Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

October 28, 2024 at 01:45PM Evasive Panda, a China-linked cyber espionage group, launched a new toolset, CloudScout, targeting Taiwanese government and religious organizations. This .NET-based malware extracts data from cloud services by hijacking authenticated sessions using stolen cookies. ESET noted the malware’s modular design includes specific functions for accessing Google Drive, Gmail, and Outlook. ### … Read more

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27)

October 28, 2024 at 08:33AM Cybersecurity news reveals new threats including a critical Fortinet flaw under exploitation, severe cryptographic issues in cloud services, and North Korean Lazarus Group exploiting a Chrome vulnerability. Notably, Delta Air Lines sued CrowdStrike for a major outage, while CISA investigates unauthorized telecom access by Chinese threat actors. Stay informed and … Read more

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials

October 28, 2024 at 07:26AM Cybersecurity researchers warn of a rise in phishing attacks utilizing Webflow, targeting sensitive crypto wallet information and webmail credentials. Over 120 organizations, primarily in North America and Asia, are affected. Attackers exploit legitimate services to create deceptive phishing pages, increasing their success in stealing user credentials. ### Meeting Takeaways 1. … Read more

Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes

October 28, 2024 at 07:26AM Operational Technology (OT) security is crucial for marine vessels and port operators, as digitalization leads to new security challenges. SSH’s PrivX OT Edition addresses these issues by providing secure, centralized remote access management for critical systems, enhancing safety, compliance, and operational efficiency while mitigating cyber risks across the maritime industry. … Read more

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

October 26, 2024 at 05:12AM TeamTNT, a notable cryptojacking group, is launching a large-scale campaign targeting cloud environments to mine cryptocurrencies using compromised Docker daemons and servers. They deploy Sliver malware, offer breached computational power for rent, and have shifted tactics, indicating an evolving and mature illicit business model in the cybercrime landscape. ### Meeting … Read more

Just how private is Apple’s Private Cloud Compute? You can test it to find out

October 25, 2024 at 11:13AM Apple announced its Private Cloud Compute (PCC) platform for AI applications at its Worldwide Developer Conference in June. The company is inviting security researchers to test its security systems, offering bounties for vulnerabilities. PCC features custom hardware and a hardened OS, with resources made publicly available for independent verification. ### … Read more

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security

October 25, 2024 at 09:25AM Apple has launched its Private Cloud Compute Virtual Research Environment, inviting researchers to validate its privacy claims and offering substantial monetary rewards for identifying vulnerabilities. The initiative aims to enhance AI security while ensuring user privacy, complemented by accessible source code on GitHub for deeper analysis. ### Meeting Takeaways (October … Read more

Apple creates Private Cloud Compute VM to let researchers find bugs

October 24, 2024 at 06:52PM Apple has launched a Virtual Research Environment (VRE) for public testing of its Private Cloud Compute (PCC) system, enhancing security through a $1 million bounty program for vulnerability findings. The source code for key components is available, allowing researchers to analyze and verify PCC’s privacy and security features. ### Meeting … Read more

AWS’s Predictable Bucket Names Make Accounts Easier to Crack

October 24, 2024 at 06:06PM The AWS Cloud Development Kit (CDK) has a vulnerability due to its predictable S3 bucket naming during deployment, potentially allowing unauthorized access. Researchers from Aqua found this affects about 1% of users. They advise modifying bucket names and emphasize not using predictable patterns to prevent exploitation. ### Meeting Takeaways: 1. … Read more

Grip Security Releases 2025 SaaS Security Risks Report

October 24, 2024 at 05:50PM Grip Security’s report, “2025 SaaS Security Risks,” reveals that 90% of SaaS applications remain unmanaged, posing significant risks for organizations. With a 40% increase in SaaS applications and rising usage of AI tools, the need for a collaborative, identity-driven security approach is critical to mitigate these vulnerabilities effectively. **Meeting Takeaways … Read more