North Korean APT Bypasses DMARC Email Policies in Cyber-Espionage Attacks

September 19, 2024 at 09:01PM Geopolitical tensions have led to a surge in cyberattacks on US and allied organizations by North Korean cyber-espionage group Kimsuky. The group has successfully exploited poorly configured DMARC policies for spear-phishing campaigns targeting high-profile individuals and organizations. Ensuring properly configured DMARC is critical to defend against these attacks and protect … Read more

1 PoC Exploit for Critical RCE Flaw, but 2 Patches From Veeam

September 19, 2024 at 04:10PM A researcher has released a proof-of-concept exploit and analysis for CVE-2024-40711, a critical vulnerability in Veeam’s backup software. The flaw, with a CVSS score of 9.8, allows unauthenticated remote code execution. Veeam has released patches, but there are concerns about their effectiveness. Enterprises are urged to apply the latest patch … Read more

Ivanti warns of another critical CSA flaw exploited in attacks

September 19, 2024 at 02:45PM Ivanti warns of ongoing exploitation of a Cloud Services Appliance (CSA) vulnerability, CVE-2024-8963, allowing remote attackers to access restricted functions. Attackers also exploit CVE-2024-8190 to bypass admin authentication and execute arbitrary commands. Ivanti advises immediate patching and emphasizes the end-of-life status of Ivanti CSA 4.6. Federal agencies are mandated to … Read more

Contractor Software Targeted via Microsoft SQL Server Loophole

September 18, 2024 at 05:09PM Threat actors have been targeting Foundation accounting software used in construction, exploiting vulnerabilities in plumbing, HVAC, and concrete sub-industries. Researchers at Huntress discovered the threat, involving host/domain enumeration commands. The software’s MSSQL instance allows mobile app access, potentially exposing TCP port 4243 to the public. Organizations are advised to rotate … Read more

Packed With Features, ‘SambaSpy’ RAT Delivers Hefty Punch

September 18, 2024 at 05:00PM SambaSpy, a remote access Trojan (RAT), is a sophisticated tool with various spying and data-stealing functions, initially targeting Italian victims and potentially expanding to other countries. The malware’s capabilities include file management, remote control, password stealing, and more, making it a versatile and powerful tool for threat actors. It is … Read more

Russian Security Firm Doctor Web Hacked

September 18, 2024 at 06:06AM Russian antimalware company Doctor Web detected and prevented a cyberattack targeting its resources on September 14. The firm disconnected its resources to check for compromise, temporarily suspending its virus databases. Despite the attack, no Dr.Web users were affected. The company had been monitoring the attacker’s movements and has brought its … Read more

Broadcom fixes critical RCE bug in VMware vCenter Server

September 17, 2024 at 04:00PM Broadcom has addressed a critical VMware vCenter Server vulnerability (CVE-2024-38812) that allows unauthenticated remote attackers to achieve remote code execution through a heap overflow weakness in vCenter’s DCE/RPC protocol. Security patches are available, with the company advising administrators to apply the updates listed in the VMware Security Advisory to protect … Read more

CISA urges software devs to weed out XSS vulnerabilities

September 17, 2024 at 12:46PM CISA and the FBI advised technology manufacturers to review software for cross-site scripting vulnerabilities before shipping and implement secure-by-design practices to eliminate such flaws entirely. They recommended input validation, output encoding functions, code reviews, and adversarial testing to prevent XSS vulnerabilities in future software releases. This warning is part of … Read more

FBI, CISA Warn of Fake Voter Data Hacking Claims

September 16, 2024 at 09:45AM Hackers are falsely claiming to have compromised US election infrastructure, but the FBI and CISA refute these assertions, stating that no evidence of cyberattacks preventing elections, altering voter information, tampering with ballots, or disrupting vote counts exists. They caution the public to critically assess claims of leaked voter data, as … Read more

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware

September 16, 2024 at 09:27AM Cybersecurity researchers warn about North Korean threat actors targeting LinkedIn users with RustDoor malware, posing as cryptocurrency recruiters. The attackers aim at infiltrating financial and cryptocurrency networks through social engineering campaigns, prompting victims to download malicious coding challenges. The RustDoor backdoor persists in macOS and Windows machines, highlighting evolving tactics … Read more