Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries

February 15, 2024 at 10:18AM A firmware reverse engineering of Ivanti Pulse Secure revealed outdated, vulnerable software components in the Utah-based company’s appliance. Active exploitation of security flaws in related gateways has been observed. Eclypsium found outdated packages and vulnerable libraries, emphasizing the need for visibility into digital supply chains. Concerns about security holes in … Read more

New Wi-Fi Authentication Bypass Flaws Expose Home, Enterprise Networks

February 15, 2024 at 09:51AM New Wi-Fi authentication bypass vulnerabilities in open source software discovered by Mathy Vanhoef and Heloise Gollier pose threats to enterprise and home networks. The flaws affect Wpa_supplicant and Intel’s iNet Wireless Daemon (IWD) software. Exploitation could lead to traffic interception and unauthorized access to Wi-Fi networks. Vendors have been notified … Read more

Bumblebee Malware Returns with New Tricks, Targeting U.S. Businesses

February 14, 2024 at 07:15AM Infamous malware loader Bumblebee resurfaces in a new phishing campaign targeting organizations in the U.S. Proofpoint warned about voicemail-themed lures leading to Word files with VBA macros launching PowerShell commands to execute Bumblebee. The attack chain relies on macro-enabled documents, coinciding with reappearance of new variants of QakBot, ZLoader, and … Read more

Ongoing Microsoft Azure account hijacking campaign targets executives

February 12, 2024 at 02:17PM A recent phishing campaign targeting Microsoft Azure has compromised hundreds of user accounts, including those of senior executives. The hackers aim to access confidential information and launch more attacks within the breached organization. Proofpoint has issued an alert with details of the attacks and defense measures, including monitoring user-agent strings … Read more

UN Experts Investigating 58 Suspected North Korean Cyberattacks Valued at About $3 Billion

February 11, 2024 at 03:21PM The U.N. experts are investigating 58 North Korean cyberattacks valued at $3 billion between 2017-2023, with funds allegedly used for weapons development. North Korea’s high volume of cyberattacks continues, with increasing military tensions in the region. The country has flouted U.N. sanctions, expanded its nuclear weapons program, and engaged in … Read more

Google Links Over 60 Zero-Days to Commercial Spyware Vendors

February 6, 2024 at 06:18AM A recent report from Google revealed that over 60 zero-day vulnerabilities in Apple, Adobe, Google, Microsoft, and Mozilla products since 2016 are linked to commercial spyware vendors. These companies allegedly aid governments in targeting individuals, contradicting claims of lawful surveillance. The vendors pay millions for exploits, and Google’s Threat Analysis … Read more

Google: Govs Drive Sharp Growth of Commercial Spyware Cos

February 6, 2024 at 05:07AM Summary: Governments’ increased interest in spying on activists and dissidents has led to a surge in commercial spyware vendors (CSVs). These vendors exploit zero-day vulnerabilities and provide end-to-end surveillance capabilities for substantial sums. Google’s report highlights the concerning growth of CSV operations globally, prompting the Biden Administration to issue an … Read more

AnyDesk says hackers breached its production servers, reset passwords

February 3, 2024 at 11:21AM AnyDesk recently suffered a cyberattack, compromising production systems and stealing source code and code signing keys. Although the company assures customers that their service is now safe to use, it recommends changing passwords and updating to the latest software version. This incident is part of a series of recent high-profile … Read more

Canadian Man Sentenced to Prison for Ransomware Attacks

January 29, 2024 at 11:12AM Canadian cybercriminal Matthew Philbert, 33, was sentenced to two years in prison for ransomware and cyberattacks against Canadian businesses, government entities, and individuals. He launched attacks on over 1,000 entities, using phishing emails and receiving Bitcoin payments. Philbert’s actions could have impacted medical services and he provided stolen credentials to … Read more

The Unknown Risks of The Software Supply Chain: A Deep-Dive

January 24, 2024 at 04:24AM Open-source components are increasingly used in applications, challenging traditional Software Composition Analysis (SCA) tools’ ability to combat open-source threats. As businesses capitalize on open-source libraries to expedite application development, the reliance on interconnected dependencies introduces vulnerabilities in the supply chain. Gartner predicts a surge in supply chain attacks, advocating heightened … Read more