Cloud Email Filtering Bypass Attack Works 80% of the Time

A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency to misconfigure them. David Strom, Contributing Writer Computer scientists have uncovered a shockingly prevalent misconfiguration in popular enterprise cloud-based email spam filtering services, along with an exploit for taking advantage of […]

read more

Google Confirms 97 Zero-Day Attacks And Points Finger At China For 12

Davey Winder Senior Contributor Veteran cybersecurity and tech analyst, journalist, hacker, author: There were 97 zero-day vulnerabilities seen in the wild in the past year, Google’s Threat Analysis Group and Mandiant have confirmed. When it comes to government-backed exploitation of zero-day vulnerabilities, there is one clear winner, according to Google: […]

read more

Australian Government Doubles Down On Cybersecurity in Wake of Major Attacks

John Leyden, Contributing Writer Government proposes more modern and comprehensive cybersecurity regulations for businesses, government, and critical infrastructures providers Down Under. The Australian government is carving out plans to revamp cybersecurity laws and regulations in the wake of a series of damaging high-profile data breaches that rocked the country. Government […]

read more

CISA publishes 447-page draft of cyber incident reporting rule

By-Jonathan Greig: The nation’s top cybersecurity agency has unveiled the initial draft of a new rule detailing how critical infrastructure organizations need to report cyberattacks to the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) posted the 447-page set of regulations under the Cyber Incident Reporting for Critical Infrastructure Act to […]

read more

CISA tags Microsoft SharePoint RCE bug as actively exploited

By Sergiu Gatlan: CISA warns that attackers are now exploiting a Microsoft SharePoint code injection vulnerability that can be chained with a critical privilege escalation flaw for pre-auth remote code execution attacks. Tracked as CVE-2023-24955, this SharePoint Server vulnerability enables authenticated attackers with Site Owner privileges to execute code remotely on vulnerable […]

read more

2M+ WordPress Sites Hit By Essential Addons For Elementor Vulnerability

SEJ STAFF-Roger Montti: XSS vulnerabilities in Essential Addons for Elementor could allow attackers to inject malicious scripts into WordPress websites Security researchers published an advisory on the popular Essential Addons For Elementor WordPress plugin which was discovered to contain a Stored Cross-Site Scripting vulnerability affecting over 2 million websites. Flaws […]

read more

Hackers Deploy STRRAT & VCURMS Malware on Windows Via GitHub

By Balaji A new phishing campaign targets users with emails containing a button to “verify payment information.” Clicking the button triggers the download of a malicious JAR file (disguised as an invoice) that leverages a PowerShell command to download two additional JARs. The JARs deploy the STRRAT and VCURMS RATs, […]

read more

Protecting yourself after a data breach: What you need to know

By Katie Kenny: More than 400,000 people have had their personal details compromised by a cyber attack on MediaWorks. The information, taken from a database of online competitions from as far back as 2016, included names, dates of birth, gender, addresses, email addresses and phone numbers. Some images and videos, submitted […]

read more

Hackers Transform The Raspberry Pi Into An Online Anonymity Tool

ByBalaji: A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS locations, emulate network settings, mimic Wi-Fi access points, and bypass anti-fraud filters. Criminals were using multiple GEOBOX devices as proxies to enhance anonymity during an […]

read more

DHCP Hacked To Escalate Privileges In Windows Domains

ByBalaji: Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains. This technique, dubbed “DHCP Coerce,” leverages legitimate privileges to compromise entire networks potentially. The vulnerability centers around the DHCP (Dynamic Host Configuration Protocol) service, which is […]

read more

Hackers poison source code from largest Discord bot platform

By Bill Toulas: The Top.gg Discord bot community with over 170,000 members has been impacted by a supply-chain attack aiming to infect developers with malware that steals sensitive information. The threat actor has been using several tactics, techniques, and procedures (TTPs) over the years including hijacking GitHub accounts, distributing malicious Python […]

read more
Trustpilot
Verified by MonsterInsights