Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

November 17, 2024 at 11:57PM A critical authentication bypass vulnerability (CVE-2024-10924) in the Really Simple Security plugin for WordPress could allow attackers to gain full admin access. Affecting over 4 million sites, the vulnerability has been patched in version 9.1.2 after responsible disclosure. Similar vulnerabilities were also found in WPLMS Learning Management System. ### Meeting … Read more

Admins can give thanks this November for dollops of Microsoft patches

November 12, 2024 at 08:32PM Microsoft’s recent Patch Tuesday update addressed 89 security flaws, including two under active attack. Vulnerabilities CVE-2024-49039 and CVE-2024-43451 enable privilege escalation and account impersonation, respectively. Additionally, severe flaws in Azure and .NET products could lead to remote code execution. CISA highlighted an increase in zero-day exploitations throughout 2023. ### Meeting … Read more

Elaborate Deepfake Operation Takes a Meeting With US Senator

September 30, 2024 at 01:14PM Senator Ben Cardin was targeted in an advanced deepfake operation, impersonating former Ukrainian Minister Dymtro Kuleba, seeking sensitive political views. The scheme was thwarted, leading to a comprehensive investigation. Deepfake scams are prevalent, raising concerns over their potential impact on individuals, businesses, and national security. Detection and vigilance are crucial … Read more

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

September 30, 2024 at 08:30AM Security vulnerabilities in six different Automatic Tank Gauge (ATG) systems have been disclosed, exposing them to remote attacks. Thousands of ATGs are exposed on the internet, making them a target for malicious actors. Additional flaws were found in OpenPLC, Riello NetMan 204, and AJCloud. CISA has highlighted threats to OT … Read more

News Desk 2024: Hacking Microsoft Copilot Is Scary Easy

August 29, 2024 at 08:16AM Microsoft Copilot is gaining popularity as an artificial intelligence productivity assistant for large enterprises. However, Zenity’s CTO Michael Bargury warns about cybersecurity risks due to Copilot’s deep access into enterprise systems, making it vulnerable to malicious attacks. Bargury demonstrated how a single email can take over Copilot, despite acknowledging its … Read more

Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks

August 19, 2024 at 06:45AM The Xeon Sender tool is being used for large-scale SMS phishing and spam campaigns through abusing legitimate cloud services. It exploits APIs of services like Amazon SNS, Nexmo, and Twilio to send bulk SMS spam attacks without exploiting any weaknesses of the providers. Organizations should monitor for anomalous changes in … Read more

Hamster Kombat Players Threatened by Spyware & Infostealers

July 24, 2024 at 01:04PM Hamster Kombat, a popular mobile currency game with over 250 million users, is being targeted by malicious actors. Fake Android and Windows software are used to install spyware and other malware. Users searching for the game’s Telegram channel may come across channels distributing Android malware and spyware, posing a risk … Read more

China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally

June 12, 2024 at 05:15AM China-backed threat actors accessed 20,000 Fortinet FortiGate systems globally by exploiting a critical vulnerability, with the operation impacting Western governments, international organizations, and defense companies. The attackers deployed a backdoor to maintain remote access and spread malware, highlighting the increasing trend of targeting edge devices for cyber attacks. For more … Read more

Yacht retailer MarineMax discloses data breach after cyberattack

April 1, 2024 at 02:40PM MarineMax, a major yacht retailer, experienced a cyberattack in March that led to the theft of employee and customer data. Although the company claimed not to store sensitive data, a recent filing revealed that personal information was indeed compromised. The attacker, identified as the Rhysida ransomware gang, is attempting to … Read more

Steps CISOs Should Take Before, During & After a Cyberattack

November 14, 2023 at 10:05AM In today’s complex threat landscape, organizations must have a detailed cyber playbook outlining actions to take in the event of an attack. CISOs should educate stakeholders, build a comprehensive framework, and test plans regularly. During an attack, effective and empathetic communication is crucial. Afterward, reflection without blame should occur to … Read more