but encryption stopped any nastiness US cybersecurity agency CISA is urging high-risk chemical facilities to secure their online accounts after someone broke into its Chemical Security Assessment Tool (CSAT) portal.

Published: 2024-06-25T13:45:08



The Register - Security

UK and US cops band together to tackle Qilin's ransomware shakedowns

Attacking the NHS is a very bad move UK and US cops have reportedly joined forces to find and fight Qilin, the ransomware gang wreaking havoc on the global healthcare industry.

Published: 2024-06-25T12:01:07



The Register - Security

Ransomware thieves beware

Why Object First and Veeam tick the box for encryption and immutability Sponsored Feature You know that a technology problem is serious when the White House holds a summit about it.

Published: 2024-06-25T09:12:09



The Register - Security

Julian Assange to go free in guilty plea deal with US

WikiLeaks boss already out of Blighty and, if all goes to plan, ultimately off to home in Australia WikiLeaks founder Julian Assange has been freed from prison in the UK after agreeing to plead guilty to just one count of conspiracy to obtain and disclose national defense information, brought against him by the United States. Uncle Sam previously filed more than a dozen counts.

Published: 2024-06-25T00:19:35



The Register - Security

America's best chance for nationwide privacy law could do more harm than good

'Congress has effectively gutted it as part of a backroom deal' Analysis Introduced in April, the American Privacy Rights Act (APRA) was - in the words of its drafters - "the best opportunity we ve had in decades to establish a national data privacy and security standard that gives people the right to control their personal information."

Published: 2024-06-25T00:02:11



The Register - Security

Ollama drama as 'easy-to-exploit' critical flaw found in open source AI server

About a thousand vulnerable instances still exposed online, we're told A now-patched vulnerability in Ollama a popular open source project for running LLMs can lead to remote code execution, according to flaw finders who warned that upwards of 1,000 vulnerable instances remain exposed to the internet.

Published: 2024-06-24T20:34:08



The Register - Security

Car dealers stuck in the slow lane after cyber woes at software biz CDK

More customers self-reporting to SEC as disruption carries into second week The number of US companies filing Form 8-Ks with the Securities and Exchange Commission (SEC) and referencing embattled car dealership software biz CDK is mounting.

Published: 2024-06-24T18:02:13



The Register - Security

'Mirai-like' botnet observed attacking EOL Zyxel NAS devices

Seems like as good a time as any to upgrade older hardware There are early indications of active attacks targeting end-of-life Zyxel NAS boxes just a few weeks after details of three critical vulnerabilities were made public.

Published: 2024-06-24T14:39:08



The Register - Security

Levi's and more affected in pants-dropping week of data breaches

A busy few days for security teams There were data breaches galore in the US last week with various major incidents reported to state attorneys general, some in good time, some not.

Published: 2024-06-24T10:34:14



The Register - Security

Meta, Microsoft SQL Server make strange bedfellows on a couch of cyber-pain

Yanks get food poisoning far more often than Brits. Is American IT just as sickening? Opinion When two stories from opposite ends of the IT universe boil down to the same thing, sound the klaxons. At the uber-fashionable AI end of tech, Meta has grudgingly complied with a ruling not to feed European social media crap into its training data. Meanwhile, in the industrial slums, 20 percent of running Microsoft SQL Server instances are now past the end of support.

Published: 2024-06-24T08:30:05



The Register - Security

Admin took out a call center and almost their career with a cut and paste error

Have you heard the one about the techie who forgot what was on the clipboard? Who, me? Brace yourselves, gentle readers, for it is once again Monday, and the work week has commenced. Thankfully, The Reg is here with another dose of Who, Me? in which readers share tales of times they had a day worse than the one you're having. We hope it helps.

Published: 2024-06-24T07:29:08



The Register - Security

Snowflake breach snowballs as more victims, perps, come forward

Also: The leaked Apple internal tools that weren't; TV pirate pirates convicted; and some critical vulns, too Infosec in brief The descending ball of trouble over at Snowflake keeps growing larger, with more victims and even one of the alleged intruders coming forward last week.

Published: 2024-06-24T02:14:10



The Register - Security

Risk of installing dodgy extensions from Chrome store way worse than Google's letting on, study suggests

All depends on how you count it Chocolate Factory claims 1% fail rate Google this week offered reassurance that its vetting of Chrome extensions catches most malicious code, even as it acknowledged that "as with any software, extensions can also introduce risk."

Published: 2024-06-23T10:36:10



The Register - Security

From network security to nyet work in perpetuity: What's up with the Kaspersky US ban?

It's been a long time coming. Now our journos speak their brains Kettle The US government on Thursday banned Kaspersky Lab from selling its antivirus and other products in America from late July, and from issuing updates and malware signatures from October.

Published: 2024-06-22T08:16:12



The Register - Security

Change Healthcare finally spills the tea on what medical data was stolen by cyber-crew

'Substantial proportion' of America to get a little note from next month Change Healthcare is formally notifying some of its pharmacy and hospital customers that their patients' data was stolen from it by ransomware criminals back in February and for the first time has concretely disclosed the types of information swiped during that IT intrusion.

Published: 2024-06-21T21:33:09



The Register - Security

Uncle Sam sanctions Kaspersky's top bosses but not Mr K himself

Here's America's list of the supposedly dirty dozen Uncle Sam took another swing at Kaspersky Lab today and sanctioned a dozen C-suite and senior-level executives at the antivirus maker, but spared CEO and co-founder Eugene Kaspersky.

Published: 2024-06-21T20:23:08



The Register - Security

Phoenix UEFI flaw puts long list of Intel chips in hot seat

Researchers discuss it in same breath as BlackLotus and MosaicRegressor A new vulnerability in UEFI firmware is threatening the security of a wide range of Intel chip families in a similar fashion to BlackLotus and others like it.

Published: 2024-06-21T16:27:05



The Register - Security

Qilin cyber scum leak data they claim belongs to London hospitals pathology provider

At least they didn t get paid their $50M ransom demand The ransomware gang responsible for the chaos at London hospitals kept true to its word and released a trove of data that it claims belongs to pathology services provider Synnovis.

Published: 2024-06-21T11:15:07



The Register - Security

Since joining NATO, Sweden claims Russia has been borking Nordic satellites

If Putin likes jammin', we hope NATO likes jammin' too Sweden says its satellites have been impacted by "harmful interference" from Russia ever since the Nordic nation joined the North Atlantic Treaty Organization (NATO) last March.

Published: 2024-06-21T06:57:09



The Register - Security

Coding error in forgotten API blamed for massive data breach

Australian telco Optus allegedly left redundant website with poor access controls online for years The data breach at Australian telco Optus, which saw over nine million customers' personal information exposed, has been blamed on a coding error that broke API access controls, and was left in place for years.

Published: 2024-06-21T05:38:24



The Register - Security

Crooks get their hands on 500K+ radiology patients' records in cyber-attack

Two ransomware gangs bragged of massive theft of personal info and medical files Consulting Radiologists has notified almost 512,000 patients that digital intruders accessed their personal and medical information during a February cyberattack.

Published: 2024-06-20T21:43:06



The Register - Security

Biden bans Kaspersky: No more sales, updates in US

Blockade begins July 20 on national security grounds as antivirus slinger vows to fight back The Biden administration today banned the sale of Kaspersky Lab products and services in the United States, declaring the Russian biz a national security risk.

Published: 2024-06-20T21:07:31



The Register - Security

Car dealer software bigshot CDK pulls systems offline twice amid 'cyber incident'

Downtime set to crash into next week The vendor behind the software on which nearly 15,000 car dealerships across the US rely says an ongoing "cyber incident" has forced it to pull systems offline for a second time in as many days.

Published: 2024-06-20T20:50:11



The Register - Security

Crypto exchange Kraken accuses blockchain security outfit CertiK of extortion

Researchers allegedly stole $3M using the vulnerability, then asked how much it was really worth Kraken, one of the largest cryptocurrency exchanges in the world, has accused a trio of security researchers of discovering a critical bug, expoliting it to steal millions in digital cash, then using stolen funds to extort the exchange for more.

Published: 2024-06-20T17:35:13



The Register - Security

Russia's cyber spies still threatening French national security, democracy

Publishing right before a major election is apparently just a coincidence A fresh report into the Nobelium offensive cyber crew published by France's computer emergency response team (CERT-FR) highlights the group's latest tricks as the country prepares for a major election and to host this year's Olympic and Paralympic Games.

Published: 2024-06-20T12:27:13



The Register - Security

Qilin: We knew our Synnovis attack would cause a healthcare crisis at London hospitals

Cybercriminals claim they used a zero-day to breach pathology provider s systems Interview The ransomware gang responsible for a healthcare crisis at London hospitals says it has no regrets about its cyberattack, which was entirely deliberate, it told The Register in an interview.

Published: 2024-06-20T10:29:06



The Register - Security

Amtrak confirms crooks are breaking into accounts using creds swiped from other DBs

Railco goes full steam ahead with notification letters to Rewards users about spilled card details and more US rail service Amtrak is writing to users of its Guest Rewards program to inform them that their data is potentially at risk following a derailment of their individual account security.

Published: 2024-06-19T13:00:11



The Register - Security

That PowerShell 'fix' for your root cert 'problem' is a malware loader in disguise

Control-C, Control-V, Enter ... Hell Crafty criminals are targeting thousands of orgs around the world in social-engineering attacks that use phony error messages to trick users into running malicious PowerShell scripts.

Published: 2024-06-19T07:27:28



The Register - Security

Rogue uni IT director pleads guilty after fraudulently buying $2.1M of tech

Two decades in the clink would be quite an education A now-former IT director has pleaded guilty to defrauding the university at which he was employed and a computer equipment supplier for $2.1 million over five years.

Published: 2024-06-18T23:46:11



The Register - Security

Dark-web kingpin puts 'stolen' internal AMD databases, source code up for sale

Chip designer really gonna need to channel some Zen right now Updated AMD's IT team is no doubt going through its logs today after cyber-crooks put up for sale what is claimed to be internal data stolen from the US microprocessor designer.

Published: 2024-06-18T23:01:39



The Register - Security

EU attempt to sneak through new encryption-eroding law slammed by Signal, politicians

If you call 'client-side scanning' something like 'upload moderation,' it still undermines privacy, security On Thursday, the EU Council is scheduled to vote on a legislative proposal that would attempt to protect children online by disallowing confidential communication.

Published: 2024-06-18T22:22:06



The Register - Security

CHERI Alliance formed to promote memory security tech ... but where's Arm?

Academic-industry project takes next step as key promoter chip designer licks its wounds Updated A group of technology organizations has formed the CHERI Alliance CIC (Community Interest Company) to promote industry adoption of the security technology focused on memory access.

Published: 2024-06-18T15:04:12



The Register - Security

Uncle Sam ends financial support to orgs hurt by Change Healthcare attack

Billions of dollars made available but worst appears to be over The US government is winding down its financial support for healthcare providers originally introduced following the ransomware attack at Change Healthcare in February.

Published: 2024-06-18T13:15:15



The Register - Security

NHS boss says Scottish trust wouldn't give cyberattackers what they wanted

CEO of Dumfries and Galloway admits circa 150K people should assume their details leaked The chief exec at NHS Dumfries and Galloway will write to thousands of folks in the Scottish region whose data was stolen by criminals, admitting the lot of it was published after the trust did not give in to the miscreants' demands.

Published: 2024-06-18T11:29:11



Security Latest

Amazon Is Investigating Perplexity Over Claims of Scraping Abuse

AWS hosted a server linked to the Bezos family- and Nvidia-backed search startup that appears to have been used to scrape the sites of major outlets, prompting an inquiry into potential rules violations.

Published: 2024-06-27T22:15:21



Security Latest

Surprise! The Latest ‘Comprehensive’ US Privacy Bill Is Doomed

Gutted of civil rights protections by Democrats to woo pro-business Republicans, the American Privacy Rights Act was pulled from a key congressional hearing and appears unlikely to receive a full vote.

Published: 2024-06-27T15:55:24



Security Latest

War Crime Prosecutions Enter a New Digital Age

A custom platform developed by SITU Research aided the International Criminal Court’s prosecution in a war crimes trial for the first time. It could change how justice is enacted on an international scale.

Published: 2024-06-26T17:35:10



Security Latest

The Julian Assange Saga Is Finally Over

WikiLeaks founder Julian Assange has agreed to plead guilty to one count of espionage in US court on Wednesday, ending a years-long legal battle between the US government and a controversial publisher.

Published: 2024-06-25T13:09:29



Security Latest

The Mystery of AI Gunshot-Detection Accuracy Is Finally Unraveling

How accurate are gunshot detection systems, really? For years, it's been a secret, but new reports from San Jose and NYC show these systems have operated well below their advertised accuracy rates.

Published: 2024-06-25T11:00:00



Security Latest

Deepfake Creators Are Revictimizing GirlsDoPorn Sex Trafficking Survivors

The most notorious deepfake sexual abuse website is hosting altered videos originally published as part of the GirlsDoPorn operation. Experts say this new low is only the beginning.

Published: 2024-06-25T10:00:00



Security Latest

Red Tape Is Making Hospital Ransomware Attacks Worse

With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives.

Published: 2024-06-24T09:00:00



Security Latest

A Catastrophic Hospital Hack Ends in a Leak of 300M Patient Records

Plus: Alleged Apple source code leaks online, cybercrime group Scattered Spider's alleged kingpin gets arrested, and more.

Published: 2024-06-22T10:30:00



Security Latest

Perplexity Plagiarized Our Story About How Perplexity Is a Bullsh*t Machine

Experts aren’t unanimous about whether the AI-powered search startup’s practices could expose it to legal claims ranging from infringement to defamation but some say plaintiffs would have strong cases.

Published: 2024-06-21T17:22:51



Security Latest

US Bans Kaspersky Software

Using a Trump-era authority, the US Commerce Department has banned the sale of Kaspersky’s antivirus tools to new customers in the US, citing alleged threats to national security.

Published: 2024-06-20T20:15:00



Security Latest

Perplexity Is a Bullsh*t Machine

A WIRED investigation shows that the AI-powered search startup Forbes has accused of stealing its content is surreptitiously scraping and making things up out of thin air.

Published: 2024-06-19T13:00:00



Security Latest

This Is What Would Happen if China Invaded Taiwan

The new book World on the Brink: How America Can Beat China in the Race for the 21st Century lays out what might actually happen if China were to invade Taiwan in 2028.

Published: 2024-06-19T10:00:00



Security Latest

Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account and others by first breaching a third-party contractor.

Published: 2024-06-17T09:30:00



Security Latest

Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers

CCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.

Published: 2024-06-17T07:00:00



Security Latest

How to Spot a Business Email Compromise Scam

In this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here’s what do to when a bad actor lands in your inbox.

Published: 2024-06-16T12:00:00



Security Latest

Let Slip the Robot Dogs of War

The United States and China appear locked in a race to weaponize four-legged robots for military applications.

Published: 2024-06-16T09:00:00



Security Latest

A Guide to RCS, Why Apple’s Adopting It, and How It Makes Texting Better

The messaging standard promises better security and cooler features than plain old SMS. Android has had it for years, but now iPhones are getting it too.

Published: 2024-06-15T12:30:00



Security Latest

Ukrainian Sailors Are Using Telegram to Avoid Being Tricked Into Smuggling Oil for Russia

Contract seafarers in Ukraine are turning to online whisper networks to keep themselves from being hired into Russia’s sanctions-busting shadow fleet.

Published: 2024-06-15T11:00:00



Security Latest

Ransomware Attacks Are Getting Worse

Plus: US lawmakers have nothing to say about an Israeli influence campaign aimed at US voters, a former LA Dodgers owner wants to fix the internet, and more.

Published: 2024-06-15T10:30:00



Security Latest

Medical-Targeted Ransomware Is Breaking Records After Change Healthcare’s $22M Payout

Cybersecurity firm Recorded Future counted 44 health-care-related incidents in the month after Change Healthcare’s payment came to light the most it’s ever seen in a single month.

Published: 2024-06-12T10:30:00



News Packet Storm

GitLab Security Updates Patch 14 Vulnerabilities

Designed Receivable Solutions Data Breach Impacts 585,000 People

Korean Telco Allegedly Infected Its P2P Users With Malware

New MOVEit Critical Bug Sees Swift Exploitation Attempts

Feds Put $5M Bounty On CryptoQueen Ruja Ignatova

US Lawmakers Wave Red Flags Over Chinese Drone Dominance

WhisperGate Suspect Indicted As US Offers A $10 Million Bounty

Probllama: Ollama Remote Code Execution Vulnerability

Polyfill Supply Chain Attack Hits Over 100k Websites

Microsoft Blamed For Million-Plus Patient Record Theft At US Hospital Giant

P2Pinfect Worm Now Dropping Ransomware On Redis Servers

Ebay Seller Offers Stingray Device For $100,000

Pentagon Taken To Task Over Background Check Security

Deadline Looms For Alleged LockBit Extortion Over Feds Of 33TB Of Data

Meta's VR Headset Vulnerable To Ransomware Attacks

Julian Assange Pleads Guilty, Goes Home

Neiman Marcus Data Breach Exposed As Hacker Offers To Sell Stolen Info

Google Framework Helps LLMs Perform Basic Vuln Research

Zip Slip Meets Artifactory: A Bug Bounty Story

Snowflake Breach Snowballs With More Victims

Cyber Attack Compromised Indonesian Datacenter, Ransom Sought

CDK Global Begins To Restore Systems After Cyber Attack Hits Thousands Of Retailers

Levi's And More Affected In Pants Dropping Week Of Data Breaches

Car Dealerships Disrupted As CDK Hack Worsens

President Biden Bans Kaspersky Antivirus Software Over Russia Ties

SecurityWeek

US Announces Charges, Reward for Russian National Behind Wiper Attacks on Ukraine

Designed Receivable Solutions Data Breach Impacts 585,000 People

GitLab Security Updates Patch 14 Vulnerabilities

US, Allies Warn of Memory Unsafety Risks in Open Source Software

Inside the Mind of a CISO: Survey and Analysis

Gas Chromatograph Hacking Could Have Serious Impact: Security Firm

CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities

Evolve Bank Data Leaked After LockBit’s ‘Federal Reserve Hack’

‘Phantom’ Source Code Secrets Haunt Major Organizations

WikiLeaks Founder Julian Assange Returns to Australia a Free Man After US Legal Battle Ends

CISA News

CISA Releases Guide to Enhance Election Security Through Public Communications

CISA, JCDC, Government and Industry Partners Conduct AI Tabletop Exercise

CISA Hosts First Annual Information and Communications Technology Supply Chain Risk Management Task Force Conference

Readout from CISA’s 2024 Second Quarter Cybersecurity Advisory Committee Meeting

CISA and ONCD Award the Winners of the Fifth Annual President’s Cup Cybersecurity Competition

CISA Publishes Encrypted DNS Implementation Guidance to Federal Agencies

CISA, DHS, FBI and International Partners Publish Guide for Protecting High-Risk Communities

CISA Announces Secure by Design Commitments from Leading Technology Providers

CISA Unveils New Public Service Announcement We Can Secure Our World

DHS, CISA Announce Membership Changes to the Cyber Safety Review Board

CISA Blog

Why SMBs Don’t Deploy Single Sign On (SSO)

CISA, SAFECOM and NCSWIC Publish SAFECOM Guidance on Emergency Communications Grants

CISA Releases the FY 2024 Rural Emergency Medical Communications Demonstration Project (REMCDP) Notice of Funding Opportunity

National Internet Safety Month: This June, Take 4 Easy Steps to Stay Safe Online

NCSWIC releases the NCSWIC Video Series

A Plan to Protect Critical Infrastructure from 21st Century Threats

Prepared Together Cyber Storm IX Recap

Securing Tomorrow: A Recap of CISA’s Cyber Resilient 911 Symposium (Central Region)

Opening Statement by CISA Director Jen Easterly at the Update on Foreign Threats to the 2024 Elections Hearing

CISA Updates Toolkit with Nine New Resources to Promote Public Safety Communications and Cyber Resiliency

All CISA Advisories

Yokogawa FAST/TOOLS and CI Server

Johnson Controls Illustra Essentials Gen 4

TELSAT marKoni FM Transmitter

Johnson Controls Illustra Essentials Gen 4

Johnson Controls Illustra Essentials Gen 4

SDG Technologies PnPSCADA

Johnson Controls Illustra Essentials Gen 4

CISA Releases Seven Industrial Control Systems Advisories

CISA and Partners Release Guidance for Exploring Memory Safety in Critical Open Source Projects

CISA Adds Three Known Exploited Vulnerabilities to Catalog

Exploit-DB.com RSS Feed

[webapps] Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS)

[webapps] SolarWinds Platform 2024.1 SR1 - Race Condition

[webapps] Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated)

[webapps] Poultry Farm Management System v1.0 - Remote Code Execution (RCE)

[webapps] Boelter Blue System Management 1.3 - SQL Injection

[webapps] Rebar3 3.13.2 - Command Injection

[webapps] ZwiiCMS 12.2.04 - Remote Code Execution (Authenticated)

[remote] Zyxel IKE Packet Decoder - Unauthenticated Remote Code Execution (Metasploit)

[webapps] WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated)

[webapps] PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows)

[webapps] AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability.

[webapps] AEGON LIFE v1.0 Life Insurance Management System - Unauthenticated Remote Code Execution (RCE)

[webapps] XMB 1.9.12.06 - Stored XSS

[webapps] Carbon Forum 5.9.0 - Stored XSS

[webapps] AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS)

[webapps] appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated)

[webapps] CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)

[webapps] WBCE CMS v1.6.2 - Remote Code Execution (RCE)

[webapps] Monstra CMS 3.0.4 - Remote Code Execution (RCE)

[webapps] Dotclear 2.29 - Remote Code Execution (RCE)

[webapps] Serendipity 2.5.0 - Remote Code Execution (RCE)

[webapps] Sitefinity 15.0 - Cross-Site Scripting (XSS)

[webapps] Craft CMS Logs Plugin 3.0.3 - Path Traversal (Authenticated)

[remote] ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE) & SSH Access

[remote] Wipro Holmes Orchestrator 20.4.1 - Log File Disclosure

[webapps] FreePBX 16 - Remote Code Execution (RCE) (Authenticated)

[webapps] Akaunting 3.1.8 - Server-Side Template Injection (SSTI)

[webapps] Check Point Security Gateway - Information Disclosure (Unauthenticated)

[webapps] Aquatronica Control System 5.1.6 - Information Disclosure

[webapps] changedetection < 0.45.20 - Remote Code Execution (RCE)

[webapps] ElkArte Forum 1.1.9 - Remote Code Execution (RCE) (Authenticated)

[webapps] iMLog < 1.307 - Persistent Cross Site Scripting (XSS)

[webapps] BWL Advanced FAQ Manager 2.0.3 - Authenticated SQL Injection

[webapps] htmlLawed 1.2.5 - Remote Code Execution (RCE)

[webapps] PopojiCMS 2.0.1 - Remote Command Execution (RCE)

[webapps] Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE)

[webapps] Apache OFBiz 18.12.12 - Directory Traversal

[webapps] Wordpress Theme XStore 9.3.8 - SQLi

[webapps] Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)

[webapps] Prison Management System - SQL Injection Authentication Bypass

[webapps] PyroCMS v3.0.1 - Stored XSS

[webapps] CE Phoenix Version 1.0.8.20 - Stored XSS

[webapps] Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)

[webapps] Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)

[remote] CrushFTP < 11.1.0 - Directory Traversal

[local] Plantronics Hub 3.25.1 - Arbitrary File Read

[webapps] Apache mod_proxy_cluster - Stored XSS

[webapps] iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)

[webapps] Clinic Queuing System 1.0 - RCE

[webapps] Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure

Full Disclosure

SEC Consult SA-20240624-0 :: Multiple Vulnerabilities allowing complete bypass in Faronics WINSelect (Standard + Enterprise)

SEC Consult SA-20240620-0 :: Arbitrary File Upload in edu-sharing (metaVentis GmbH)

Zip Slip meets Artifactory: A Bug Bounty Story

Backdoor.Win32.Plugx / Insecure Permissions

[SBA-ADV-20240321-01] CVE-2024-5676: Paradox IP150 Internet Module Cross-Site Request Forgery

Microsoft leak of PlayReady developer / Warbird libs

Business Logic Flaw and Username Enumeration in spa-cartcmsv1.9.0.6

APPLE-SA-06-10-2024-1 visionOS 1.2

CyberDanube Security Research 20240604-0 | Multiple Vulnerabilities in utnserver Pro/ProMAX/INU-100

SEC Consult SA-20240606-0 :: Multiple critical vulnerabilities in Kiuwan SAST on-premise (KOP) & cloud/SaaS & Kiuwan Local Analyzer (KLA)

Blind SQL Injection - fengofficev3.11.1.2

Trojan.Win32.DarkGateLoader (multi variants) / Arbitrary Code Execution

SQL Injection Vulnerability in Boelter Blue System Management (version 1.3)

CyberDanube Security Research 20240528-0 | Multiple Vulnerabilities in ORing IAP-420

HNS-2024-06 - HN Security Advisory - Multiple vulnerabilities in Eclipse ThreadX

Open Source Security

Ghostscript 10.03.1 (2024-05-02) fixed 5 CVEs including CVE-2024-33871 arbitrary code execution

Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor

CVE-2024-5535: OpenSSL: SSL_select_next_proto buffer overread

Multiple vulnerabilities in Jenkins plugins

Re: Fwd: Node.js security updates for all active release lines, July 2024

Fwd: [siren] Reputation Farming Using Closed Github Issues / PRs

Fwd: Node.js security updates for all active release lines, July 2024

Re: Out-of-bounds read & write in the glibc's qsort()

Re: Out-of-bounds read & write in the glibc's qsort()

Re: Arbitrary shell command evaluation in Org mode (GNU Emacs)

Re: Arbitrary shell command evaluation in Org mode (GNU Emacs)

CVE-2024-27136: Apache JSPWiki: Cross-site scripting vulnerability on upload page

Re: Arbitrary shell command evaluation in Org mode (GNU Emacs)

Arbitrary shell command evaluation in Org mode (GNU Emacs)

CVE-2024-29868: Apache StreamPipes, Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation






© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us