1
31
submitted 10 hours ago by [email protected] to c/[email protected]

"After an initial chat conversation, the attacker sent a ZIP file that contained COVERTCATCH malware disguised as a Python coding challenge," researchers Robert Wallace, Blas Kojusner, and Joseph Dobson said.

The malware functions as a launchpad to compromise the target's macOS system by downloading a second-stage payload that establishes persistence via Launch Agents and Launch Daemons.

2
7
submitted 9 hours ago by [email protected] to c/[email protected]

Transport for London, the city's public transportation agency, revealed today that its staff has limited access to systems and email due to measures implemented in response to a Sunday cyberattack.

3
14
submitted 2 days ago by [email protected] to c/[email protected]
4
4
submitted 2 days ago by [email protected] to c/[email protected]

Tracked as CVE-2024-45195 and discovered by Rapid7 security researchers, this remote code execution flaw is caused by a forced browsing weakness that exposes restricted paths to unauthenticated direct request attacks.

5
31
submitted 3 days ago by [email protected] to c/[email protected]

The U.S. Federal Trade Commission (FTC) has reported a massive increase in losses to Bitcoin ATM scams, nearly ten times the amount from 2020 and reaching over $110 million in 2023.

Bitcoin ATMs are typically located in convenience stores, gas stations, and other busy areas, but instead of dispensing cash like the traditional ATMs they resemble, they allow you to buy and sell cryptocurrency.

6
8
submitted 3 days ago by [email protected] to c/[email protected]

The malvertising activity, observed in June 2024, is a departure from previously observed tactics wherein the malware has been propagated via traditional phishing emails, Unit 42 researchers Mark Lim and Tom Marsden said.

Definitions:

Malvertising - Internet advertising whose real intention is to deliver malware to the PC when the ad is clicked.

-wordnik

7
17
submitted 4 days ago by [email protected] to c/[email protected]
8
17
submitted 4 days ago by [email protected] to c/[email protected]

Though D-Link acknowledged the security problems and their severity, it noted that they fall under its standard end-of-life/end-of-support policies, meaning there will be no security updates to address them.

9
14
submitted 4 days ago by [email protected] to c/[email protected]

Written in Rust and capable of targeting both Windows and Linux/ESXi hosts, Cicada3301 first emerged in June 2024, inviting potential affiliates to join their ransomware-as-a-service (RaaS) platform via an advertisement on the RAMP underground forum.

10
4
submitted 3 days ago by [email protected] to c/[email protected]
11
23
submitted 6 days ago by [email protected] to c/[email protected]

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

12
35
submitted 1 week ago by [email protected] to c/[email protected]

Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

Definitions:

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

-Wikipedia

13
7
submitted 1 week ago by [email protected] to c/[email protected]

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM privileges using a Windows Kernel exploit.

Citrine Sleet targets financial institutions, focusing on cryptocurrency organizations and associated individuals, and has been previously linked to Bureau 121 of North Korea's Reconnaissance General Bureau.

14
1
submitted 1 week ago by [email protected] to c/[email protected]

In the watering-hole attacks, threat actors infected two websites, cabinet.gov[.]mn and mfa.gov[.]mn, which belong to Mongolia's Cabinet and Ministry of Foreign Affairs. They then injected code to exploit known flaws in iOS and Chrome on Android, with the ultimate goal of hijacking website visitors' devices.

Definitions:

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected.

-Wikipedia

Whereas zero-days are a class of vulnerability that is unknown to a software developer or hardware manufacturer, an N-day is a flaw that is already publicly known but may or may not have a security patch available.

-Dark Reading

15
13
submitted 1 month ago by [email protected] to c/[email protected]
16
14
submitted 3 months ago by [email protected] to c/[email protected]
17
12
submitted 3 months ago by [email protected] to c/[email protected]
18
14
submitted 3 months ago by [email protected] to c/[email protected]
19
38
submitted 3 months ago by [email protected] to c/[email protected]
20
2
submitted 3 months ago by [email protected] to c/[email protected]
21
25
submitted 3 months ago by [email protected] to c/[email protected]
22
17
submitted 3 months ago by [email protected] to c/[email protected]
23
13
submitted 3 months ago by [email protected] to c/[email protected]
24
38
submitted 3 months ago by [email protected] to c/[email protected]
25
5
submitted 3 months ago by [email protected] to c/[email protected]
view more: next ›

Security News

2408 readers
37 users here now

founded 1 year ago
MODERATORS