Aggregator
Why (and How) APIs and Web Applications Are Under Siege
Apple security advisory (AV24-428)
$3000 – цена свободы слова в Instagram: инструмент Meta разрушает карьеру
Uncover Your Attack Surface with Discover from DataDome
Discover, a new feature available to all DataDome customers, enables organizations to identify blind spots and shrink attack surfaces against malicious bots and fraudsters.
The post Uncover Your Attack Surface with Discover from DataDome appeared first on Security Boulevard.
Enzoic Dark Web Data Integration with IDTR Solutions
For IDTR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.
The post Enzoic Dark Web Data Integration with IDTR Solutions appeared first on Security Boulevard.
Cuckoo Spear Attacking Windows Users With Highly Sophisticated Malware
Researchers uncovered Cuckoo Spear, a new threat actor associated with the APT10 group, demonstrating persistent stealthy operations within victim networks for two to three years. The advanced persistent threat (APT) utilizes novel techniques and tools to conduct cyber espionage, emphasizing the critical need for robust security protocols, continuous threat monitoring, and collaborative intelligence sharing among […]
The post Cuckoo Spear Attacking Windows Users With Highly Sophisticated Malware appeared first on Cyber Security News.
ubook Suffered Data Breach, 710,000 Users’ Data Exposed
The popular audiobook and podcast platform uBook has been affected by a data breach that exposed the personal information of 710,000 users. According to a tweet by ThreatMon, the breach, which occurred in July 2024, was announced by a member of a dark web forum, raising serious concerns about user privacy and data security. Details […]
The post ubook Suffered Data Breach, 710,000 Users’ Data Exposed appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
OAuth и XSS: смертельный коктейль для безопасности веб-гигантов
Trend Micro Stops Deepfakes and AI-Based Cyberattacks for Consumers and Enterprises
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-37085 VMware ESXi Authentication Bypass Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
DigiCert Certificate Revocations
Update 9:00 a.m., EDT, July 31, 2024:
DigiCert has provided updated information and revocation timelines which can be found by visiting: https://status.digicert.com/
CISA encourages customers to contact DigiCert if unable to reissue/rekey certificates by the updated revocation deadline: 3:30 p.m., EDT, July 31, 2024.
Initial Alert (7:00 p.m., EDT, July 30, 2024):
DigiCert, a certificate authority (CA) organization, is revoking a subset of transport layer security (TLS) certificates due to a non-compliance issue with domain control verification (DCV). Revocation of these certificates may cause temporary disruptions to websites, services, and applications relying on these certificates for secure communication. DigiCert has notified affected customers and provided instructions on how to replace non-compliant certificates.
CISA urges DigiCert customers to check their DigiCert account to view any non-compliant certificates and reissue/rekey certificates. See DigiCert’s Revocation Incident Notice for customer instructions and more information.
Apple Releases Security Updates for Multiple Products
Apple released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply necessary updates:
Researchers Hacked into Medusa Ransomware Group’s Cloud Storage
The Medusa Ransomware Group experienced significant operational security (OPSEC) failure, which was primarily due to the group’s use of Rclone, a widely utilized tool for data exfiltration, to store stolen data in the cloud storage service put.io. The key issue arose from a misconfigured Rclone configuration file, which contained access tokens and other credentials, inadvertently […]
The post Researchers Hacked into Medusa Ransomware Group’s Cloud Storage appeared first on Cyber Security News.
iPhone Users Beware! Fake Postal Messages Stealing Your Login Credentials
Cybercriminals have launched a smishing campaign targeting iPhone users in India, impersonating India Post. Malicious iMessages falsely claim a package awaits at an India Post warehouse, enticing victims to click on fraudulent links. It leverages the widespread trust in India Post and the popularity of iPhones to deceive users into compromising their devices and potentially […]
The post iPhone Users Beware! Fake Postal Messages Stealing Your Login Credentials appeared first on Cyber Security News.
Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails
Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security numbers. This method exploits human emotions and trust, allowing a threat actor to compromise an account, steal an identity, or disseminate malware with little technical skill. Guardio Labs recently discovered “EchoSpoofing” which is a serious […]
The post Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploiting ESXi Hypervisor Auth Bypass Flaw For Ransomware Attacks
Hackers prefer ransomware attacks primarily because they offer the highest chance of financial gain. By locking victims’ information systems and asking for payment to release them, ransomware attacks lock victims’ information systems and demand payment to unlock them. Considering such a high level of risk, victims are pushed to make ransom payments as fast as […]
The post Hackers Exploiting ESXi Hypervisor Auth Bypass Flaw For Ransomware Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
史上最大规模宕机事件的10个重要教训
Threat Actor Allegedly Claiming Hack of Microsoft Employee’s Device
A threat actor has taken to social media to claim responsibility for hacking into a Microsoft employee’s device. The announcement was made via a Telegram post, accompanied by a video purportedly showing the breach’s aftermath, as per a tweet by ThreatMon, a Cybersecurity Intelligence Platform. Details of the Alleged Breach The threat actor alleges that […]
The post Threat Actor Allegedly Claiming Hack of Microsoft Employee’s Device appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS Systems, Patch Now
A serious flaw in OpenSSH servers, dubbed “regreSSHion,” affects macOS systems and could allow a remote attacker to execute arbitrary code. A few weeks ago, Qualys’ threat research unit discovered this vulnerability, which has been identified as regreSSHion and tracked as CVE-2024-6387. It was found that on glibc-based Linux systems, the vulnerability—a signal handler race […]
The post Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS Systems, Patch Now appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.