Recent Security News
-
Kubernetes Vulnerability Allows Remote Code Execution on Windows Endpoints
March 14, 2024 at 07:57AM Akamai issued a warning about a high-severity Kubernetes vulnerability, CVE-2023-5528, affecting default installations. The issue allows arbitrary code execution with System privileges on Windows endpoints when creating a pod with a local volume. Akamai provided a PoC exploit and advised upgrading to Kubernetes version 1.28.4, even for clusters without Windows…
-
Government Launches Probe Into Change Healthcare Data Breach
March 14, 2024 at 06:09AM The US Department of Health and Human Services’ Office for Civil Rights (OCR) is investigating the recent Change Healthcare data breach, aiming to determine if protected health information was compromised. The ransomware attack disrupted healthcare operations, impacting 7,000 pharmacies and hospitals. OCR will focus on Change Healthcare and UnitedHealth Group’s…
-
Nissan Data Breach Affects 100,000 Individuals
March 14, 2024 at 06:09AM Nissan Oceania has notified 100,000 people of a data breach caused by a ransomware attack in late 2023. The breach impacted Nissan Motor Corporation, Nissan Financial Services, and other affiliated brands’ customers, dealers, and employees. The stolen information includes government identification and personal details. Nissan is providing identity theft and…
-
Ande Loader Malware Targets Manufacturing Sector in North America
March 14, 2024 at 04:21AM Blind Eagle threat actor employs Ande Loader to distribute RATs, targeting Spanish-speaking users in the North American manufacturing industry through phishing emails. This expansion includes leveraging RAR and BZ2 archives to activate the infection chain. Additionally, an alternative attack sequence via Discord CDN link distributes NjRAT. Crypters written by Roda…
-
Hackers exploit Windows SmartScreen flaw to drop DarkGate malware
March 14, 2024 at 02:23AM DarkGate malware exploits a fixed Windows Defender SmartScreen flaw to install fake software, overcoming security checks. This flaw, tracked as CVE-2024-21412, allows attackers to execute files automatically. Trend Micro reports that DarkGate operators are using this vulnerability to enhance infection rates. The campaign involves a multi-step infection chain and employs…