The Most Popular IT Admin Password Is Totally Depressing

October 18, 2023 at 03:07PM Researchers found that out of over 1.8 million admin portals, 40,000 had “admin” as the password, making it the most popular password among IT administrators. The study also revealed an increase in the use of default passwords. The top 10 passwords included common defaults and easy-to-guess options. This highlights the … Read more

Hacker leaks millions of new 23andMe genetic data profiles

October 18, 2023 at 02:08PM An additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany have been leaked by a hacker known as ‘Golem’. The data was obtained through credential stuffing attacks on weak passwords. The hacker claims the stolen data includes genetic information on wealthy individuals and a … Read more

EPA Turns Off Taps on Water Utility Cyber Regulations

October 18, 2023 at 02:02PM The EPA has withdrawn its rules requiring cybersecurity assessments for water utilities due to legal challenges. Experts warn that this leaves the water sector vulnerable to cyberattacks, which could have serious public health and safety consequences. The EPA is now encouraging utilities to voluntarily conduct risk assessments and provide user … Read more

Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw

October 18, 2023 at 01:48PM Google’s Threat Analysis Group has found that government-backed hacking groups from Russia and China are still using a security flaw in the WinRAR file archiving utility, despite patches being released three months ago. The vulnerability, which allows attackers to execute code, has been known since at least April and is … Read more

MATA malware framework exploits EDR in attacks on defense firms

October 18, 2023 at 12:28PM The MATA backdoor framework has been observed in attacks targeting oil and gas firms and the defense industry in Eastern Europe between August 2022 and May 2023. The attacks used spear-phishing emails to trick victims into downloading malicious executables that exploit a vulnerability in Internet Explorer. The updated MATA framework … Read more

North Korea’s Kimsuky Doubles Down on Remote Desktop Control

October 18, 2023 at 12:15PM North Korea’s Kimsuky cyber threat group has been found to be using Remote Desktop Protocol (RDP) and other tools to remotely take over targeted systems. The group has also been leveraging open source software such as TightVNC and Chrome Remote Desktop. Kimsuky continues to use spear phishing as its initial … Read more

Unraveling Real-Life Attack Paths – Key Lessons Learned

October 18, 2023 at 08:15AM Attackers in the cybersecurity landscape are constantly searching for vulnerabilities and exploit combinations within organizational environments. Security tools often fail to prioritize threats effectively and provide context on how issues can be leveraged by attackers. Real-life attack path scenarios reveal that 75% of critical assets can be compromised in their … Read more

Recent NetScaler Vulnerability Exploited as Zero-Day Since August

October 18, 2023 at 07:00AM A critical vulnerability (CVE-2023-4966) in Citrix NetScaler ADC and Gateway has been exploited as a zero-day since August, according to Google’s Mandiant cybersecurity unit. The flaw allows attackers to leak sensitive information without authentication. Citrix released patches on October 10 and updated their advisory to warn customers of the observed … Read more

D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack

October 18, 2023 at 12:09AM D-Link, a Taiwanese networking equipment manufacturer, confirmed a data breach that exposed “low-sensitivity and semi-public information.” The breach originated from an old D-View 6 system and did not contain user IDs or financial information. D-Link denied claims of millions of records being compromised and stated that approximately 700 outdated records … Read more

D-Link confirms data breach after employee phishing attack

October 17, 2023 at 02:55PM Networking equipment manufacturer D-Link confirmed a data breach in which customer and employee information, including the CEO’s details, were stolen and put up for sale. The attacker claims to have also taken source code for D-Link’s software. The company shut down affected servers, disabled user accounts, and clarified that only … Read more