1
35
submitted 7 hours ago by [email protected] to c/[email protected]
2
26
submitted 6 hours ago by [email protected] to c/[email protected]
3
22
submitted 7 hours ago by [email protected] to c/[email protected]
4
21
submitted 6 hours ago by [email protected] to c/[email protected]
5
13
submitted 2 days ago by [email protected] to c/[email protected]
6
67
submitted 3 days ago by [email protected] to c/[email protected]
7
51
submitted 3 days ago by [email protected] to c/[email protected]
8
37
submitted 3 days ago by [email protected] to c/[email protected]
9
19
submitted 3 days ago by [email protected] to c/[email protected]
10
15
submitted 3 days ago by [email protected] to c/[email protected]
11
11
submitted 3 days ago by [email protected] to c/[email protected]
12
9
submitted 3 days ago by [email protected] to c/[email protected]
13
7
submitted 3 days ago by [email protected] to c/[email protected]
14
23
submitted 4 days ago* (last edited 4 days ago) by [email protected] to c/[email protected]

It's from MS, but I'll take anyways.

Summary: Attackers exploit critical vulnerabilities in OpenMetadata to access Kubernetes workloads and conduct cryptocurrency mining. Microsoft recommends updating OpenMetadata to version 1.3.1 or later and using Microsoft Defender for Cloud for detection of malicious activities. Relevant vulnerabilities include CVE-2024-28255, CVE-2024-28847, CVE-2024-28253, CVE-2024-28848, CVE-2024-28254.

IOCs (hashes with good detection rate on VT):

7c6f0bae1e588821bd5d66cd98f52b7005e054279748c2c851647097fa2ae2df 19a63bd5d18f955c0de550f072534aa7a6a6cc6b78a24fea4cc6ce23011ea01d 31cd1651752eae014c7ceaaf107f0bf8323b682ff5b24c683a683fdac7525bad

IP 8[.]222[.]144[.]60

IP 61[.]160[.]194[.]160

IP 8[.]130[.]115[.]208

[Edit: added summary]

15
80
submitted 5 days ago by [email protected] to c/[email protected]
16
16
submitted 4 days ago by [email protected] to c/[email protected]
17
57
submitted 5 days ago by [email protected] to c/[email protected]
18
14
submitted 4 days ago by [email protected] to c/[email protected]
19
17
submitted 4 days ago by [email protected] to c/[email protected]

A new stealthy backdoor malware called Kapeka, likely created by Russia's APT group Sandworm, has been targeting Eastern Europe.

20
9
submitted 4 days ago by [email protected] to c/[email protected]
21
30
submitted 5 days ago by [email protected] to c/[email protected]
22
10
submitted 4 days ago by [email protected] to c/[email protected]

The financially motivated threat actor FIN7 targeted a large U.S. car maker with spear-phishing emails for employees in the IT department to infect systems with the Anunak backdoor.

23
10
submitted 4 days ago by [email protected] to c/[email protected]

Steal browser cookies for edge, chrome and firefox through a BOF or exe! Cookie-Monster will extract the WebKit master key, locate a browser process with a

24
70
submitted 6 days ago by [email protected] to c/[email protected]

Microsoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government’s reliance on its systems means the company continues to get a free pass.

25
16
submitted 5 days ago by [email protected] to c/[email protected]
view more: next ›

Cybersecurity

4557 readers
93 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 10 months ago
MODERATORS