The United States State Department has recently revealed a $10 million reward for any valuable information that could lead to the detection or whereabouts of the principal members of the Hive ransomware gang. Following that, the State Department has announced a $5 million reward for providing any information that leads to the arrest or conviction […]
The post U.S. Offers $10 Million Reward for Information on Hive Ransomware appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform .
Protect Your Network From Data Breach Prevent malware from infecting your network at the delivery stage by intercepting malicious files in transit from their source to the target device’s web browser. .
Request Free Demo Source: gbHackers
Source Link:
https://gbhackers.com/hive-ransomware-10-million-reward/ CVE mentions by industry news FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT New Attack Against Self-Driving Car AI Russia-linked APT28 targets government Polish institutions Citrix warns customers to update PuTTY version installed on their XenCenter system manually The Pentagon says it worked with Ukraine and SpaceX to successfully block Russian military use of Starlink; some Russian users complain of connectivit The Post Millennial - 26,818,266 breached accounts ElevenLabs previews a music-generating AI model, showing samples of songs with lyrics generated from text prompts (Ken Yeung VentureBeat) A new alert system from CISA seems to be effective now we just need companies to sign up CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization Alibaba releases Qwen2.5, says its Qwen models are used by 90K+ companies; OpenCompass: Qwen2.5 beats GPT-4 in language, creation but not knowledge, r Russia-Linked CopyCop Uses LLMs to Weaponize Influence Content at Scale Mirai botnet also spreads through the exploitation of Ivanti Connect Secure bugs Some Stack Overflow users say their account was suspended after they attempted to alter their posts in protest of its OpenAI partnership to supply dat Top spy official releases principles on intel agency use of info bought from data brokers New TunnelVision technique can bypass the VPN encapsulation #RSAC: CISA Launches Vulnrichment Program to Address NVD Challenges Talos discloses multiple zero-day vulnerabilities, two of which could lead to code execution How an Iranian-linked influence campaign pivoted after Oct. 7 attack on Israel Google launches Google Wallet for Android in India and partners with 20+ brands to let users store boarding passes, loyalty cards, event tickets, and Sources: BigCommerce, provider of software and an e-commerce platform to retailers, is exploring a sale after losing 90% of its market value since its Law enforcement agencies identified LockBit ransomware admin and sanctioned him New Attack on VPNs HYPR and Microsoft Partner on Entra ID External Authentication Methods Verizon: Nearly 80% of Data Breaches Involve Phishing and the Misuse of Credentials U.S. Charges Russian Man as Boss of LockBit Ransomware Group OpenAI says it's developing a Media Manager tool, slated for release by 2025, to let content owners identify their works to OpenAI and control ho US, UK authorities unmask Russian national as LockBit administrator China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion - The Hacker News MITRE attributes the recent attack to China-linked UNC5221 China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion The Education Sector Experienced the Highest Number of Data Breaches in 2023 RSAC: Antony Blinken Highlights Urgency in Securing Foundational Tech Citrix NetScaler ADC & Gateway Flaw Lets Attackers Obtain Sensitive Data Remotely Elevating Cybersecurity: How CybeReady Transforms Threat Intelligence for Businesses RSAC: Securing Foundational Tech Critical to Upholding Democratic Values, Says Blinken State Department wants digital solidarity at center of tech diplomacy HYAS Threat Intel Report May 6 2024 UK armed forces personal data hacked in MoD breach UK military personnel s data hacked in MoD payroll breach Sources: China has hacked a payroll system used by the UK's Ministry of Defence, targeting service personnel; names and bank details have been ex The missed opportunities in White House s critical infrastructure directive Why Your VPN May Not Be As Secure As It Claims Best SIEM Tools List For SOC Team – 2024 Stealing cookies: Researchers describe how to bypass modern authentication Finland authorities warn of Android malware campaign targeting bank users Ransomware drama: Law enforcement seized Lockbit group’s website again Job applicant reveals 'foolproof' resume hack she used to land 3 part-time positions - New York Post NATO and the EU formally condemned Russia-linked APT28 cyber espionage Defense lawyers question the accuracy and reliability of Cybercheck, an AI tool used in thousands of US cases to identify suspects' locations and Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond Russia-linked APT28 and crooks are still using the Moobot botnet CrowdStrike Named the Only Customers Choice in 2024 Gartner Voice of the Customer for External Attack Surface Management CrowdStrike Named Overall Leader in Industry s First ITDR Comparative Report Microsoft organizational changes seek to address security failures Dirty stream attack poses billions of Android installs at risk Google Announces Passkeys Adopted by Over 400 Million Accounts UnitedHealth hackers used stolen login credentials to break in, CEO says - Reuters.com Ukrainian REvil gang member sentenced to 13 years in prison Tether partners with Chainalysis to identify risky crypto addresses that could be used for bypassing sanctions or illicit activities, like terrorist f Tether says it is working with Chainalysis to identify crypto wallets that could be used for bypassing sanctions or illicit activities like terrorist Manual LDAP Querying: Part 2 What can we learn from the passwords used in brute-force attacks? Threat actors hacked the Dropbox Sign production environment Karius, which uses AI to help analyze blood tests in 400 hospitals, raised $100M led by Khosla, after raising $165M in early 2020 led by Vision Fund I Google says 400M+ Google Accounts have used passkeys since the rollout, logging 1B+ authentications, and expands passkeys to its Advanced Protection P IAM and Passkeys: 4 Steps Towards a Passwordless Future Iranian hackers impersonate journalists in social engineering campaign Reading the Mandiant M-Trends 2024 Ex-NSA employee sentenced to 262 months in prison for attempting to transfer classified documents to Russia CVE-2024-27322 Vulnerability Found in R Programming Language Cuttlefish malware targets enterprise-grade SOHO routers Ex-NSA employee sentenced to 262 months for attempting to transfer classified documents to Russia A flaw in the R programming language could allow code execution DBIR: Vulnerability Exploits Triple as Initial Access Point for Data Breaches Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall How space exploration benefits life on Earth: Q&A with David Eicher Notorious Finnish Hacker sentenced to more than six years in prison Finding Attack Vectors using API Linting UnitedHealth hackers used stolen login credentials to break in, CEO says - Reuters UnitedHealth hackers used stolen login credentials to break in, CEO says - Yahoo Finance Marriott quietly admits to not encrypting certain user data impacted by a 2018 breach, after arguing in court it used encryption so the case should be How New College Graduates Can Avoid Increasingly Personalized Job Scams Eight daily newspapers owned by Alden, the second-largest US newspaper operator, sue OpenAI and Microsoft for allegedly using copyrighted articles to Marriott quietly admits it did not encrypt certain user data impacted by a 2018 breach, after arguing in court encryption was used so lawsuits should Eight daily papers owned by Alden, the second-largest US newspaper operator, sue OpenAI and Microsoft, claiming copyrighted articles were used to trai Eight daily newspapers owned by Alden sue OpenAI and Microsoft, accusing them of using copyrighted articles without permission to train generative AI SSH vs. SSL TLS: What s The Difference? Man Who Mass-Extorted Psychotherapy Patients Gets Six Years UnitedHealth hackers used Citrix vulnerability to break in - iTnews Agencies to turn toward skill-based hiring for cyber and tech jobs, ONCD says FCC takes $200 million bite out of wireless carriers for sharing location data Google prevented 2.28 million policy-violating apps from being published on Google Play in 2023 Tether says it invested $200M in brain-computer interface company Blackrock Neurotech, via its newly established VC arm Tether Evo (Philip Lagerkranse Multiple Brocade SANnav SAN Management SW flaws allow device compromise Okta warns of unprecedented scale in credential stuffing attacks on online services Security Affairs newsletter Round 469 by Pierluigi Paganini INTERNATIONAL EDITION Targeted operation against Ukraine exploited 7-year-old MS Office bug The US IRS says it spent $10.5M to develop and $2.4M to run its free tax filing website, used by 140K+ taxpayers in 12 states, and claims high user sa The IRS says it spent $10.5M to develop and $2.4M to run its free tax filing website, used by 140K+ households in 12 states, and claims high user sati Brokewell Android malware supports an extensive set of Device Takeover capabilities Bogus npm Packages Used to Trick Software Developers into Installing Malware Filing: FTC says Jeff Bezos, Andy Jassy, and other Amazon execs used Signal's disappearing messages to conceal evidence in FTC's antitrust c Ensuring the Security and Efficiency of Web Applications and Systems Cryptocurrencies and cybercrime: A critical intermingling Kaiser Permanente data breach may have impacted 13.4 million patients New 'Brokewell' Android Malware Spread Through Fake Browser Updates Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug Piping Rock - 2,103,100 breached accounts AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections New rules that allow UK law enforcement agencies to seize, destroy, or transfer crypto holdings used for crime before making an arrest take effect (Ca Developing countries are being used by hackers to try out new ransomware strains - TechRadar Nemesis 1.0.0 CISA ransomware warning program has sent out more than 2,000 alerts CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog Earnings Release FY24 Q3 (Microsoft) Cisco reveals zero-day attacks used by hackers to attack government networks in major threat campaign - TechRadar The private sector probably isn t coming to save the NVD Salt Security Addresses Critical OAuth Vulnerabilities Enhancing API Security with OAuth Protection Package CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog Sources: a Huawei-led consortium, backed by Chinese government funding, aims to compete with Nvidia by making high-bandwidth memory chips, used in GPU Campaigns and political parties are in the crosshairs of election meddlers CISA ransomware warning program set to fully launch by end of 2024 Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks FCC wants rules for most important part of the internet you ve probably never heard of US says Iranian group used 'spearphishing' tactics to hack defense contractors - Stars and Stripes Hackers hijacked the eScan Antivirus update mechanism in malware campaign Multiple Squid Vulnerabilities Fixed in Ubuntu NIST Cybersecurity Framework: A Cheat Sheet for Professionals (Free PDF) Microsoft issues warning over 'GooseEgg' tool used in Russian hacking campaigns - ITPro SQL Server 2012 End of Life – What You Need To Know Russian state-sponsored hacker used GooseEgg malware to steal Windows credentials - CSO Online OpenAI announces new enterprise-grade features for API customers, including enhanced security, administrative controls, and new Assistants API capabil Iranian nationals charged with hacking U.S. companies, Treasury and State departments PuTTY SSH Client Vulnerability Allows Private Key Recovery North Korea-linked APT groups target South Korean defense contractors Democratic operative behind Biden AI robocall says lawsuit won t get anywhere AI: Friend or Foe? Unveiling the Current Landscape with MixMode s State of AI in Cybersecurity Report US Imposes Visa Restrictions on Alleged Spyware Figures The Boosters: Don t Get Used to the Boost Suspected CoralRaider continues to expand victimology using three information stealers U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme CrowdStrike Falcon Wins Best EDR Annual Security Award in SE Labs Evaluations CVE-2024-3400: What You Need to Know About the Critical PAN-OS Zero-Day Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike Secure Your Staff: How to Protect High-Profile Employees’ Sensitive Data on the Web 5 Best Practices to Secure AWS Resources Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities - Security Affairs Kudos! CEO Reveals He Got Phished The Essential KVM Cheat Sheet for System Administrators TA547 Phishing Attack: German Companies Hit With Infostealer Akira ransomware received $42M in ransom payments from over 250 victims DuneQuixote campaign targets the Middle East with a complex backdoor Security Affairs newsletter Round 468 by Pierluigi Paganini INTERNATIONAL EDITION Critical CrushFTP zero-day exploited in attacks in the wild FISA reauthorization heads to Biden s desk after Senate passage US cyber agency says Russian hackers used Microsoft access to steal government emails - Reuters.com Baby ASO: A Minimal Viable Transformation for Your SOC MITRE revealed that nation-state actors breached its systems via Ivanti zero-days Hacking group GhostR claims it stole 5.3M records from World-Check screening database, used for KYC checks for sanctions and financial crime links, in Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy Hacking group GhostR claims it stole 5.3M records from World-Check's screening database, used for KYC checks for sanctions and financial crime li Hacking group GhostR claims it stole 5.3M records from World-Check screening database used for KYC checks for sanctions and financial crime links (Zac Treasury official: Small financial institutions have growth to do in using AI against threats What s the deal with the massive backlog of vulnerabilities at the NVD? How Attackers Can Own a Business Without Touching the Endpoint FBI chief says China is preparing to attack US critical infrastructure FIN7 targeted a large U.S. carmaker with phishing attacks FIN7 targeted a large U.S. carmaker phishing attacks A US jury finds Avraham Eisenberg, a crypto trader who stole $110M on the Mango Markets exchange in 2022, guilty of fraud despite his "code is la Could the Brazilian Supreme Court finally hold people accountable for sharing disinformation? Large volume of data stolen from UN agency after ransomware attack Stale Accounts in Active Directory Police smash LabHost international fraud network, 37 arrested Police take down $249-a-month global phishing service used by 2,000 hackers - CNN Apex Legends hacker says game developers patched exploit used on streamers - Yahoo Life Apex Legends hacker says game developers patched exploit used on streamers - TechCrunch LastPass Warns of Deepfake Phishing Attempt A Pandora’s Box: Unpacking 5 Risks in Generative AI Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide Previously unknown Kapeka backdoor linked to Russian Sandworm APT Data Encryption Policy After Forbes found 120+ YouTube videos and 27 Google ads promoting AI deepfake porn tools and "nudifier" Telegram bots, Google took them dow After Forbes found 120+ YouTube videos and 27 Google ads promoting AI deepfake porn tools and "nudifier" Telegram bots, the company took the Linux variant of Cerber ransomware targets Atlassian servers Hackers tried to breach, disable widely used open-source Java tools, groups warn - Nextgov FCW After a sleepy primary season, Russia enters 2024 U.S. election fray How GitHub Copilot became responsible for a significant percentage of coding, despite its limitations; Stack Overflow: 54.8% of developers used Copilo OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal Decade-old malware haunts Ukrainian police Researchers released exploit code for actively exploited Palo Alto PAN-OS bug Cisco warns of large-scale brute-force attacks against VPN and SSH services Congress rails against UnitedHealth Group after ransomware attack New Vulnerability “LeakyCLI” Leaks AWS and Google Cloud Credentials A renewed espionage campaign targets South Asia with iOS spyware LightSpy Apple, Amazon, Google and 7 other favourite brands of scammers used for hacking your account online - HT Tech Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials In High Demand – How Thales and DigiCert Protect Against Software Supply Chain Attacks Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack The Open Source Security Foundation and the OpenJS Foundation say the attempt to insert a secret backdoor into XZ Utils "may not be an isolated i Russia is trying to sabotage European railways, Czech minister said Cisco Duo warns telephony supplier data breach exposed MFA SMS logs Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets HYAS Threat Intel Report April 15 2024 Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw Crickets from Chirp Systems in Smart Lock Key Leak Congressional privacy bill looks to rein in data brokers Threat actors exploited Palo Alto Pan-OS issue to deploy a Python Backdoor Singapore-based used car marketplace Carro raised $100M in pre-IPO funding at a $1.5B+ valuation and reports its first annual operating profit (Olivi Another CVE (PAN-OS Zero-Day), Another Reason to Consider Zero Trust An overview of Bureau of Labor Statistics data, which shows California's percentage of US tech jobs has continued to steadily decline since 2020 Crooks manipulate GitHub’s search results to distribute malware House passes extension of expiring surveillance authorities Roku disclosed a new security breach impacting 576,000 accounts U.S. Department of Health Alert: Hackers are Targeting IT Help Desks at Healthcare Organizations US says Russian hackers used Microsoft access to steal government emails - Verdict Adobe used images created by tools like Midjourney and uploaded to its stock marketplace by users, to train Firefly; Adobe says 5% of images were AI- Berachain, a bear-themed crypto project building a Layer 1 blockchain, raised a $100M Series B through a SAFT, a simple agreement for future tokens (H What keeps CISOs up at night? Mandiant leaders share top cyber concerns LastPass employee targeted via an audio deepfake call TA547 targets German organizations with Rhadamanthys malware Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns Russian hackers used Microsoft to access govt emails: US cyber agency - WION Hackers used stolen passwords to access thousands of BenefitsCal accounts - Sacramento Bee US cyber agency says Russian hackers used Microsoft access to steal government emails - Reuters US Cyber Agency Says Russian Hackers Used Microsoft Access to Steal Government Emails - Claims Journal Six-year old bug will likely live forever in Lenovo, Intel products Why CISA is Warning CISOs About a Breach at Sisense US CISA published an alert on the Sisense data breach The internet is already scary enough without April Fool s jokes DragonForce ransomware – what you need to know Facebook ads used by hackers to promote fake versions of AI tools Sora, Dall-E, Midjourney: Report - The Indian Express Sisense breach exposes customers to potential supply chain attack Apple says owners of the iPhone 15 or newer will be able to fix broken devices with used parts, including screens, batteries, and cameras, starting in TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer Microsoft fixed two zero-day bugs exploited in malware attacks Apple Updates Spyware Alert System to Warn Victims of Mercenary Attacks Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks Group Health Cooperative data breach impacted 530,000 individuals Renewal of controversial surveillance law screeches to a halt in the House Personal information of millions of AT&T customers leaked online Rep. Adam Schiff introduced a bill that would require companies training generative AI models to disclose all of the copyrighted work they used to do Vulnerability in some TP-Link routers could lead to factory reset Multiplying Security Research: How Eclypsium Automates Binary Analysis at Scale Improving Dark Web Investigations with Threat Intelligence Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers Microsoft Patches Tuesday security updates for April 2024 fixed hundreds of issues How to Stop Your Data From Being Used to Train AI Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel Cybersecurity in the Evolving Threat Landscape Google introduces two Gemma variants: CodeGemma to help with code completion, and RecurrentGemma to provide researchers faster inference at higher bat How to Fix OpenRGB Not Detecting Devices Google introduces two Gemma variants, CodeGemma to help with code completion and RecurrentGemma to provide researchers faster inference at higher batc 100 Days of YARA 2024: It's a Wrap. Meta's Nick Clegg says it's surprising how infrequently AI tools are being used to subvert elections and confirms Llama's next version Extortion group threatens to sell Change Healthcare data Over 91,000 LG smart TVs running webOS are vulnerable to hacking Researchers found an exposed Azure server with credentials used by Microsoft staff to access internal systems; Microsoft was told Feb. 6 and secured i The Essential Tools and Plugins for WordPress Development New Phishing-as-a-Service (PhaaS) platform, 'Tycoon 2FA', Targets Microsoft 365 and Gmail Accounts ScrubCrypt used to drop VenomRAT along with many malicious plugins In London, Meta execs downplayed the negative impact of AI on elections, touted open-source AI, and confirmed Llama's next version will arrive by Civil society groups press platforms to step up election integrity work FCC looks to limit how domestic violence abusers use connected cars 2023 Threat Analysis and 2024 Predictions PyPI Malicious Package Uploads Used To Target Developers Defusing the threat of compromised credentials Google announces V8 Sandbox to protect Chrome users In some US schools, boys have used AI "nudification" apps to create and share deepfakes of clothed female classmates, leading districts to s Vista Equity Partners acquires Model N, a public company focusing on helping health companies automate pricing and compliance decisions, for $1.25B (P China is using generative AI to carry out influence operations D-Link RCE Vulnerability That Affects 92,000 Devices Exploited in Wild Model N, a public company focusing on helping health companies automate pricing and compliance decisions, is being acquired by Vista Equity Partners f Crowdfense is offering a larger 30M USD exploit acquisition program XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor Ukrainian hackers destroy data center used by Russian defense industry enterprises, Gazprom, Rosneft - Ukrinform Secrets Management in the Age of AI Cybercrime: Safeguarding Enterprises from Emerging Threats Sources: Ukrainian hackers destroy data center used by Russian military industry - Kyiv Independent U.S. Department of Health warns of attacks against IT help desks Multiple Cisco Small Business Routers Vulnerable to XSS Attacks Report: Google changed its privacy policy on July 1, 2023, to more broadly cover its use of publicly available content, like in Google Docs, to train A look at Huawei's efforts to make HarmonyOS a formidable rival to iOS and Android; Counterpoint: 16% of smartphones sold in China in Q4 2023 use Report: Google changed its privacy policy in June 2022 to more broadly cover its use of publicly available content, including Google Docs, to train AI Sources: OpenAI transcribed 1M+ hours of YouTube videos through Whisper and used the text to train GPT-4; Google also transcribed YouTube videos to ha Supply chain attack sends shockwaves through open-source community Magento flaw exploited to deploy persistent backdoor hidden in XML ALPHV steps up laundering of Change Healthcare ransom payments How your business should deal with negative feedback on social media Oxycorat Android RAT Spotted on Dark Web Stealing Wi-Fi Passwords From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware Cyberattack disrupted services at Omni Hotels & Resorts Testing in Detection Engineering (Part 8) Chinese hackers turn to AI to meddle in elections HTTP 2 CONTINUATION Flood technique can be exploited in DoS attacks Google Books is indexing low quality, AI-generated books, which may impact Google Ngram viewer, an important tool used by researchers to track languag New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7 FBI seeks to balance risks, rewards of artificial intelligence Fake Lawsuit Threat Exposes Privnote Phishing Sites Multiple Puma Vulnerabilities Fixed in Ubuntu Considerations for Operational Technology Cybersecurity Sources: Israel's bombing campaign in Gaza used Lavender, an AI system that identified 37,000 potential human targets based on their apparent lin Google addressed another Chrome zero-day exploited at Pwn2Own in March Data-driven decision-making: The power of enhanced event logging New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks A look at XZ Utils attacker "Jia Tan", a persona experts say nation-state hackers used that left little trace after working on the project s A look at XZ Utils attacker "Jia Tan", a persona experts say was used by a nation state group and that left little trace after working on th ‘The Manipulaters’ Improve Phishing, Still Fail at Opsec Cyber review board blames cascading Microsoft failures for Chinese hack George Carlin's estate settles with the makers of Dudesy, who agree to remove their YouTube video and podcast they originally claimed used an &qu xz Utils Backdoor XSS flaw in WordPress WP-Members Plugin can lead to script injection Getting Intune with Bugs and Tokens: A Journey Through EPM Trusted Contributor Plants Sophisticated Backdoor in Critical Open-Source Library Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution Sources: Microsoft is testing a new AI-powered Xbox chatbot that can automate support tasks via an "embodied AI character", as part of large Google agreed to erase billions of browser records to settle a class action lawsuit Chinese hackers used Swedish routers - ScandAsia Alert: Connectwise F5 Software Flaws Used To Breach Networks HYAS Threat Intel Report April 1 2024 Space is essential for infrastructure. Why isn’t it considered critical? Interviews and Telegram messages detail how Russian middlemen used Tether to avoid US sanctions and procure parts for drones and other high-tech equip Info stealer attacks target macOS users Security Affairs newsletter Round 465 by Pierluigi Paganini INTERNATIONAL EDITION DinodasRAT Linux variant targets users worldwide A look at AI's impact on video game actors, as some fear their voices might be misused while others hope to collect extra payments on top of a ba AT&T resets millions of account passcodes after it was told that data dumped online has encrypted passcodes that could be used to access its custo Researchers say they achieved fiber-optic data transfer speeds of 301 Tbps by using the E-band, a spectral band that has never been used in commercial Researchers find malicious code in versions of the compression tool XZ Utils that were incorporated into Linux distributions from Red Hat, Debian, and Researchers find malicious code in versions of the Linux compression tool XZ Utils that were incorporated into unstable distributions from Red Hat and Ivanti-linked breach of CISA potentially affected more than 100,000 individuals OpenAI debuts Voice Engine, which lets users generate synthetic copy of a voice from a 15-second sample, available to around 100 partners, including H OpenAI debuts Voice Engine that lets users generate synthetic copy of a voice from a 15-second voice sample, available to a small group of partners li Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds Cisco warns of password-spraying attacks targeting Secure Firewall devices American fast-fashion firm Hot Topic hit by credential stuffing attacks What is Threat Management? Thread Hijacking: Phishes That Prey on Your Curiosity Enter the substitute teacher Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection Hundreds of Clusters Attacked Due to Unpatched Flaw in Ray AI Framework Using Generative AI to Understand How an Obfuscated Script Works Zero Trust Meets Insider Risk Management Oregon's governor signs the first US right-to-repair law that bans manufacturers from using "parts pairing" to dictate what replacement Anthropic's Claude 3 Opus surpassed OpenAI's GPT-4 for the first time on Chatbot Arena, a crowdsourced leaderboard used by AI researchers fo Treasury report calls out cyber risks to financial sector fueled by AI A survey of 10,133 US adults: 43% of those aged 18-29 used ChatGPT in February 2024, up from 33% in July 2023, compared to 27% of 30-49 and 23% of all Google researchers observed 97 zero-day exploits in the wild in 2023, up 50% from 62 in 2022; 48 were used by espionage actors and 10 were financially DarkGate Malware Campaign Exploits Patched Microsoft Flaw Spyware and zero-day exploits increasingly go hand-in-hand, researchers find The DDR Advantage: Real-Time Data Defense Security Vulnerability in Saflok s RFID-Based Keycard Locks Israeli officials detail an expansive and experimental facial recognition program in Gaza to catalog Palestinians without their knowledge, starting in Chinese Hackers Target ASEAN Entities in Espionage Campaign Finnish police linked APT31 to the 2021 parliament attack BEC Scammers Adventures on the Run One More Time on SIEM Telemetry Log Sources Chinese hackers target family members to surveil hard targets TheMoon bot infected 40,000 devices in January and February Complex Supply Chain Attack Targets GitHub Developers HIPAA Compliance: Why It Matters and How to Obtain It It s Official: Cyber Insurance is No Longer Seen as a 'Safety Net' Recent ‘MFA Bombing’ Attacks Targeting Apple Users UK, New Zealand against China-linked cyber operations The BBC has "no plans" to use AI again to promote Doctor Who, after the marketing team used AI "as part of a small trial" to help US Treasury Dep announced sanctions against members of China-linked APT31 US Targets Crypto Firms Aiding Russia Sanctions Evasion U.S. Sanctions 3 Cryptocurrency Exchanges for Helping Russia Evade Sanctions CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog US and UK accuse China of cyber operations targeting domestic politics The US and the UK sanction a Wuhan-based company linked to the Chinese state-backed hacking group APT31 for targeting critical infrastructure organiza Iran-Linked APT TA450 embeds malicious links in PDF attachments Tax Scams Ramping Up as the April 15 Deadline Approaches Cybersecurity Threats in Global Satellite Internet Key Lesson from Microsoft s Password Spray Hack: Secure Every Account Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others FBI: Losses Due to Cybercrime Jump to $12.5 Billion as Phishing Continues to Dominate StrelaStealer targeted over 100 organizations across the EU and US New "GoFetch" Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys GoFetch side-channel attack against Apple systems allows secret keys extraction 0ch BBS Script (0ch) vulnerable to cross-site scripting Fortnite: When Dollars and Cents Trumps Security! Having The Security Rug Pulled Out From Under You Long Term Security Attitudes and Practices Study Exploring Legacy Unix Security Issues Russia-linked APT29 targeted German political parties with WINELOADER backdoor Large-scale Sign1 malware campaign already infected 39,000+ WordPress sites Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties Unsaflok flaws allow to open millions of doors using Dormakaba Saflok electronic locks Mozilla Drops Onerep After CEO Admits to Running People-Search Networks Why SSH Certificates Can Be A Better Option For Remote Access Than SSH Keys German political party targeted by SVR-linked group in spearphishing campaign, Mandiant says German political party targeted by SVR in spearphishing campaign, Mandiant says Google plans to remove the ability to download third-party apps and watch faces for all Fitbit smartwatches in the EU in June, citing "regulatory Researchers reveal a hotel keycard hacking technique that can let a hacker almost instantly open RFID-based Saflok locks used in 3M doors across 13K p China relaxes security review rules for some data exports, exempting data used in activities such as international trade from declaration (Reuters) Pwn2Own Vancouver 2024: participants earned $1,132,500 for 29 unique 0-days Researchers reveal a hotel keycard hacking technique that lets a hacker almost instantly open RFID-based Saflok locks used in 3M doors across 13K pro Multiple vulnerabilities in home gateway HGW BL1500HM Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild Pig butchering is an evolution of a social engineering tactic we ve seen for years Used car marketplace Carvana, whose stock fell from $360 to $4 and since rallied to $86, has avoided a financial abyss after restructuring its $9B deb 2023 Annual Report March Product Update Russian military intelligence may have deployed wiper against multiple Ukrainian ISPs AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials CVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive Used car marketplace Carvana, whose stock fell from $360 to $4, has now rallied to $86, avoiding a financial abyss after restructuring its $9B debt in The Not-so-True People-Search Network from China Neuralink shows its first brain implant patient, a 29-year-old man paralyzed from the shoulders down, playing online chess using the Neuralink device Controversial Clearview AI Added to US Government’s Tech Marketplace Neuralink shows its first brain implant patient, a 29-year-old man paralyzed from the shoulders down, play online chess using the Neuralink device (Em 7 ways to put your code on a diet and improve AppSec in the process Linux Supply Chain Validation Cheat Sheet Pwned by the Mail Carrier Netgear wireless router open to code execution after buffer overflow vulnerability 9 SSH Key Management Best Practices You Need to Know Cheating Automatic Toll Booths by Obscuring License Plates Attributing I-SOON: Private Contractor Linked to Multiple Chinese State-sponsored Groups BunnyLoader 3.0 surfaces in the threat landscape Kubernetes 1.30: A Security Perspective Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word Quick Glossary: Cybersecurity Attack Response and Mitigation Navigating the EU compliance landscape: How Detectify helps support customers in their NIS2 Directive, CER, and DORA compliance challenges Sources: the Biden admin is considering blacklisting a number of Chinese chip firms linked to Huawei, after the company used an advanced 7nm chip in M Ukraine cyber police arrested crooks selling 100 million compromised accounts Phishing Tops 2023 s Most Common Cyber Attack Initial Access Method New AcidPour wiper targets Linux x86 devices. Is it a Russia’s weapon? Adversarial Intelligence: Red Teaming Malicious Use Cases for AI WordPress Brute-Force Attacks: Sites Used As Staging Ground From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks NCSC Publishes Security Guidance for Cloud-Hosted SCADA Safeguarding Customer Information Policy Earth Krahang APT breached tens of government organizations worldwide Protecting Against Attacks on NTLM Authentication Robot Talk Episode 77 – Patricia Shaw Defining coercion at heart of Supreme Court case on government jawboning platforms Researchers spot updated version of malware that hit Viasat PoC exploit for critical RCE flaw in Fortra FileCatalyst transfer tool released 5 Best Practices to Secure Azure Resources New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics Searches for "As of my last knowledge update", a phrase used by ChatGPT, return 115 results on Google Scholar, suggesting the use of AI-gene Searches for "As of my last knowledge update", a phrase often used by ChatGPT, return 115 results on Google Scholar, suggesting the use of A TikTok launches Creator Rewards, a creator monetization program that has payouts based on "search value", originality, play duration, and au TikTok launches a new creator monetization program called Creator Rewards, which will use four core metrics to determine payout, including "searc FCC Agrees to Cyber Trust Mark for IoT Products Three New Critical Vulnerabilities Uncovered in Argo gitgub malware campaign targets Github users with RisePro info-stealer Security Affairs newsletter Round 463 by Pierluigi Paganini INTERNATIONAL EDITION Dark Web Market Admin Gets 42 Months Prison for Selling Login Passwords RAF plane used by Royal Family 'had no protection from Russian hackers' - Irish Star Lazarus APT group returned to Tornado Cash to launder stolen funds Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer Some Democrats warn that a ban of TikTok, used by nearly two-thirds of Americans under 30, could imperil Biden's reelection by depressing young v Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold Researchers detail how a side channel can be used to read encrypted responses from AI assistants, except Google's Gemini; OpenAI and Cloudflare m UK Defence Secretary jet hit by an electronic warfare attack in Poland North Korean Hackers Used Tornado Cash Bitcoin Mixer to Launder $12 Million - CCN.com Researchers detail a side channel that can be used to read encrypted responses from AI assistants, except Google Gemini; OpenAI and Cloudflare impleme Zephyr AI, which uses AI to generate insights into improving patient care and research in oncology and cardiometabolic diseases, raised a $111M Series Recent DarkGate campaign exploited Microsoft Windows zero-day CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms How to share sensitive files securely online Training days: How officials are using AI to prepare election workers for voting chaos North Korean Hackers Used Tornado Cash to Launder $12M From Heco Bridge Hack: Elliptic - CoinDesk New Report Suggests Surge in SaaS Assets, Employee Data Sharing Nissan Oceania data breach impacted roughly 100,000 people CrowdStrike and Intel Research Collaborate to Advance Endpoint Security Through AI and NPU Acceleration The Anatomy of an ALPHA SPIDER Ransomware Attack Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security CrowdStrike a Research Participant in Two Latest Center for Threat-Informed Defense Projects Meta plans to shut down CrowdTangle in August 2024 and replace it with Meta Content Library, available to academic and nonprofit researchers, not news Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software Summoning RAGnarok With Your Nemesis Fortinet fixes critical bugs in FortiOS, FortiProxy, and FortiClientEMS SVG Files Abused in Emerging Campaigns Threat Intelligence for Financial Services Cloud Account Attacks Surged 16-Fold in 2023 AI-Driven Voice Cloning Tech Used in Vishing Campaigns Threat actors leverage document publishing sites for ongoing credential and session token theft Stanford University announced that 27,000 individuals were impacted in the 2023 ransomware attack Tweaks Stealer Targets Roblox Users Through YouTube and Discord How Scalpers Scored Thousands of Fred again.. Tickets Patch Tuesday, March 2024 Edition Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity Discord plans to launch an Embedded App SDK on March 18 that will let developers "build new games and experiences that can be played directly on Discord plans to launch an Embedded App SDK on March 18 that will let developers build new games and apps that can be "played directly on the pla Malicious Python Packages Target Crypto Wallet Recovery Passwords Watch Out: These PyPI Python Packages Can Drain Your Crypto Wallets French Government Hit with Severe DDoS Attack Insurance scams via QR codes: how to recognise and defend yourself SBOMs and medical devices: An essential step but no security cureall Airbnb will no longer let hosts use indoor security cameras, starting April 30, citing renters' privacy; previously, cameras in common areas had GUEST ESSAY: A DIY guide to recognizing and derailing Generative AI voice scams Magnet Goblin hackers used Ivanti bugs to drop custom Linux malware - CSO Online Four Reasons Why SSH Key Management Is Challenging Airbnb will no longer let hosts use indoor security cameras, staring April 30, citing renters' privacy; previously, cameras in common areas had b Authors Brian Keene, Abdi Nazemian, and Stewart O'Nan sue Nvidia over allegedly using their work to train NeMo, saying the company "admitted Experts released PoC exploit for critical Progress Software OpenEdge bug Magnet Goblin group used a new Linux variant of NerbianRAT malware Authors Brian Keene, Abdi Nazemian, and Stewart O'Nan sue Nvidia over allegedly using their work to train NeMo, and say Nvidia "admitted&quo Lithuania security services warn of China’s espionage against the country Q&A with ex-PlayStation boss Shawn Layden about his support for Web3 gaming company Readygg, blockchain games, mass layoffs, AI, controlling costs Security Affairs newsletter Round 462 by Pierluigi Paganini INTERNATIONAL EDITION Microsoft Office 2019 Professional Free Download Full Version Threat actors breached two crucial systems of the US CISA Sources: Klarna co-founder Victor Jacobsson, who left in 2012 and owns 4% directly, may have an 8%+ stake via special purpose vehicles ahead of an ex Hackers Compromised Ivanti Devices Used by CISA - BankInfoSecurity.com Over 100 scientists sign an agreement that seeks to prevent their AI-aided research for designing new proteins from being used for the development of Over 90 scientists sign an agreement that seeks to prevent their AI-aided research for designing new proteins from being used for the development of b Jason Palmer, who beat Joe Biden in American Samoa's Democratic caucus, used AI-generated texts, emails, and an avatar to communicate with voters Hackers Compromised Ivanti Devices Used by CISA - GovInfoSecurity.com Report: Hackers used Ivanti vulnerabilities to breach two CISA systems - SiliconANGLE News Russian hackers accessed Microsoft source code Russia-linked Midnight Blizzard breached Microsoft systems again CISA confirms it took down two systems in February, after discovering signs of exploitation via vulnerabilities in Ivanti products that the agency use Out of the kernel, into the tokens Sources say SMIC used equipment from California-based Applied Materials and Lam Research to manufacture an advanced 7nm chip in China for Huawei in 20 Dropbox Used to Steal Credentials and Bypass MFA in Novel Phishing Campaign A Close Up Look at the Consumer Data Broker Radaris WhatDR or What Detection Domain Needs Its Own Tools? QEMU Emulator Exploited as Tunneling Tool to Breach Company Network Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens Sources say SMIC used equipment from California-based Applied Materials and Lam Research to manufacture an advanced 7nm chip for Huawei in 2023 (Bloom Around We Go: Planet Stealer Emerges How Public AI Can Strengthen Democracy The 3 most common post-compromise tactics on network infrastructure Women s History Month: Celebration of Inspiration and Commitment Snake, a new Info Stealer spreads through Facebook messages National intelligence agency of Moldova warns of Russia attacks ahead of the presidential election Hacked WordPress Sites Using Visitors’ Browsers For Distributed Brute Force Attacks Streamlining KVM Operations: A Comprehensive Cheat Sheet New Python-Based Snake Info Stealer Spreading Through Facebook Messages Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog Browserless Entra Device Code Flow A German officer used an unsecured line for a military call. Russian hackers leaked it - CBC News Proactive Intelligence: A Paradigm Shift In Cyber Defense Ukraine claims it hacked Russian Ministry of Defence, stole secrets and encryption ciphers CISA ADDS ANDROID PIXEL AND SUNHILLO SURELINE BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG Skype, Google Meet, and Zoom Used in New Trojan Scam Campaign A German officer used an unsecured line for a military call. Russian hackers leaked it - CBC.ca LockBit 3.0 s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage Is Nuclei any good for API hacking? Hackers use Zoom & Google Meet Lures to Attack Android & Windows users Ransomware group behind Change Healthcare attack goes dark US Gov sanctioned Intellexa Consortium individuals and entities behind Predator spyware attacks A Blackcat ransomware gang website shows a takedown notice; the UK NCA denies involvement and experts suggest an exit scam after an alleged UnitedHeal CISA ADDS MICROSOFT WINDOWS KERNEL BUG USED BY LAZARUS APT TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG U.S. sanctions maker of Predator spyware South Korean Police Develops Deepfake Detection Tool Ahead of April Elections American Express Warns Credit Card Data Exposed in Third-Party Breach AI Supply Chain Security: Hugging Face Malicious ML Models Phishers Abusing Legitimate but Neglected Domains To Pass DMARC Checks German officer used unsecured line for hacked call - Yahoo News Australia Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes Anthropic's Claude 3 Opus, Sonnet, and Haiku prices, all with a 200K-token context window, seem to range from "super expensive" to &quo Ukraine’s GUR hacked the Russian Ministry of Defense Prices of Anthropic's Claude 3 Opus, Sonnet, and Haiku, all with a 200K-token context window, seem to range from "super expensive" to & Predator spyware infrastructure taken down after exposure LLM Prompt Injection Worm TA577 Exploits NTLM Authentication Vulnerability Predator Spyware Targeted Mobile Phones in New Countries Heather Couk is here to keep your spirits up during a cyber emergency, even if it takes the Rocky music New GTPDOOR backdoor is designed to target telecom carrier networks How AI is used to evaluate the authenticity of paintings, as conservators express concerns over whether the tech can account for wear, damage, and oth New Linux variant of BIFROSE RAT uses deceptive domain strategies Security Affairs newsletter Round 461 by Pierluigi Paganini INTERNATIONAL EDITION How AI is being used to evaluate the authenticity of paintings, amid conservators' concerns of whether the tech can account for wear, damage, and U.S. Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp U.S. authorities charged an Iranian national for long-running hacking campaign US cyber and law enforcement agencies warn of Phobos ransomware attacks A US judge says Google must face advertisers' antitrust lawsuit, but dismisses some claims, including those focused on ad-buying tools used by la NIST Cybersecurity Framework: A Cheat Sheet for Professionals ALPHV website goes down amid growing fallout from Change Healthcare attack Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices Predator spyware endures even after widespread exposure, analysis shows Biden Warns Chinese Cars Could Steal US Citizens' Data CISA adds Microsoft Streaming Service bug to its Known Exploited Vulnerabilities catalog Ex-Cybercrime Forum Community Member Runs a Profitable Penetration Testing Business – An Analysis Docs: US federal investigators asked Meta and other tech companies to hand over push alert tokens as part of CSAM and murder cases, prompting privacy An investigation into ClothOff, an app being used to make deepfake porn images of underage girls, finds a brother and sister in Belarus are linked to Security Vulnerabilities Popping Up on Hugging Face s AI Platform Tools of the (Illegitimate) Trade: Mock API Fraud Detection: Time is Not on Our Side A review of court records shows US federal investigators used push alert tokens in at least four cases to arrest suspects in cases related to CSAM and New SPIKEDWINE APT group is targeting officials in Europe The US launches a probe into possible security risks of Chinese-manufactured vehicles, saying modern cars are like smartphones and could be used for e How better key management can close cloud security gaps troubling US government Commerce Dept. to look at privacy, cyber risks from Chinese-sourced connected vehicle equipment Is the LockBit gang resuming its operation? New Backdoor Targeting European Officials Linked to Indian Diplomatic Events Lazarus APT exploited zero-day in Windows driver to gain kernel privileges Notorious ransomware group claims responsibility for attacks roiling US pharmacies Calendar Meeting Links Used to Spread Mac Malware Unmasking 2024’s Email Security Landscape What is Old is New Again: Lessons in Anti-Ransom Policy Researchers Uncover Tools And Tactics Used By Chinese Hackers - GBHackers Enterprise security: Making hot desking secure and accessible on a global scale Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations Biden executive order seeks to cut China off from Americans sensitive data TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28's MooBot Threat Tangerine - 243,462 breached accounts Iran hacking group impersonates defense firms, hostage campaigners OpenAI to court: New York Times' lawsuit used evidence obtained through hacking - SiliconANGLE News Bitfinex hacker turns government witness, explains tactics used in 2016 theft - crypto.news Feds say AI favors defenders over attackers in cyberspace so far Moscow Military Hackers Used Microsoft Outlook Vulnerability - BankInfoSecurity.com New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers OpenAI Says New York Times Used Prompt Hacking for Text in Suit - Bloomberg Law IDAT Loader used to infect a Ukraine entity in Finland with Remcos RAT TimbreStealer campaign targets Mexican users with financial lures Glean, which uses AI to offer unified search across apps used at a company, raised a $200M+ Series D at a $2.2B valuation and says annualized revenue The CTO for US Central Command says ML algorithms developed under Project Maven helped narrow down targets for 85+ air strikes in the Middle East on F The US adds Sandvine to its entity list, banning the networking equipment company from obtaining US tech, for supplying Egypt with equipment used for Russia-linked APT29 switched to targeting cloud services The US adds networking equipment company Sandvine to its entity list, banning it from obtaining US tech, for supplying Egypt with equipment used for c The CTO for US Central Command says AI developed for Project Maven was used to narrow down targets for 85+ air strikes in the Middle East on February Malicious Packages in npm, PyPI Highlight Supply-Chain Threat Researchers detail a spam campaign using hijacked abandoned domains and subdomains from reputable brands like eBay and VMware to send 5M malicious em Five Eyes nations warn of evolving Russian cyberespionage practices targeting cloud environments New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT HP Smart App For Windows: Download, Install, Use, Uninstall Change Healthcare provides update on cyberattack IntelBroker claimed the hack of the Los Angeles International Airport FBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga. LockBit is back and threatens to target more government organizations A consultant working for Rep. Dean Phillips, who challenged Biden in NH's primary, admits to producing the deepfake robocalls, saying anyone can Crooks stole $10 million from Axie Infinity co-founder Apple created post-quantum cryptographic protocol PQ3 for iMessage After LockBit takedown, police try to sow doubt in cybercrime community Microsoft releases PyRIT, a tool that the company's AI Red Team has been using to more efficiently check for risks in its generative AI systems, Microsoft releases PyRIT, a tool its AI Red Team has been using to check for risks in its generative AI systems like Copilot, to the public (Sabrina O Here Are the Secret Locations of ShotSpotter Gunfire Sensors TikTok s latest actions to combat misinformation shows it s not just a U.S. problem New Leak Shows Business Side of China’s APT Menace Russian Government Software Backdoored to Deploy Konni RAT Malware Dancho Danchev’s Law Enforcement and OSINT Operation "Uncle George" – A 2024 Update New Mustang Panda campaign targets Asia with a backdoor dubbed DOPLUGS Cloud-Native Data Security Posture Management Deployments on AWS with Symmetry Systems SCCM Hierarchy Takeover with High Availability US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES Microsoft rolls out expanded logging six months after Chinese breach QR-Code Attacks Target the C-Suite 42 Times More than Standard Employees Types of SaaS Applications: Categories and Examples HYAS Product Enhancements – Part 1 – February 2024 Over 40% of Firms Struggle With Cybersecurity Talent Shortage New Redis miner Migo uses novel system weakening techniques How CVSS 4.0 changes (or doesn t) the way we see vulnerability severity IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors Apple rolls out quantum-resistant cryptography for iMessage Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS 6 Ways to Simplify SaaS Identity Governance A profile of ElevenLabs, whose AI voice cloning tech is being used to spoof politicians; five of ElevenLabs' 40 employees are dedicated to trust How to protect your machinelearning Models Zoom Announces Critical Vulnerability for Desktop Application Scale AI signs a one-year contract with the Pentagon to provide a means to test and evaluate LLMs that can be used for military planning and decision- Fairwinds Insights Release Notes 15.0-15.2: Aggregated Action Items Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates More details about Operation Cronos that disrupted Lockbit operation Astaroth, Mekotio & Ousaban abusing Google Cloud Run in LATAM-focused malware campaigns Fix Reddit App Not Working on iPhone and Android Maryland Busts $9.5 Million #BEC Money Laundering Ring Report: Manufacturing bears the brunt of industrial ransomware Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric Paris-based Planity, whose SaaS is used by 40K+ small businesses for appointment booking and more, raised a €45M Series C led by InfraVia Cap Law enforcement from 11 countries, including the FBI and UK National Crime Agency, disrupt the LockBit gang and seize 11K domains used to facilitate r FBI, British authorities seize infrastructure of LockBit ransomware group FBI operation seizes infrastructure of LockBit ransomware group FBI: U.S. Government Disrupts Botnet People's Republic Of China Used To Conceal Hacking Of Critical Infrastructure - Los Alamos Daily Post NSO Group and Its MMS Fingerprint Attack A Ukrainian Raccoon Infostealer operator is awaiting trial in the US ChatGPT Used by North Korean Hackers to Scam LinkedIn Users - Tech.co How BRICS Got “Rug Pulled” Cryptocurrency Counterfeiting is on the Rise Ex-Employee's Admin Credentials Used in US Gov Agency Hack - SecurityWeek BounceBack - Stealth Redirector For Your Red Team Operation Security Security Affairs newsletter Round 459 by Pierluigi Paganini INTERNATIONAL EDITION CISA: Cisco ASA FTD bug CVE-2020-3259 exploited in ransomware attacks Tech companies pledge to protect 2024 elections from AI-generated media OpenAI’s Sora Generates Photorealistic Videos Mysterious MMS Fingerprint Hack Used by Spyware Firm NSO Group Revealed - SecurityWeek Ex-Employee s Admin Credentials Used in US Gov Agency Hack - SecurityWeek US crimefighters shut down botnet used by Russian Fancy Bear hackers - TechRadar OpenAI's Sora announcement sparks awe and horror, as the startup continues to be frustratingly secretive about the data used to train the text-to OpenAI's Sora announcement sparks awe and horror, as the company continues to be frustratingly secretive about the data used to train the text-to Israeli NSO Group Suspected of “MMS Fingerprint” Attack on WhatsApp CrowdStrike Named the Only Customers’ Choice: 2024 Gartner Voice of the Customer for Vulnerability Assessment CrowdStrike Is Proud to Sponsor the Mac Admins Foundation U.S. CISA: hackers breached a state government organization PDF Malware on the Rise, Used to Spread WikiLoader, Ursnif and DarkGate Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs New Outlook 0-day RCE Flaw Exploited in the Wild The FTC proposes new rules that would make companies liable if they "know or have reason to know" their AI tech is being used to harmfully i The US and its allies disrupt access by Russia-backed hacking group APT28, or Fancy Bear, to 1,000+ home and small business routers used for criminal U.S. Government Disrupts Botnet Used by Russian GRU Hackers - Duo Security Google announces the AI Cyber Defense Initiative, which includes launching new AI security training and open sourcing Magika, a tool used to protect G Sources: spyware vendor Variston is closing after Google "burned" its name publicly in 2022; source: a disgruntled staffer sent its maliciou Feds Disrupt Botnet Used by Russian APT28 Hackers - Security Boulevard Ukrainian national pleads guilty for roles in Zeus, IcedID malware operations Feds Disrupt Botnet Used by Russian APT28 Hackers US Gov dismantled the Moobot botnet controlled by Russia-linked APT28 Why the toothbrush DDoS story fooled us all FBI disrupts Moobot botnet used by Russian military hackers - BleepingComputer DOJ, FBI disrupt Russian intelligence botnet Number of Data Compromises Affecting U.S. Organizations Rises 77% How to Protect Your Machine Learning Models Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries Russian Turla Hackers Target Polish NGOs with New TinyTurla-NG Backdoor TinyTurla Next Generation - Turla APT spies on Polish NGOs Number of Data Compromises Affecting U.S. Organizations Rises To 77% Cybercriminals found innovative ways to infect endpoints in 2023 CISA adds Microsoft Windows bugs to its Known Exploited Vulnerabilities catalog Nation-state actors are using AI services and LLMs for cyberattacks Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyber Attacks The tangled web of corporations behind the New Hampshire AI robocall How to Analyze the MITRE Engenuity ATT&CK Evaluations: Enterprise A Free Decryptor Tool for Rhysida Ransomware is Available Water Hydra s Zero-Day Attack Chain Targets Financial Traders Meta details actions against eight spyware firms Microsoft Claims Russia, China And Others Used OpenAI s Tools For Hacking - Forbes Russian and North Korean hackers used OpenAI tools to hone cyberattacks - Engadget What is a Passkey? Definition, How It Works and More Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks How are attackers using QR codes in phishing emails and lure documents? The differences between red, blue and purple team engagements Google's TAG says a pro-Palestinian hacking group targeted Israeli software engineers to download malware ahead of October 7, in an attack dubbed Hackers for China, Russia and Others Used OpenAI Systems, Report Says - The New York Times State-backed hackers are experimenting with OpenAI models Sydney-based quantum computing startup Diraq extends its Series A to $35M led by Quantonation, taking its total funding to $120M+, to build quantum pr Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader Alert! 333% Surge in Hunter-Killer Malware that Bypasses Network Security Controls The Next Evolution of Recorded Future AI: Powering the Future of Threat Intelligence Google: Iranian, regional hacking operations that target Israel remain opportunistic but focused Volt Typhoon targeted emergency management services, per report Fat Patch Tuesday, February 2024 Edition Hackers used new Windows Defender zero-day to drop DarkMe malware - BleepingComputer Polish PM Donald Tusk says state authorities under the previous government used NSO's Pegasus spyware illegally against a "very long" l HijackLoader Expands Techniques to Improve Defense Evasion CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks Polish PM Donald Tusk says state authorities under the previous government used Pegasus spyware illegally against a "very long" list of hack In 9+ federal child exploitation cases since 2018, the US said spy cams, sometimes promoted with racy imagery, sold on Amazon or eBay were used to fil Residential Proxies vs. Datacenter Proxies: Choosing the Right Option China Calls Out U.S. For Hacking. The Proof? TBD! Researchers released a free decryption tool for the Rhysida Ransomware Sources: Sudan's paramilitary Rapid Support Forces, which is fighting Sudan's army, has used Starlink since August 2023, during a nationwide US Authorities Shut Down Sites Selling the WarZone RAT U.S. Authorities Shut Down Sites Selling the WarZone RAT Canada Gov plans to ban the Flipper Zero to curb car thefts Sources: Sudan's paramilitary Rapid Support Forces, which is fighting Sudan's army, has been using Starlink since August 2023, during an int ExpressVPN leaked DNS requests due to a bug in the split tunneling feature US Feds arrested two men involved in the Warzone RAT operation 9 Possible Ways Hackers Can Use Public Wi-Fi to Steal Your Sensitive Data Better software supply chain security through SBOMs A personal experience of CISSP boot camp Raspberry Robin spotted using two new 1-day LPE exploits Should I get CISA Certified? Security Affairs newsletter Round 458 by Pierluigi Paganini INTERNATIONAL EDITION U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators Identification Documents: an Obsolete Fraud Countermeasure Crypto startups like Blast are offering loyalty points to lure users, without detailing the rewards; Blast has attracted $1.3B in crypto since Novembe Crypto startups like Blast are offering airline-like loyalty points to attract users without defining rewards; Blast lured $1.3B in crypto since Novem macOS Backdoor RustDoor likely linked to Alphv BlackCat ransomware operations Alert: New Stealthy "RustDoor" Backdoor Targeting Apple macOS Devices The FTC says Americans lost $10B+ to scammers in 2023, up 14% YoY, with 2.6M+ consumers filing fraud reports; email was the most commonly used method Memo: Centers for Medicare & Medicaid Services says health insurers cannot use AI to determine care or deny coverage to members on Medicare Advant Juniper Support Portal Exposed Customer Device Info Exploiting a vulnerable Minifilter Driver to create a process killer Cybersecurity Insights with Contrast CISO David Lindner | 2 9 24 Fortinet warns of a new actively exploited RCE flaw in FortiOS SSL VPN US offers $10 million reward for info on Hive ransomware group leaders Mayor's Facebook Page Hacked, Used in Scam The Warwick Valley Dispatch - wvdispatch.com Spyware isn t going anywhere, and neither are its tactics Unraveling the truth behind the DDoS attack from electric toothbrushes London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime LastPass warns users about a fake copy of its app on Apple's App Store, with a similar name and logo, likely used as a phishing app to steal user Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017 2023 Millions of hacked toothbrushes used in Swiss cyber attack, report says - MSN Nearly 2 in 5 users in India face web threats in 2023: These are the two most used ways of hacking - Times of India TikTok quietly removed view counts for hashtags in January, after researchers used them to show the disparity in views of pro-Israel and pro-Palestini New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization Unprecedented Rise of Malvertising as a Precursor to Ransomware Millions of hacked toothbrushes used in Swiss cyber attack, report says - msnNOW HijackLoader Evolves: Researchers Decode the Latest Evasion Methods Millions of hacked toothbrushes could be used in cyber attack, researchers warn - The Independent Google Cybersecurity Action Team Threat Horizons Report #9 Is Out! 3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen 3 million smart toothbrushes were just used in a DDoS attack. Or were they? Millions of hacked toothbrushes used in Swiss cyber attack - msnNOW PayPal reports Q4 revenue up 9% YoY to $8B, vs. $7.87B est., and total payment volume up 15% YoY to $409.8B, vs. $404.45B est. (Manya Saini Reuters) Using Proactive Intelligence Against Adversary Infrastructure CISA adds Google Chromium V8 Type Confusion bug to its Known Exploited Vulnerabilities catalog Millions of hacked toothbrushes used in Swiss cyber attack (1) - DataBreaches.net Fortinet addressed two critical FortiSIEM vulnerabilities Feds: Chinese hacking operations have been in critical infrastructure networks for five years From Cybercrime Saul Goodman to the Russian GRU Hackers DDoS Swiss Website with 3 Million Hacked Smart Toothbrushes Critical shim bug impacts every Linux boot loader signed in the past decade IBM Shows How Generative AI Tools Can Hijack Live Calls Millions of hacked toothbrushes used in Swiss cyber attack, report says - The Independent How to Fight Long-Game Social Engineering Attacks Google Claims Government Hackers Used Three Spyware Against iPhone Users Last Year - Indiatimes.com Millions of hacked toothbrushes used in Swiss cyber attack - The Independent Millions of smart toothbrushes used in botnet attack on company - Boing Boing Millions of hacked toothbrushes used in Swiss cyber attack - Yahoo! Voices Hacker Claims to Have Accessed Law Enforcement System Used by Binance and Coinbase - Decrypt Government hackers used iphone flaws to spy on victims - Fudzilla Jenkins Arbitrary File Leak Vulnerability, CVE-2024-23897, Can Lead To RCE Google says hackers used vulnerabilities in Apple s iPhone operating system to target victims - Times of India China-linked APT deployed malware in a network of the Dutch Ministry of Defence Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network NYC moped gang of Venezuelan migrants used HACKERS to breach banking apps as details of their high-tech operat - Daily Mail Top 12 Ways to Fix Discord Keeps Restarting on Windows & macOS Phishing is the top attack method used by threat actors Microsoft: Iran is refining its cyber operations Researchers say 3M smart toothbrushes with a Java-based OS were compromised by hackers and incorporated into botnets used in DDoS attacks against a S Commercial spyware vendors are behind most zero-day exploits discovered by Google TAG New Hampshire authorities trace Biden AI robocall to Texas-based telecom 3 million smart toothbrushes were just used in a DDoS attack. Really White House ramping up efforts to combat deepfakes New Hampshire's AG says fake robocalls using deepfaked audio of Biden to discourage voters numbered 5K to 25K and are linked to Lingo Telecom and Generative AI Used to Launch Phishing Attacks Admissions essay reviewers say that certain words, such as "tapestry", appear more frequently in submissions now and can be seen as red flag US Uses Visa Restrictions in Struggle Against Spyware The Cloudflare source code breach: Lessons learned Safer Internet Day: Two Million Brits Victims of Financial Identity Fraud U.S. Gov imposes visa restrictions on individuals misusing Commercial Spyware The FCC plans to stop accepting new enrollments for a US government broadband subsidy, used by 23M households, which is set to run out of funding in m Google: Governments need to do more to combat commercial spyware Key Differences Between Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA) How are user credentials stolen and used by threat actors? Migrate Off That Old SIEM Already! What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team Vulnerability Summary for the Week of January 29, 2024 What are Threat Intelligence Feeds? Definition & Meaning What is the Cyber Kill Chain? And How to Use It with Threat Intelligence? Applying Threat Intelligence to the Diamond Model of Intrusion Analysis How researchers used AI to read the Herculaneum papyri, charred in 79 AD by Mount Vesuvius' eruption, potentially rewriting key parts of ancient US Condemns Iran, Issues Sanctions for Cyber-Attacks on Critical Infrastructure Nation-state actor used recent Okta compromises to hack into Cloudflare systems - CSO Online Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware Deepfakes, dollars and deep state fears: Inside the minds of election officials heading into 2024 Crooks stole $25.5 million from a multinational firm using a ‘deepfake’ video call Software firm AnyDesk disclosed a security breach US government imposed sanctions on six Iranian intel officials ThreatLabz Coverage Advisory: Ivanti s VPN Vulnerabilities Exploited by Hackers, New Zero-Days Pose Critical Risk A Hong Kong-based firm's employee was tricked into paying $25M to fraudsters who used deepfake tech to pose as the company's CFO and staff d Mayor's Facebook page hacked, used in scam (VIDEO) - Mid Hudson News Website AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web Security Affairs newsletter Round 457 by Pierluigi Paganini INTERNATIONAL EDITION A look at the decline of Quora, which used to stand out as an accuracy-focused, knowledge-centric platform but is now filled with bizarre, AI-generate Blocking Compromised Tokens with Wallarm Apple open sources Pkl, a configuration-as-code language with rich validation and tooling, with Swift, Go, Java, and Kotlin integration (Pkl Blog) Cybersecurity Insights with Contrast CISO David Lindner | 2 2 24 Microsoft Breach How Can I See This In BloodHound? Microsoft Breach What Happened? What Should Azure Admins Do? Iranian hackers breached Albania s Institute of Statistics (INSTAT) Report reveals Pegasus spyware used to hack journalists and activists in Jordan - MyIndMakers Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison Credential Harvesting Vs. Credential Stuffing Attacks: What s the Difference? Cloudflare breached on Thanksgiving Day, but the attack was promptly contained Passkeys and The Beginning of Stronger Authentication PurpleFox malware infected at least 2,000 computers in Ukraine VajraSpy: A Patchwork of espionage apps Man sentenced to six years in prison for stealing millions in cryptocurrency via SIM swapping Cloudflare says it was hacked in November 2023 by a suspected "nation state attacker" who used auth tokens stolen in Okta's breach from CISA orders federal agencies to disconnect Ivanti VPN instances by February 2 The Allen Institute for AI open sources OLMo, or "Open Language MOdels", and its dataset Dolma; partners Harvard, AMD, Databricks, and other The Allen Institute for AI open sources OLMo, or "Open Language MOdels", and its data set Dolma; OLMo was created with Harvard, AMD, Databri US Thwarts Volt Typhoon Cyber Espionage Campaign Through Router Disruption Multiple malware used in attacks exploiting Ivanti VPN flaws Mobile Device Security Policy US adults survey: 83% use YouTube, 68% use Facebook, 47% use Instagram; 27% to 35% use Snapchat, WhatsApp, LinkedIn, TikTok, and Pinterest; 22% use X Dozens in Jordan targeted by authorities using NSO spyware, report finds How to Change Zoom Background On Chromebook Owner.com, which offers an all-in-one platform for independent restaurants that includes online ordering and a website builder, raised a $33M Series B Pentagon investigating theft of sensitive files by ransomware group US adults survey: 83% use YouTube; 68% use Facebook; 47% use Instagram; 27% to 35% use Snapchat, WhatsApp, LinkedIn, TikTok, and Pinterest; 22% use X U.S. officials warn of dire Chinese cyber threats in wake of FBI operation to disrupt botnet US Disinfects Routers That China Allegedly Used for Hacking - PCMag AU US Disinfects Routers That China Allegedly Used for Hacking - PCMag UK US Disinfects Routers That China Allegedly Used for Hacking - PCMag Introducing DIFFER, a new tool for testing and validating transformed programs US Senators Propose Cybersecurity Agriculture Bill US Sanctions Three for Cyber Work for ISIS Protect AI Acquires Laiyer AI to Better Secure AI Models Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware What Are State-Sponsored Cyberattacks? Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware ESET takes part in global operation to disrupt the Grandoreiro banking trojan New Glibc Flaw Grants Attackers Root Access on Major Linux Distros BOFHound: Session Integration White House releases report on securing open-source software 750 million Indian mobile subscribers’ data offered for sale on dark web Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider Open Redirects Used to Disguise Phishing Links Balada Injector Malware Compromises 7,000+ WordPress Sites Navigating Secure Adoption of AI Across Government and Connected Infrastructure Cactus ransomware gang claims the Schneider Electric hack Identify Weak User Passwords With KnowBe4 s Enhanced Weak Password Test Experts detailed Microsoft Outlook flaw that can leak NTLM v2 hashed passwords Shortcut To Malice: URL Files US Senator Exposes NSA Purchase of Americans Internet Records After fake AI images of Taylor Swift went viral, Microsoft adds safeguards to its AI text-to-image tool Designer; Microsoft couldn't verify if De Bravo Channel Host Scammed Out of a Sizable Amount of Money by Fraudsters Posing as the Bank Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks Ukraine s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’ Microsoft says Russian hackers used previously identified tactic to breach senior exec emails - The Record from Recorded Future News 8 Best Ways to Fix XVDD SCSI Miniport Issue in Windows 10 11 Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Novel Threat Tactics, Notable Vulnerabilities, Current Trends, and Data Leaks Source: ElevenLabs banned a creator's account after Pindrop's researchers said ElevenLabs' tech was used to make an audio deepfake used Pro-Ukraine hackers wiped 2 petabytes of data from Russian research center Participants earned more than $1.3M at the Pwn2Own Automotive competition Blackwood hijacks software updates to deploy NSPX30 Week in security with Tony Anscombe Devin Anthony Magarian of Florida allegedly hacked online prescription websites used by doctors to issue narcotic ... - Newsday A TrickBot malware developer sentenced to 64 months in prison Source: ElevenLabs banned a creator's account after researchers said the company's tech was used to make an audio deepfake used in a fake Bi Devin Anthony Magarian of Florida allegedly hacked online prescription websites used by doctors to issue narcotic prescriptions, Nassau DA Anne Donnel Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks Microsoft details the techniques that the Russian hacking group Midnight Blizzard used to breach the email accounts of its executives and other organi Who is Alleged Medibank Hacker Aleksandr Ermakov? Microsoft details the techniques that Midnight Blizzard used to breach the email accounts of its executives and other organizations (Bill Toulas Bleep Cybersecurity Insights with Contrast CISO David Lindner | 1 26 24 QR Code Scammers are Changing Tactics to Evade Detection Watch out, experts warn of a critical flaw in Jenkins Pwn2Own Automotive 2024 Day 2 – Tesla hacked again Beyond Borders: Unraveling the Essence of Data Sovereignty and Protection Yearly Intel Trend Review: The 2023 RedSense report AI is already being used by ransomware gangs, warns NCSC Using Google Search to Find Software Can Be Risky Secret Service to revive the Cyber Investigations Advisory Board Russia-linked APT group Midnight Blizzard hacked Hewlett Packard Enterprise (HPE) NSPX30: A sophisticated AitM-enabled implant evolving since 2005 New Hampshire robocall kicks off era of AI-enabled election disinformation IEA: electricity used by data centers, crypto, and AI could grow 100%+ in the next three years; Ireland's data centers could use 32% of its elect Hackers Used SIM Swapping to Breach US SEC X Account - BankInfoSecurity.com IEA: electricity used by data centers, crypto, and AI may more than double in the next three years; Irish data centers will use 32% of its electricity Use of Generative AI Apps Jumps 400% in 2023, Signaling the Potential for More AI-Themed Attacks Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations IAE: electricity used by data centers, crypto, and AI may more than double in the next three years; Irish data centers will use 32% of its electricity Parrot TDS Injecting Malicious Redirect Scripts on Hacked Sites A filing in a class action suit by 10 US artists against Midjourney and others lists 16,000 artist names whose work Midjourney had allegedly used for Xianyu, Alibaba's online second-hand goods trading platform that claims to have 500M+ users, is opening its first bricks-and-mortar store in Hang The story behind the launch of Seceon aiSIEM-CGuard Automating Automated Detection and Response Microsoft critics accuse the firm of negligence in latest breach SEC Says Hacker Used 'SIM Swap' Attack to Make False Bitcoin ETF X Post - Unchained - Unchained US, UK, Australia sanction Russian national after major Australian ransomware attack Sources: the Biden admin preps an EO that aims to restrict the flow of sensitive data via intermediaries, like data brokers, to foreign adversaries li Malicious npm Packages Used to Target GitHub Developer SSH Keys How to Take Control of Your Data During Data Privacy Week Sources: the Biden admin preps an EO that aims to restrict the flow of sensitive data through intermediaries, like data brokers, to foreign countries Australian government announced sanctions for Medibank hacker Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos Sources: Byju's plans to raise more than $100M from existing investors at a less than $2B valuation, down more than 90% from $22B in October 2022 CISA adds VMware vCenter Server bug to its Known Exploited Vulnerabilities catalog Black Basta gang claims the hack of the UK water utility Southern Water SEC claims SIM swap technique used in hacking X account to post fake spot Bitcoin ETF approval - FXStreet 'Cyber sanctions' used for first time to target Medibank hacker - ABC News North Korean government hackers target individuals of interest, infosec professionals MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries Phone hacking used for corporate gain at Murdoch's media company, ex-minister claims - Tortoise - Tortoise Media My Slice , an Italian adaptive phishing campaign Data Privacy: Why It Matters To The Rest Of Us Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web ' - UAC-0050 RemoteUtilities (CERT-UA#8654) Backdoored pirated applications targets Apple macOS users The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked What is ATT Shift App? Top 5 Best Features of ATT Shift App in 2024 Book Review: The Crypto Launderers: Crime and CryptoCurrencies Russia-linked Midnight Blizzard APT hacked Microsoft corporate emails Devo Achieves ATO, and Federal CISOs Gain Another Key Resource Russian foreign intelligence hackers gain access to top Microsoft officials, company says Jailed BreachForums creator, admin sentenced to 20 years of supervised release CISA issues emergency directive for federal agencies to patch Ivanti VPN vulnerabilities The Difference Between Pivoting vs. Lateral Movement China-linked APT UNC3886 exploits VMware zero-day since 2021 Apple says the Vision Pro weighs 600g to 650g, depending on the Light Seal and head band used; the Meta Quest 3 weighs 516g and the Meta Quest Pro wei Facebook Work-From-Home Job Posting Scam Goes the Extra Mile to Trick Victims Author Rie Kudan, this year's winner of Japan's prestigious Akutagawa Prize, reveals that 5% of her book "quoted verbatim the sentence Author Rie Kudan, winner of Japan's prestigious Akutagawa Prize, reveals that around 5% of her book "quoted verbatim the sentences generated Apple says the Vision Pro weighs 600 to 650 grams depending on the Light Seal and headband used; Meta Quest 3 weighs 516 grams and Quest Pro weighs 72 Canadian Man Stuck in Triangle of E-Commerce Fraud PolyCrypt Runtime Crypter Being Sold On Cybercrime Forums What is SPICA backdoor malware used by Russian hackers on Western officials? - The Indian Express The Quantum Computing Cryptopocalypse I ll Know It When I See It The Unseen Threats: Anticipating Cybersecurity Risks in 2024 VeChain Official Account Hacked, Used to Promote Scam Giveaway - CoinGape Defining Good: A Strategic Approach to API Risk Reduction Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More Protect AI Report Surfaces MLflow Security Vulnerabilities Google TAG warns that Russian COLDRIVER APT is using a custom backdoor Drupal Releases Security Advisory for Drupal Core Critical vulnerability in ManageEngine could lead to file creation, dozens of other vulnerabilities disclosed by Talos to start 2024 Stablecoins Enabled $40 Billion in Crypto Crime Since 2022 Prolific Russian hacking unit using custom backdoor for the first time Exploring malicious Windows drivers (Part 1): Introduction to the kernel and drivers PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts Key Patch Updates for All Series of Oracle Products in January PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft iShutdown lightweight method allows to discover spyware infections on iPhones How to Detect Song Used in YouTube Video’s 2024 Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts Androxgh0st Malware: SafeBreach Coverage for US-CERT Alert (AA24-016A) Product Update | NEW! Cloud Monitor Consolidated View E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop It s Friday, I m [Writing That Typical CISO Email Github rotated credentials after the discovery of a vulnerability AI’s Role in Cybersecurity for Attackers and Defenders in 2024 FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation How to Activate Curiosity Stream on Roku, Android TV, Fire TV and Apple TV An Introduction to Deep File Inspection (DFI) RetroHunt : Retrospective Analysis for Threat Hunters UC Irvine cyberattack: Hackers post gruesome videos on Discord group used by students - KABC-TV LinkedIn is Being Used for *Dating* It s a Recipe for Disaster Getting Started: A Beginner’s Guide for Improving Privacy Remcos RAT Spreading Through Adult Games in New Attack Wave Experts warn of mass exploitation of Ivanti Connect Secure VPN flaws Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467) Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack This hacker used over a million virtual servers to create an incredibly powerful network - but then wasted it on mining ... - TechRadar Senators Demand Probe into SEC Hack After Bitcoin Price Spike Critical flaw found in WordPress plugin used on over 300,000 websites Alert: New DLL Variant Used For Malicious Code Execution Balada Injector continues to infect thousands of WordPress sites Attackers target Apache Hadoop and Flink to deliver cryptominers Attacks against Denmark ‘s energy sector were not carried out by Russia-linked APT Classic Baggie: A Delaware BEC Case calls him the leader of an International Criminal Organization Security Affairs newsletter Round 454 by Pierluigi Paganini INTERNATIONAL EDITION Akira ransomware targets Finnish organizations Anthropic researchers: AI models can be trained to deceive and the most commonly used AI safety techniques had little to no effect on the deceptive be A look at TikTok's e-commerce push, including subsidizing sales and shipping, and promoting sellers in user feeds, as ad sales weaken and social A look at TikTok's dogged e-commerce push by subsidizing sales and promoting sellers in user feeds, as ad sales weaken and social media stagnates API Predictions for 2024 Why is the iPhone Force Restart Not Working? Writeup for CVE-2023-43208: NextGen Mirth Connect Pre-Auth RCE Security researchers say they warned Apple as early as 2019 about AirDrop vulnerabilities that Chinese authorities claim they recently used to identif Cybersecurity Insights with Contrast CISO David Lindner | 1 12 24 CISA Urges Critical Infrastructure to Patch Urgent ICS Vulnerabilities Malware Used in Ivanti Zero-Day Attacks Shows Hackers Preparing for Patch Rollout - SecurityWeek Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467 Team Liquid s wiki leak exposes 118K users A peek behind the curtain: How are sock puppet accounts used in OSINT? Why is my SSL expiring every 3 months? The evolution of AppSec: 4 key changes required for a new era Sandworm probably wasn t behind Danish critical infrastructure cyberattack, report says How Hackers Could Manipulate The Smart Wrenches Used To Build New Cars - The Autopian FTC Issues Warning About the Dangers of QR Code-Based Scams Beware of "Get to Know Me" Surveys Google formally endorses right to repair and will testify in favor of a law in Oregon, says regulators should ban "parts pairing", a tactic CISA adds Ivanti and Microsoft SharePoint bugs to its Known Exploited Vulnerabilities catalog Two zero-day bugs in Ivanti Connect Secure actively exploited Flying Under the Radar: Abusing GitHub for Malicious Infrastructure Monitoring the Dark Web with Threat Intelligence X Account of leading cybersecurity firm Mandiant was hacked because not adequately protected ShinyHunters member sentenced to three years in prison After hack, X claims SEC failed to use two-factor authentication What Is Adversary Infrastructure? Powerful Cloud Permissions You Should Know: Part 1 Cypher Queries in BloodHound Enterprise NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining What is Dark Web Monitoring? Definition and Tools Threat actors hacked the X account of the Securities and Exchange Commission (SEC) and announced fake Bitcoin ETF approval Here’s Some Bitcoin: Oh, and You’ve Been Served! Entire population of Brazil possibly exposed in massive data leak FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data Decryptor for Tortilla variant of Babuk ransomware released Bitcoin price jumps after hackers hijack SEC Twitter account Quora says it raised $75M from Andreessen Horowitz, to be used to accelerate the growth of Poe and pay bot creators through its creator monetization p InQuest & ThreatConnect Unite: Advanced Threat Intel Meets Enhanced Cybersecurity CISA adds Apache Superset bug to its Known Exploited Vulnerabilities catalog AI is helping US spies catch stealthy Chinese hacking ops, NSA official says LockBit ransomware gang claims the attack on Capital Health Embedded Linux IoT Security: Defending Against Cyber Threats New decryptor for Babuk Tortilla ransomware variant released TikTok restricts Creative Center, used by advertisers to track hashtags, after critics used the tool to scrutinize content on the Israel-Hamas war and TikTok restricts Creative Center, used by advertisers to track hashtags, after it was used by critics to scrutinize content on the Israel-Hamas war an Age-old problems to sharing cyber threat info remain, IG report finds Hackers hijack Beirut airport departure and arrival boards Meet Ika & Sal: The Bulletproof Hosting Duo from Hell FBI Releases Blackcat Ransomware Decryption Tool to Victims, Disrupting Attacks Saudi Ministry exposed sensitive data for 15 months Alert: Carbanak Malware Strikes Again With Updated Tactics Long-existing Bandook RAT targets Windows machines Security Affairs newsletter Round 453 by Pierluigi Paganini INTERNATIONAL EDITION Turkish Sea Turtle APT targets Dutch IT and Telecom firms Merck settles with insurers regarding a $1.4 billion claim over NotPetya damages Law firm Orrick data breach impacted 638,000 individuals What Is the FedRAMP Incident Response Control Family? Sources: the US DOJ may file an antitrust lawsuit against Apple over the dominance of the iPhone; sources say Meta encouraged the DOJ to look at Apple Sources: Synopsys is in advanced talks to acquire Ansys, which makes software used in aerospace, health care, and automotive, for $35B in a stock-and Sources: the US DOJ may file an antitrust lawsuit against Apple that targets the company's strategies to protect the dominance of the iPhone as s Sources: DOJ may file an antitrust lawsuit against Apple targeting Apple's strategies to protect the dominance of the iPhone as soon as the first Sources: Synopsys is in advanced talks to acquire Ansys, which makes software used by aerospace and manufacturing sectors, for $35B in a stock-and-ca Beware of Fraudulent Charge Messages Best of 2023: Enterprises Are Getting Better at Breach Prevention. But Attackers Are Getting Better, Too. Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware Qualcomm announces the Snapdragon XR2+ Gen 2, an update to the XR2 Gen 2 used in the Meta Quest 3, offering 4.3K resolution at 90fps per eye, up from Hacker hijacked Orange Spain RIPE account causing internet outage to company customers Museum World Hit by Cyberattack on Widely Used Software - The New York Times Qualcomm unveils the Snapdragon XR2 Plus Gen 2, an update to the XR2 Gen 2 used in Meta's Quest 3, offering 4.3K resolution at 90fps per eye, up GroupM forms a consortium with Disney, Roku, NBCU, YouTube, and others to push for standardized measurements and ad formats that can be used across st Qualcomm announces Snapdragon XR2 Plus Gen 2, an update to the XR2 Gen 2 used in the Meta Quest 3, offering 4.3K resolution at 90fps per eye, up from HealthEC Data Breach Impacts 4.5 Million Patients Resecurity Identifies AI Tool Being Used to Compromise Business Email Perplexity, which offers an AI-based "answer engine" used by 10M to compete with Google, raised $74M at a $520M valuation from IVP, Jeff Bez Crooks hacked Mandiant X account to push cryptocurrency scam Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG Flaw in Black Basta Ransomware Exploited to Create Decryptor Don t trust links with known domains: BMW affected by redirect vulnerability Navigating Election Risks: A Guide for Executives CyberheistNews Vol 14 #01 [Heads Up] SMTP Smuggling - How It Easily Circumvents Your Email Defenses 2024 predictions: AI will help make Web3 usable in mainstream applications and Web3 will help us trust AI, Web3 regulatory clarity, flat VC investing, Russia Spies on Kyiv Defenses via Hacked Cameras Before Missile Strikes Poland: hackers used to unblock trains? - RailTech.com Facebook rolled out Link History, which creates a repository of all the links clicked on by a user on the mobile app, with the data being used for tar Ukraine s SBU said that Russia’s intelligence hacked surveillance cameras to direct a missile strike on Kyiv Valve ended Steam support for Windows 7, 8, and 8.1 on January 1, saying the app used a now-defunct embedded Chrome version; <1% of Steam users hav Researchers released a free decryptor for Black Basta ransomware Steam ended support for Windows 7, 8, and 8.1 on January 1, saying the app used a now-unsupported embedded Chrome version; <1% of Steam users are o Top 5 Cyber Predictions for 2024: A CISO Perspective How to Fix Volume Automatically Goes Down on Android Experts warn of JinxLoader loader used to spread Formbook and XLoader Terrapin attack allows to downgrade SSH protocol security Multiple organizations in Iran were breached by a mysterious hacker Exclusive: AI being used for hacking and misinformation, top Canadian cyber official says - Reuters.com List of Secure Dark Web Email Providers in 2024 Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop MS Excel Vulnerability Exploited To Distribute Agent Tesla New JinxLoader Targeting Users with Formbook and XLoader Malware Google agreed to settle a $5 billion privacy lawsuit AI holidays 2023 Vietnam’s Massive CAPTCHA crackers vs. Microsoft DCU Exclusive: AI being used for hacking and misinformation, top Canadian cyber official says - Reuters Spotify music converter TuneFab puts users at risk Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks - The Hacker News Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Happy 14th Birthday, KrebsOnSecurity! Sources: US intelligence determined that the Chinese spy balloon that flew across the US in January and February 2023 used a US ISP to communicate wit Donald Trump's former lawyer Michael Cohen says he mistakenly used bogus legal citations from Google Bard in a motion seeking an early end to cou How hackers used iMessage to attack iPhone users - Times of India Sources: US intelligence officials determined that the Chinese spy balloon that flew across the US in February 2023 used a US internet provider to com Microsoft disables Windows App Installer's ms-appinstaller after the URI scheme was used to spread malware; Microsoft disabled and re-enabled the Microsoft disables Windows App Installer's MSIX protocol handler after it was used to spread malware, after previously disabling it in 2022 and r AI in 2024: The Top 10 Cutting Edge Social Engineering Threats Russia-linked APT28 used new malware in a recent phishing campaign New Version of Meduza Stealer Released in Dark Web EASM in 2023 – shortcomings with CVE-overreliance and flaws in security scoring systems Operation Triangulation attacks relied on an undocumented hardware feature GM claims in a lawsuit that San Francisco used Cruise's presence to tie its tax bill to a portion of GM's global revenue, unfairly taxing $1 Securing Networks: Addressing pfSense Vulnerabilities Experts warn of critical Zero-Day in Apache OfBiz New Rugmi Malware Loader Surges with Hundreds of Daily Detections Researchers detail a zero-click iMessage attack that for over four years used four zero-days to hack iPhones, including dozens belonging to Kaspersky Researchers detail a zero-click iMessage attack that used four zero-days and hacked iPhones for over four years, including dozens belonging to Kaspers The NYT sues OpenAI and Microsoft for copyright infringement, alleging they used millions of its articles to train AI, the first major US media outlet AI In Windows: Investigating Windows Copilot Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 The NYT sues OpenAI and Microsoft for copyright infringement, alleging millions of articles were used in training, the first major US media organizati Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances Elections 2024, artificial intelligence could upset world balances Experts analyzed attacks against poorly managed Linux SSH servers Hollywood unions resisting AI being used to recreate actors' performances sets a precedent for future labor movements on how to push back against RingGo, ParkMobile Owner EasyPark Suffers Data Breach, User Data Stolen Carbanak malware returned in ransomware attacks We ve added more content to ZKDocs Carbanak Banking Malware Resurfaces with New Ransomware Tactics How to Edit WhatsApp Message After Sending on Android and iPhone APT group UAC-0099 targets Ukraine exploiting a WinRAR flaw Iran-linked APT33 targets Defense Industrial Base sector with FalseFont backdoor Ubuntu Security Updates Fixed Vim Vulnerabilities Researchers extract business and personal email addresses for 30+ NYT staff by fine tuning GPT-3.5 Turbo, bypassing the safeguards for privacy-related What Is ‘Sent As Sms Via Server’ on Android and How to Fix it USENIX Security 23 – Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee Abuse Vectors: A Framewor Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware Justice Secretary in Deepfake General Election Warning How to Make Windows 11 Search Faster And More Accurate The JetBrains TeamCity software supply chain attack: Lessons learned St Vincent s Health Australia says data stolen in cyberattack 'GTA 6' Hacker Who Used Hotel TV, Firestick & Mobile Phone To Breach Rockstar Games Sentenced To Lifelong ... - Whiskey Riff Unraveling the Struts2 security vulnerability: A deep dive Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023 How Meta's hyperscale data center in Odense, Denmark, opened in 2020, helps heat 11K homes, as Microsoft, Amazon, and others plan to repurpose d Cancer Center Patients Become Attempted Victims of Data Extortion Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware Phishing attacks use an old Microsoft Office flaw to spread Agent Tesla malware Understanding QEMU s Role in Linux System Emulation Security How excess heat from Meta's hyperscale data center in Odense, opened in 2020, helps heat roughly 11,000 homes in the Danish city (Morgan Meaker W How to See Who Has Access to Your Google Drive Files Scammers are impersonating Binance, zkSync, and other crypto accounts on X by creating fake URLs to promote scams, giveaways, and more to steal crypto German police seized the dark web marketplace Kingdom Market Aston Martin and Porsche preview bespoke interfaces for the next generation of Apple CarPlay, which integrates into all the displays of upcoming vehic How Congress can rein in data brokers Law enforcement Operation HAECHI IV led to the seizure of $300 Million Stanford researchers: LAION-5B, a dataset of 5B+ images used by Stability AI and others, contains 1,008+ instances of CSAM, possibly helping AI to gen Coping with Python 3.7 End of Life: A Guide for Developers Stanford researchers: LAION-5B, a dataset of 5B images used by Stability AI and others, contains 1,008 instances of CSAM, possibly helping to create A BMW dealer at risk of takeover by cybercriminals Researchers say AI robot CyberRunner outmaneuvers humans in the maze game Labyrinth, in a breakthrough for AI beating humans at direct physical applic Comcast s Xfinity customer data exposed after CitrixBleed attack BlackCat Ransomware Raises Ante After FBI Disruption FBI claims to have dismantled AlphV Blackcat ransomware operation, but the group denies it FBI seizes ALPHV leak website. Hours later, ransomware gang claims it unseized it 2023 Cybersecurity Year in Review Adobe's failed Figma acquisition leaves Adobe with $6B in cash, likely to be used for AI investment and stock buybacks; ADBE jumped 75%+ in 2023 10 Cybersecurity Trends That Emerged in 2023 The failed Figma acquisition leaves Adobe with $6B in cash, likely to be used for AI development and stock buybacks; ADBE is up 75%+ in 2023 amid AI CVE-2023-50164: A Critical Vulnerability in Apache Struts Sources: Appin co-founder Rajat Khare used law firms to threaten US, UK, Swiss, Indian, and Luxembourg outlets to kill stories about the hack-for-hire Sources: Appin co-founder Rajat Khare used law firms to threaten outlets in the US, UK, and other countries to kill stories about the Indian hack-for- SEC disclosure rule for material cybersecurity incidents goes into effect Info stealers and how to protect against them Unique Malware Used in Cyber Attacks Increases by 70% in Just One Quarter Pro-Israel Predatory Sparrow hacker group disrupted services at around 70% of Iran s fuel stations Qakbot is back and targets the Hospitality industry Episode 252: Colin O’Flynn On Hacking An Oven To Make It Stop Lying A supply chain attack on crypto hardware wallet Ledger led to the theft of $600K How to Fix Google Play Services Keeps Stopping OpenAI says "ByteDance's use of our API was minimal", but suspends the account and investigates, after a report that ByteDance used Ope InfectedSlurs botnet targets QNAP VioStor NVR vulnerability Security Affairs newsletter Round 450 by Pierluigi Paganini INTERNATIONAL EDITION Hunters International ransomware gang claims to have hacked the Fred Hutch Cancer Center Robinhood received $1.1B in account transfers since it began offering a 1% match on transferred brokerage accounts on October 23, with 150+ transfers OpenAI says ByteDance's use of its API was minimal, suspends ByteDance's account while it investigates a report that ByteDance used OpenAI&a Phishing Is Still the No. 1 Attack Vector, With Huge 144% Malicious URL Spike Polygon Labs discontinues contributions to Edge, the OSS used for Dogechain, and shifts towards the Polygon CDK, which is powered by zero-knowledge cr How to Fix If Google Maps Has Stopped Working Docs: ByteDance used OpenAI's API to develop its own LLM, codenamed Project Seed; employees discussed "whitewashing" the evidence throu Docs: ByteDance used OpenAI API to develop its own LLM, codenamed Project Seed; employees discussed "whitewashing" the evidence through &quo New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy Attacks Multiple flaws in pfSense firewall can lead to arbitrary code execution BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign Idaho National Laboratory data breach impacted 45,047 individuals List of Stores that Accept Apple Pay in 2024 Gas Stations, Best Buy, Grocery How to Buy, Sell, And Transfer Used Starlink Dish How to Enable Windows 11 Screen Savers People's confusion whether Dropbox data will be used as training data for OpenAI resembles the conspiracy theory that Meta spies on users through Filing: Apple and Corellium settle a copyright dispute dating to 2019 in which Apple tried to shut down Corellium's virtual iPhone software (Thom Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack CVE-2023-50164: Another vulnerability in the widely used Apache Struts2 component Google DeepMind's FunSearch model cracks the unsolved cap set problem in pure mathematics, the first time an LLM has solved a long-standing scien A personal Year in Review to round out 2023 The confusion around Dropbox's AI toggle highlights an AI trust crisis where many users don't believe OpenAI's claims that their data w Ten Years Later, New Clues in the Target Breach Google DeepMind used its FunSearch model to crack the famous cap set problem in pure mathematics, the first time an LLM solved a long-standing scienti Russia-linked APT29 spotted targeting JetBrains TeamCity servers Hackers exploit Google Forms to trick users into falling for call-back phishing attack Microsoft Targets Threat Group Behind Fake Accounts Approval Phishing Scams Drain $1bn of Cryptocurrency from Victims Microsoft seized the US infrastructure of the Storm-1152 cybercrime group French authorities arrested a Russian national for his role in the Hive ransomware operation After an on-by-default AI toggle caused confusion, Dropbox says user data is only shared with OpenAI if the AI-powered search feature is actively bein Kyivstar CEO: Hackers used compromised employee account to carry out attack - Kyiv Independent Microsoft seizes US-based infrastructure and websites used by cybercrime group Storm-1152 that created 750M fraudulent Microsoft accounts, after a co China-linked APT Volt Typhoon linked to KV-Botnet Microsoft seizes infrastructure of top cybercrime group Silent, Yet Powerful Pandora hVNC, The Popular Cybercrime Tool That Flies Under the Radar Cyber Risk Quantification Framework: A Beginner’s Guide OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks - Security Affairs Sources: sparked by Spotify's complaint in 2019, the EU may fine Apple in 2024 and plans to ban its anti-steering App Store rules used on music s Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144% OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks How Google is Using Clang Sanitizers to Make Android More Secure Sophos backports fix for CVE-2022-3236 for EOL firewall firmware versions due to ongoing attacks Microsoft warns that threat actors are misusing OAuth apps to automate phishing attacks, push spam, and deploy VMs for crypto mining (Sergiu Gatlan Bl ASML and Samsung plan to jointly spend $760M to build a research plant in South Korea using ASML's next-generation extreme ultraviolet equipment Microsoft Patch Tuesday, December 2023 Edition Microsoft releases lightest Patch Tuesday in three years, no zero-days disclosed CISA unveils Google Workspace guidelines informed by Chinese breach of Microsoft Russia Weaponizes Israel-Hamas Conflict in Targeted Phishing Attack SAP Patch Day: December 2023 Sources: Apple offers to let rivals access its tap-and-go payments systems for mobile wallets, hoping to settle EU antitrust charges and avoid a possi Dubai s largest taxi app exposes 220K+ users Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware Discord staff, moderators, and researchers say its rules and culture let a racist and antisemitic community flourish, after the April classified docum A profile of Li Ying, a Chinese graduate who used his X account to tell the world about protests in 2022 and now lives in exile after losing his livel Sources: Apple offers to let rivals access its tap-and-go payments systems for mobile wallets, to settle EU antitrust charges and avoid a possible hef Silent but deadly: The rise of zero-click attacks Top 10 Best Shakespeare Translator Tools and Apps in 2024 US teens survey: 93% use YouTube, 63% TikTok, 60% Snapchat, 59% Instagram, 33% Facebook, 21% WhatsApp; 33% use at least one of these "almost con The US chooses BAE Systems for the first CHIPS Act grant, giving the defense contractor $35M to quadruple production of chips used in F-15 and F-35 fi US teens survey: 93% use YouTube, 63% use TikTok, 60% use Snapchat, 59% use Instagram, and 33% use Facebook; 33% use at least one of these "almo The US awards the first CHIPS Act grant to BAE Systems, giving the defense contractor $35M to quadruple production of chips used in F-15 and F-35 figh TikTok reaches $10B in gross revenue, including $3.84B in 2023 so far, $3.32B in 2022, and $1.72B in 2021, the fifth mobile app and the first non-game Apache fixed Critical RCE flaw CVE-2023-50164 in Struts 2 TikTok reaches $10B in gross revenue, including $3.8B in revenue in 2023 so far, $3.3B in 2022, and $1.7B in 2021, the fifth app to do so and the firs WSJ: "A Hidden Risk in the Municipal Bond Market: Hackers" North Korean hacking ops continue to exploit Log4Shell EU Reaches Agreement on AI Act Amid Three-Day Negotiations ALPHV BlackCat Site Downed After Suspected Police Action The US awards the first CHIPS Act grant to BAE Systems, giving the defense contractor $35M to boost production of chips used in F-15 and F-35 fighter Police Arrest Hundreds of Human Traffickers Linked to Cyber Fraud TikTok plans to invest $1.5B in a joint venture with GoTo, aiming to comply with regulations in Indonesia so that TikTok can restart its shopping serv TikTok to invest $1.5B in a joint venture with Indonesia's GoTo, aiming to address regulatory concerns so that TikTok can revive its shopping ser Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series OctoML ends its business with text-to-image AI model sharing platform Civitai, after a report found some images by Civitai users "could be catego 5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips Magic: The Gathering Cards Used in Possible Cashout by Uranium Finance Hacker - Cryptonews Trojan Malware Hidden in Cracked macOS Software, Kaspersky Says Founder of Bitzlato exchange has pleaded for unlicensed money transmitting Android barcode scanner app exposes user passwords Incident Reporting and Response Procedures Policy The Top 5 trends every DevOps leader needs to know for 2024 Russia-linked APT8 exploited Outlook zero-day to target European NATO members Russian information operation uses US celebrity Cameos to attack Zelensky Cybersecurity considerations to have when shopping for holiday gifts LogoFAIL vulnerabilities impact vast majority of devices Russian information operation uses U.S. celebrity Cameos to attack Zelensky Microsoft says Russia-aligned propagandists duped at least seven Western celebrities via Cameo into recording videos used to attack Ukraine's Pre How to Check Graphics Card In Windows 11 A cyber attack hit Nissan Oceania Microsoft says Russia-linked propagandists duped at least seven Western celebrities via Cameo into recording videos later used to attack Volodymyr Zel Russian hackers used 'spear-phishing' to steal information from UK politicians, government says - Sky News Russian hackers used 'spear-phishing' to steal information from UK politicians, govt says - Sky News Dangerous vulnerability in fleet management software seemingly ignored by vendor Remote code execution vulnerabilities found in Buildroot, Foxit PDF Reader Adobe ColdFusion Flaw Used by Hackers to Access US Govt Servers - HackRead 78% of CISOs Concerned About AppSec Manageability Adobe ColdFusion Flaw Used by Hackers to Access US Govt Servers Russian-Backed Hackers Target High-Value US, European Entities ICANN Launches Service to Help With WHOIS Lookups Publishing Trail of Bits CodeQL queries Dragos Community Defense Program Helps Small Utilities Facing Cyber Attacks HYAS Insight Uncovers and Mitigates Russian-Based Cyberattack Citing Attacks On Small Utilities, Dragos Launches Community Defense Program Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode GST Invoice Billing Inventory exposes sensitive data to threat actors Top 5 Ways to Delete WhatsApp Messages Permanently in 2024 Disney+ Cyber Scheme Exposes New Impersonation Attack Tactics Tesla whistleblower Łukasz Krupski says Autopilot is not safe enough to use on public roads due to its hardware and software not being " Fake Lockdown Mode Exposes iOS Users to Malware Attacks Web3 developer platform thirdweb discloses a major vulnerability in an open-source library used by several NFT collections; thirdweb became aware on N The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying. 75% of sports-related passwords are reused across accounts Russian AI-generated propaganda struggles to find an audience Russia-linked APT28 group spotted exploiting Outlook flaw to hijack MS Exchange accounts Tesla whistleblower Łukasz Krupski says Autopilot is not safe to use on public roads due to its hardware and software not being "ready&q New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. Aerospace Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers Feds: Iran-linked hacking campaign a ‘clarion call’ for digital defenses New P2PInfect bot targets routers and IoT devices AssemblyAI, used by companies to build AI speech models, raised $50M led by Accel, taking its total funding to $115M, and says paying users grew 200% Asking ChatGPT to repeat words "forever" is now against OpenAI's terms of service, after Google researchers showed that doing so led it Malvertising attacks rely on DanaBot Trojan to spread CACTUS Ransomware US regulators are proposing a labeling system for AI health care apps, including requiring disclosing how the tools were trained, perform, and should FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks Zyxel fixed tens of flaws in Firewalls, Access Points, and NAS devices Iranian cyber attack targets Israeli tech used by several US bodies - The Times of Israel New Agent Raccoon malware targets the Middle East, Africa and the US Security Affairs newsletter Round 448 by Pierluigi Paganini INTERNATIONAL EDITION Researchers devised an attack technique to extract ChatGPT training data Cooking Intelligent Detections from Threat Intelligence (Part 6) IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities Discovering MLflow Framework Zero-day Vulnerability | Machine Language Model Security | Contrast Security Expert warns of Turtle macOS ransomware CISA’s Goldstein wants to ditch ‘patch faster, fix faster’ model Threat Sequencing from the Darkside CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent 2023 Black Basta Ransomware gang accumulated at least $107 million in Bitcoin ransom payments since early 2022 Zimbra Zero-Day Exploit Unveiled Malicious Use of QR Codes on the Rise Through Quishing Attacks $19 Stanely cups, fake Amazon Prime memberships all part of holiday shopping scams circulating CISA: Threat Groups are Targeting Unitronics PLCs in Water Systems CISA: Threat Groups are Targeting Unitroncis PLCs in Water Systems US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers - GBHackers US Sanctions Virtual Currency Mixer Used By N Korean Cyber Hacking Group - RTTNews New SugarGh0st RAT targets Uzbekistan government and South Korea Analysis: crypto mining used 1,600 gigaliters of water in 2021 when bitcoin peaked at $65K, or 16K liters per transaction, around 6.2M times a credit Crypto Country: North Korea s Targeting of Cryptocurrency U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers - The Hacker News Very precisely lost GPS jamming U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by ... - The Hacker News Detecting AiTM Phishing Sites with Fuzzy Hashing The US sanctions Sinbad, a crypto mixer allegedly used by the North Korean Lazarus hacking group, and the US, the Netherlands, and Poland seize the se Okta: Breach Affected All Customer Support Users US Seizes Bitcoin Mixer Sinbad.io Used by Lazarus Group Feds seize Sinbad crypto mixer allegedly used by North Korean hackers - TechCrunch The US sanctions Sinbad, a crypto mixer allegedly used by North Korean Lazarus hackers, and seizes its service in an international law enforcement ope US seizes Sinbad crypto mixer used by North Korean Lazarus hackers - BleepingComputer CISA Releases First Secure by Design Alert Understanding the Security of Mobile Apps in Africa Okta reveals additional attackers’ activities in October 2023 Breach Amazon executive John Boumphrey says selling pre-owned goods in the UK and Europe is now a $1.3B business and Amazon sold 4M+ used items in 2022 in th Thousands of secrets lurk in app images on Docker Hub Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity Pennsylvania water facility hit by Iran-linked hackers Threat actors started exploiting critical ownCloud flaw CVE-2023-49103 ID Theft Service Resold Access to USInfoSearch Data Deepfake Digital Identity Fraud Surges Tenfold, Sumsub Report Finds Compromising Identity Provider Federation IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks 5 Tips to Defend Against Access Brokers This Holiday Season The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software Eliminate Repetitive Tasks and Accelerate Response with Falcon Fusion Many local US police departments are fearmongering by issuing warnings on the privacy risk of the iPhone's NameDrop feature, used to wirelessly s Rethinking shift left: How a lack of context creates unnecessary friction between AppSec and Developers Many local US police departments are fearmongering by issuing warnings about the privacy risk of iPhone's NameDrop, used to share contact informa Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia UK, South Korea Warn of North Korea Supply-Chain Attacks London-based PhysicsX, which uses AI for engineering simulations in automotive, aerospace, and other industries, raised a $32M Series A led by General E-commerce is used a lure for 43% of phishing attacks The hack of MSP provider CTS potentially impacted hundreds of UK law firms Security Affairs newsletter Round 447 by Pierluigi Paganini INTERNATIONAL EDITION North Korea-linked APT Lazarus is using a MagicLine4NX zero-day flaw in supply chain attack Top 7 Ways to Fix 0x0000124 WHEA UNCORRECTABLE Error Hamas-linked APT uses Rust-based SysJoker backdoor against Israel App used by hundreds of schools leaking children’s data KitchenPal - 98,726 breached accounts Hacked Microsoft Word documents being used to trick Windows users - TechRadar Filing: Nvidia says regulators in the EU and China requested information about its sale of GPUs and how it allocates their supply (Aaron Holmes The In Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale Exposed Kubernetes configuration secrets can fuel supply chain attacks Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel North Korea-linked Konni APT uses Russian-language weaponized documents US lawmakers scramble to enact measures to punish people targeting women with AI-generated nudes, amid a rise of such cases involving teen girls world ClearFake campaign spreads macOS AMOS information stealer Telekopye Toolkit Used as Telegram Bot to Scam Marketplace Users What Is Network Availability? Welltok data breach impacted 8.5 million patients in the U.S. Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software Automotive parts giant AutoZone disclosed data breach after MOVEit hack 6 Ways to Make Small Text In Discord: Change Text Style How to See Pictures on Pinterest Without Creating An Account New InfectedSlurs Mirai-based botnet exploits two zero-days New Data Covers How the Retail Market is at Greater Risk of Industry-Specific Cyberthreats Adobe Releases Security Updates for ColdFusion Researchers want more detail on industrial control system alerts At Microsoft's request, researchers find multiple flaws in the top three fingerprint sensors in laptops and used for Windows Hello fingerprint au Personal data stolen in British Library cyber-attack appears for sale online CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog Enterprise software provider TmaxSoft leaks 2TB of data Unpacking the Zimbra Cross-Site Scripting Vulnerability (CVE-2023-37580) The US FTC approves a new resolution to streamline investigations of cases where AI is used to break the law (Reuters) Ransomware groups rack up victims among corporate America Security trends public sector leaders are watching Tor Project removed several relays associated with a suspicious cryptocurrency scheme CISA, FBI, MS-ISAC, and ASD s ACSC Release Advisory on LockBit Affiliates Exploiting Citrix Bleed DarkGate and PikaBot Activity Surge in the Wake of QakBot Takedown MAR-10478915-1.v1 Citrix Bleed AI Helps Uncover Russian State-Sponsored Disinformation in Hungary New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks Experts warn of a surge in NetSupport RAT attacks against education and government sectors In What ways do CVSS v3 and CVSS v4 differ? November 2023 Product Release News ForgeRock Recognized as a Leader in the 2023 Gartner Magic Quadrant for Access Management Canadian government impacted by data breaches of two of its contractors Navigating the Evolving Landscape of File-Based Cyber Threats Rhysida ransomware gang is auctioning data stolen from the British Library Top 20 Most-Used Passwords In India! - Times Now DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies US teenager pleads guilty to his role in credential stuffing attack on a betting site DarkCasino joins the list of APT groups exploiting WinRAR zero-day Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code Security Affairs newsletter Round 446 by Pierluigi Paganini INTERNATIONAL EDITION 8Base ransomware operators use a new variant of the Phobos ransomware Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine The FBI and the CISA release an advisory detailing the tactics used by Scattered Spider, a hacker group that now collaborates with the BlackCat ransom Understanding the Phobos affiliate structure and activity A deep dive into Phobos ransomware, recently deployed by 8Base group A critical OS command injection flaw affects Fortinet FortiSIEM The FBI and CISA release an advisory detailing tactics used by Scattered Spider, a hacking group that now collaborates with the BlackCat ransomware gr Apple says green bubbles will be used for RCS messages, while iMessages will be blue to denote what it considers the safest way for iPhone users to co Hacking Meduza: Pegasus spyware used to target Putin's critic - Access BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims Zimbra zero-day exploited to steal government emails by four groups Alleged Extortioner of Psychotherapy Patients Faces Trial Digital bank Revolut plans to offer its "secret sauce" HRtech, used to manage its 7,500 staff, as a B2B proposition to select companies on a Digital bank Revolut plans to offer its "secret sauce" HRtech, used to manage 7,500 employees, as a B2B proposition to select companies on a 'Randstorm' Bug: Millions of Crypto Wallets Open to Theft Protestware taps npm to call out wars in Ukraine, Gaza Google finds and helps patch a Zimbra Collaboration email server zero-day used to steal data from governments in Greece, Moldova, Tunisia, Vietnam, an White House is working on version 2.0 of cyber implementation plan Google's Threat Analysis Group discovers and helps patch a Zimbra email server flaw used to steal data from governments in Greece, Moldova, and e Cyber-Criminals Exploit Gaza Crisis With Fake Charity Vietnam Post exposes 1.2TB of data, including email addresses 7 common mistakes companies make when creating an incident response plan and how to avoid them Samsung suffered a new data breach FBI and CISA warn of attacks by Rhysida ransomware gang Merlin s Evolution: Multi-Operator CLI and Peer-to-Peer Magic New SSH Vulnerability Assessing the security posture of a widely used vision model: YOLOv7 Link Cards Hacked, Being Used In California: Palos Hills PD - Palos, IL Patch After Critical Bug Disclosures, TETRA Emergency Comms Code Goes Public Critical flaw fixed in SAP Business One product The Art of Defending Your Attack Surface Law enforcement agencies dismantled the illegal botnet proxy service IPStorm Gamblers data compromised after casino giant Strendus fails to set password Link Cards Hacked, Being Used In California: Palos Hills PD - Patch Nosey Parker s Ongoing Machine Learning Development Microsoft Patch Tuesday security updates fixed 3 actively exploited flaws Danish critical infrastructure hit by the largest cyber attack in Denmark’s history Google DeepMind details weather forecasting AI model GraphCast AI, more accurate than the best conventional systems for three to 10 day predictions, a Google DeepMind details GraphCast AI, a weather forecasting AI that is more accurate for 3-10 day predictions than the best conventional systems, a fi Filing: Google sues two men in California who allegedly used 65 Google accounts to spam Google with fraudulent DMCA takedown notices, targeting up to Filing: Google sues two men in California who allegedly used 65 Google accounts to spam Google with fraudulent DMCA takedown notices targeting up to 6 Pro-Palestinian hacking group evolves tactics amid war Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web Vietnamese Hackers Using New Delphi-Powered Malware to Target Indian Marketers ICBC Hackers Used Methods Previously Flagged by U.S. Authorities - WSJ - The Wall Street Journal Are Your ServiceNow ACLs Publicly Exposing Data? ICBC Hackers Used Methods Previously Flagged by U.S. Authorities ... - The Wall Street Journal CISA adds five vulnerabilities in Juniper devices to its Known Exploited Vulnerabilities catalog In a first, researchers show that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to full In a first, researchers show a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete c LockBit ransomware gang leaked data stolen from Boeing North Korea-linked APT Sapphire Sleet targets IT job seekers with bogus skills assessment portals Authorities Took Down Massive Phishing-as-a-service Provider BulletProftLink Domain Control Validation (DCV) Methods & How to Choose The Cyber Threat Landscape Overview with An Example Experts say terrorist groups are using generative AI to bypass the hashing databases used by tech companies to automatically remove violent extremist Filing: FTX sues crypto exchange Bybit and two affiliates to recover $953M, including $327M+ that they allegedly withdrew just before FTX filed for b The State of Maine disclosed a data breach that impacted 1.3M people Security Affairs newsletter Round 445 by Pierluigi Paganini INTERNATIONAL EDITION Experts say terrorist groups are using generative AI tools to evade the hashing algorithms used by tech companies to automatically remove extremist co Filing: FTX sues crypto exchange Bybit and two affiliates to recover $953M that they allegedly withdrew using "VIP" status just before FTX Police seized BulletProftLink phishing-as-a-service (PhaaS) platform It’s Still Easy for Anyone to Become You at Experian The Power of Complex Binary Analysis Serbian pleads guilty to running Monopoly dark web drug market NordVPN Review 2023: Comprehensive Security for Your Business FTX sues crypto exchange Bybit and two affiliates to recover $953M in cash and digital assets that was withdrawn using "VIP" status before After ChatGPT, Anonymous Sudan took down the Cloudflare website Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack SysAid zero-day exploited by Clop ransomware group DDoS attack leads to significant disruption in ChatGPT services Cyber ops linked to Israel-Hamas conflict largely improvised, researchers say OpenAI announces Data Partnerships to collaborate with organizations to build public and private datasets that "reflect human society" for A Russian Sandworm disrupts power in Ukraine with a new OT attack Abusing Slack for Offensive Operations: Part 2 Brokers, hedge funds, and advisers push back hard on the SEC's proposed rules for AI used in financial advice, giving comments well past the Octo Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes - SecurityWeek New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers Spammers abuse Google Forms quiz to deliver scams Russian hackers disrupted Ukrainian electrical grid last year Sandworm Cyberattackers Down Ukrainian Power Grid During Missile Strikes Tech executives and officials detail how the Indian government used new rules, censorship, and law enforcement to break Twitter's resistance to t Getting Started with Terraform and AKS: a Step-by-Step Guide to Deploying Your First Cluster North Korean Hacking Group BlueNoroff Blamed for macOS Malware Attack Sumo Logic discloses security breach and recommends customers rotate credentials Speeding Delivery of Government Services with DevOps and IAM FBI: Ransomware actors abuse third parties and legitimate system tools for initial access A Deep Dive into GraphQL API with Python Client IBM: New Gootloader Variant Moves Laterally and Is Harder to Detect Five Canadian Hospitals impacted by a ransomware attack on TransForm provider Decoupling for Security The 5 levels of Sustainable Robotics Adobe's site for stock images lists AI-generated images of the Israel-Palestine conflict, and some small outlets have used them without labeling How AI-driven robots and optical sorters are being used to pick up and sort recyclable trash, as US recyclers deal with labor shortages and rising cos Opinion: Leica helped Xiaomi create a flagship that takes better photos than iPhone, and their partnership makes sense despite Xiaomi copying some iOS The clever hack John used to beat the Optus crash - Sydney Morning Herald North Korea-linked APT BlueNoroff used new macOS malware ObjCShellz Leica helped Xiaomi create a flagship phone that takes better photos than iPhone, and their partnership makes sense despite Xiaomi copying some elemen Samsung unveils a generative AI model called Gauss, which is being used for employee productivity internally and will be expanded to product applicati Reform bill would overhaul controversial surveillance law Volante, which offers low-code payments tools used by 150 major banks and other institutions, raised $66M in equity and debt, taking its total fundin N. Korea's BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware Volante, which offers low-code payments tools used by 150 major banks and other institutions, raised $66M in equity and debt, taking its total funding N. Korean BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware Veeam fixed multiple flaws in Veeam ONE, including critical issues Moving Beyond CVSS Scores for Vulnerability Prioritization Iranian Agonizing Serpens APT is targeting Israeli entities with destructive cyber attacks A look at the hurdles tech startups like Shield AI, which makes autonomous drones, face in competing for Pentagon funding against more entrenched weap Top 7 Ways to Fix Starlink Motors Stuck Error Message ESPN Fantasy Sports App Not Working? Here’s How to Fix Quickly Domain of Thrones: Part II CVE-2023-47004 Using language to give robots a better grasp of an open-ended world CVE-2023-3909 US, Japan and South Korea Unite to Counter North Korean Cyber Activities Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments Who’s Behind the SWAT USA Reshipping Service? CVE-2023-5825 Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure CVE-2023-33924 Socks5Systemz proxy service delivered via PrivateLoader and Amadey Data Breaches in October 2023 Infographic CVE-2023-4625 Lazarus targets blockchain engineers with new KandyKorn macOS Malware Attackers use JavaScript URLs, API forms and more to scam users in popular online game Roblox You d be surprised to know what devices are still using Windows CE Threat Roundup for October 27 to November 3 Who killed Mozi? Finally putting the IoT zombie botnet in its grave Kinsing threat actors probed the Looney Tunables flaws in recent attacks Okta's Recent Customer Support Data Breach Impacted 134 Customers Top 3 Ways to Clear the Cache on Mac or MacBook Okta customer support system breach impacted 134 customers CVE-2023-21378 (android) Empower Incident Response with Real-Time, Just-in-Time Alerts and Access CVE-2023-21347 (android) Multiple WhatsApp mods spotted containing the CanesSpy Spyware DC's AG sues RealPage and 14 of Washington DC's largest landlord firms for using RealPage's rent-setting software to allegedly collude CVE-2023-25960 CanesSpy Spyware Discovered in Modified WhatsApp Versions NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads UK CMA says Meta has pledged to let Facebook Marketplace users opt out of having their data used by Meta and limit how it uses ad data for product dev CVE-2023-43982 CVE-2023-43665 CVE-2023-41259 MuddyWater has been spotted targeting two Israeli entities 4 Key Takeaways from OWASP Global DC | Impart Security CVE-2023-46176 CVE-2017-7252 CVE-2023-39042 CVE-2023-39048 Block reports Q3 revenue up 24% YoY to $5.62B, vs. $5.4B est., profit up 21% YoY to $1.9B, Square profit up 15% YoY, and Cash App profit up 27% YoY; S Clop group obtained access to the email addresses of about 632,000 US federal employees Russian Reshipping Service ‘SWAT USA Drop’ Exposed The FTC says Jeff Bezos ordered Amazon executives to accept more junk ads to boost profits; Amazon used disappearing Signal chats from June 2019 to ea Upgraded Kazuar Backdoor Offers Stealthy Power Newly unsealed details of an FTC complaint from September: Amazon monitored its sellers and punished them if they offered lower prices on other platfo The FTC says Jeff Bezos personally ordered Amazon execs to accept more junk ads to boost profits; Amazon used disappearing Signal chats from June 2019 Okta discloses a new data breach after a third-party vendor was hacked CVE-2023-45341 Microsoft upgrades security for signing keys in wake of Chinese breach Microsoft upgrades security for signing key in wake of Chinese breach SlashNext: ChatGPT Led to a 1,265% Jump in Phishing Attacks This cloud security software used by many enterprises is being ... - TechRadar AI Safety Summit: OWASP Urges Governments to Agree on AI Security Standards Who is behind the Mozi Botnet kill switch? Top Best Kahoot Winner Bots 2023 CVE-2023-45016 CVE-2023-5859 CISA adds two F5 BIG-IP flaws to its Known Exploited Vulnerabilities catalog Threat actors actively exploit F5 BIG-IP flaws CVE-2023-46747 and CVE-2023-46748 Pro-Hamas hacktivist group targets Israel with BiBi-Linux wiper CVE-2023-42648 CVE-2022-48458 Palo Alto Reveals New Features in Russian APT Turla's Kazuar Backdoor British Library suffers major outage due to cyberattack President Biden’s Proclamation: National Native American Heritage Month, 2023 CVE-2023-5893 CVE-2023-2622 CVE-2023-5306 Securing Australia s Critical Infrastructure: The Role of Asset Visibility in Meeting SOCI Obligations SEC sues SolarWinds and CISO for fraud Apple's new M3 Pro has fewer performance and GPU cores than the M2 Pro and 25% less memory bandwidth than the M1 Pro and M2 Pro (Tim Hardwick Mac Health care automation startup Olive, which was valued at $4B in July 2021, plans to shut down and has sold parts of its business to Waystar and Humat Apple's new M3 Pro has 25% less memory bandwidth than the M1 Pro and M2 Pro and fewer performance cores (Tim Hardwick MacRumors) .US Harbors Prolific Malicious Link Shortening Service Experts released PoC exploit code for Cisco IOS XE flaw CVE-2023-20198 Apple's new M3 Pro has lower memory bandwidth than the M1 Pro and M2 Pro and fewer performance cores; Apple repeatedly compared the M3 to the M1, Apple's new M3 Pro has lower memory bandwidth than the M1 Pro and M2 Pro and fewer performance and efficiency cores; Apple repeatedly compared th Are Corporate VPNs Secure? Arid Viper disguising mobile spyware as updates for non-malicious Android applications Regulator Reveals Large Disparity in APP Fraud Reimbursement IBM research: AI can make phishing, already used in 90% of cyberattacks, more effective at scale, though widespread use has not yet been detected (Er AAAI Fall Symposium: Patr cia Alves-Oliveira on human-robot interaction design The CISO Report: Emerging Trends, Threats, and Strategies for Security Leaders CVE-2023-43792 Five Reasons Why Legacy Data Loss Prevention Tools Fail to Deliver CVE-2023-41891 CVE-2023-21397 CVE-2023-21387 Florida man sentenced to prison for SIM Swapping conspiracy that led to theft of $1M in cryptocurrency Lateral Movement: Abuse the Power of DCOM Excel Application CVE-2023-40136 (android) CVE-2023-21352 White House executive order on AI seeks to address security risks Wiki-Slack attack allows redirecting business professionals to malicious websites CVE-2023-5666 CVE-2022-4575 CVE-2023-42431 Microsoft tells Xbox users that unauthorized third-party accessories cannot be used from November 12; sources say Microsoft plans to expand its approv EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub StripedFly, a complex malware that infected one million devices without being noticed Top 6 Ways to Fix Honeywell Thermostat Display Not Working The Outstanding ROI of KnowBe4's Trusted Security Awareness Training Research details how vulnerabilities in signaling protocols used by mobile network operators for international roaming can be exploited to geolocate d Do humans get lazier when robots help with tasks? Security Affairs newsletter Round 443 by Pierluigi Paganini INTERNATIONAL EDITION Disney World Parkgoers Used To 'Hack' The System For A Free Shirt ... - Yahoo Entertainment Researchers Uncover Wiretapping of XMPP-Based Instant Messaging Service CVE-2023-46467 CVE-2023-26574 (idweb) Cybersecurity Awareness Month: How Contrast & the threat landscape have evolved The Risk Business: Second Edition Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk DEF CON 31 Policy Panel: Navigating the Digital Frontier Advancing Cyber Diplomacy N. Korean Lazarus Group Targets Software Vendor Using Known Flaws France agency ANSSI warns of Russia-linked APT28 attacks on French entities How to Collect Market Intelligence with Residential Proxies? F5 urges to address a critical flaw in BIG-IP How to Leave a Viber Group Without Anyone Knowing 2023 IriusRisk Brings Threat Modeling to Machine Learning Systems CVE-2023-46523 (tl-wr886n_firmware) CVE-2023-43737 CVE-2023 4632: Local Privilege Escalation in Lenovo System Updater iLeakage attack exploits Safari to steal data from Apple devices Cloudflare mitigated 89 hyper-volumetric HTTP distributed DDoS attacks exceeding 100 million rps Kaspersky reveals ‘elegant’ malware resembling NSA code Apple emergency update fixes new zero-day used to hack iPhones - BleepingComputer CVE-2023-5783 CVE-2023-46234 CVE-2023-5780 CVE-2023-46094 CVE-2023-46088 CVE-2023-46077 CVE-2023-46074 Analysis of 1,800 AI datasets: 70% didn't state what license should be used or had been mislabeled with more permissive guidelines than their cr Telegram blocks two channels used by Hamas for Android users, blaming Google Play Store guidelines, after Pavel Durov resisted calls to shut down Hama CVE-2023-38848 Pro-Russia hackers target inboxes with 0-day in webmail app used by millions - Ars Technica Pwn2Own Toronto 2023 Day 1 – organizers awarded $438,750 in prizes Hackers that breached Las Vegas casinos rely on violent threats, research shows Hackers that breached Las Vegas casinos rely on violent threats CVE-2023-46520 CVE-2023-45767 CVE-2023-45756 CVE-2023-37909 CVE-2023-26572 Sources: a Biden EO on AI is expected on October 30, requiring assessments of AI models before federal worker use, easing highly skilled immigration, Sources: a Biden EO on AI is expected on Monday, requiring AI models undergo testing before use by federal workers, easing highly skilled immigration, The Differences Between DNS Protection and Protective DNS Sources: SMIC used ASML's DUV machines to produce its 7nm chip used by Huawei; ASML has never sold its EUV tools to China, but older DUV models c NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208) Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately New England Biolabs leak sensitive data The Internet Watch Foundation warns that generative AI is being used to create child sexual abuse imagery, and finds 3K AI-made abuse images breaking FOIA documents: ICE used a tool called GOST to decide if US visa applicants' social media posts are "derogatory" to the US, as part of Former NSA employee pleads guilty to attempted selling classified documents to Russia Vietnam-Based Cyber Groups Using Fake Job Postings to Deliver Malware Domain of Thrones: Part I A Twitter user since 2007 on why he left: Elon Musk brought chaos to Twitter and boosts conspiracy theories, white supremacists, and antisemitic dog w Getting Value from Your Proxy Logs with Falcon LogScale Patch Tuesday Turns 20: The Growth and Impact of Microsoft s Vulnerability Problem Small Screens, Big Risks: Falcon for Mobile Releases New Innovations to Accelerate Detection and Response for Mobile Threats Robo-Insight #6 A Twitter user since 2007 reflects on leaving due to Elon Musk swapping stasis at the company for chaos, his constant bullshitting, and spreading toxi iOS Zero-Day Attacks: Experts Uncover Deeper Insights into Operation Triangulation Make API Management Less Scary for Your Organization Operation Triangulation: Experts Uncover Deeper Insights into iOS Zero-Day Attacks How did the Okta Support breach impact 1Password? Spain police dismantled a cybercriminal group who stole the data of 4 million individuals Examining Predator Mercenary Spyware PimEyes, a paid facial recognition service, blocks searches of children's faces via age detection AI to identify photos of minors, as part of a & PimEyes, a paid facial recognition service, says it has blocked searches of children as part of a "no harm policy", using AI to identify pho Cisco warns of a second IOS XE zero-day used to infect devices worldwide Cisco releases patches for two zero-day flaws that hackers exploited in 50K+ IOS XE devices; researchers say that hacked hosts recently dropped from CVE-2023-43065 CVE-2023-28796 Legit Discovers “AI Jacking” Vulnerability in Popular Hugging Face AI Platform Microsoft updates Excel to fix automatic conversions, after scientists reworked the alphanumeric symbols used to represent genes in 2020 to avoid Exce Cisco releases patches for two zero-day flaws that hackers exploited on 50K+ IOS XE devices; researchers note hacked hosts recently dropped from 60K t A Brief History of Phishing, and Other Forms of Social Engineering Cisco patches IOS XE zero-days used to hack over 50,000 devices - BleepingComputer Insider Risk Digest: Week 41-42 Microsoft updates Excel to fix automatic conversions, after scientists reworked the alphanumeric symbols to represent genes in 2020 to avoid Excel iss Microsoft Vulnerabilities Top CISA’s List of Ransomware-Linked CVEs Don’t use AI-based apps, Philippine defense ordered its personnel Vietnamese threat actors linked to DarkGate malware campaign CVE-2023-5702 North Korean Hackers Exploiting TeamCity Flaw to Compromise Organizations Network MI5 chief warns of Chinese cyber espionage reached an unprecedented scale Sami Callihan Says Mustafa Ali Pitched 'Hacker' Gimmick To WWE Two Years Before They Used It - Fightful U.S. Government Releases Popular Phishing Technique Used by Hackers - CybersecurityNews Security Affairs newsletter Round 442 by Pierluigi Paganini INTERNATIONAL EDITION Goal representations for instruction following Hivebrite, a SaaS community engagement platform used by Boeing, the Obama Foundation, and others, raised a $37M Series B, bringing its total funding t A threat actor is selling access to Facebook and Instagram’s Police Portal Threat actors breached Okta support system and stole customers’ data Okta says hackers used stolen credentials to view customer files - The Record from Recorded Future News US DoJ seized domains used by North Korean IT workers to defraud businesses worldwide CVE-2023-5684 Behind the Breach: Cross-tenant Impersonation in Okta CVE-2023-45681 CVE-2023-45677 CVE-2023-45661 Cisco Zero-Day Exploited to Implant Malicious Lua Backdoor on Thousands of Devices Hardware Used for Hacking: Hak5 Toolkit - North Carolina A&T CISA Releases Guidance for Addressing Cisco IOS XE Web UI Vulnerabilities CVE-2023-44693 (dar-7000_firmware) CVE-2023-21413 (axis_os) Threat Roundup for October 13 to October 20 On Detection: Tactical to Functional CVE-2023-23373 CISA adds Cisco IOS XE flaw to its Known Exploited Vulnerabilities catalog Tens of thousands Cisco IOS XE devices were hacked by exploiting CVE-2023-20198 CVE-2023-5414 CVE-2023-4598 CVE-2023-4274 CVE-2023-3996 U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses How to Check if Aggregator Host.exe Is Safe for Windows 11 Law enforcement operation seized Ragnar Locker group’s infrastructure CVE-2023-46087 (who_hit_the_page_hit_counter) CVE-2023-45643 (cpt_shortcode_generator) CVE-2023-45574 (di-7003g_firmware, di-7100g+_firmware, di-7100g_firmware, di-7200g+_firmware, di-7200g_firmware, di-7300g+_firmware, di-7400g+_firmwar Police seize Ragnar Locker leak site Cisco IOS XE Zero-Day: Network Supply Chain Vulnerabilities Underscore Lack of Threat Detection CVE-2023-45642 (snap_pixel) CVE-2023-41715 (sonicos) CVE-2023-41712 (sonicos) Law enforcement agencies, including from the US, the EU, and Japan, seize the RagnarLocker ransomware group's dark web portal as part of an " Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity QR Codes Used in 22% of Phishing Attacks An international group of law enforcement agencies, including the US, the EU, and Japan, seizes the dark web portal used by the RagnarLocker ransomwar Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies CVE-2023-44986 (abandoned_cart_lite_for_woocommerce) THE 11TH EDITION OF THE ENISA THREAT LANDSCAPE REPORT IS OUT! North Korea-linked APT groups actively exploit JetBrains TeamCity flaw US v. SBF: accounting professor Peter Easton testifies that FTX used "over a billion dollars" of customer funds to buy back Binance's F Multiple APT groups exploited WinRAR flaw CVE-2023-38831 Hackers Using Secure USB Drives to Attack Government Entities Unlock New Possibilities on the HYAS Platform October 2023 Release CVE-2023-44229 (tiny_carosel_horizontal_slider) Firmware and Frameworks: MITRE ATT&CK Californian IT company DNA Micro leaks private mobile phone data CVE-2023-3392 (read_more_&_accordion) CVE-2022-22386 (security_verify_privilege_on-premises) Research: local manufacturers won 47.25% of machinery equipment tenders by Chinese chip foundries from January to August 2023, including 62% from July CVE-2023-45905 (dreamer_cms) CVE-2023-45902 (dreamer_cms) Plastic surgeries warned by the FBI that they are being targeted by cybercriminals Russian hackers offered phony drone training to exploit WinRar vulnerability Threat actors have been exploiting CVE-2023-4966 in Citrix NetScaler ADC Gateway devices since August Research: 47.25% of machinery tenders by Chinese chip foundries from January to August 2023 were won by local manufacturers, including 62% from July t Manitowoc native Sean Hacker serves aboard newly commissioned USS Hyman G Rickover - WeAreGreenBay.com A flaw in Synology DiskStation Manager allows admin account takeover Rapper Nelly's X Account Got Hacked, Used For Phishing Scam - Crypto Times In cross-examining Nishad Singh, SBF's defense finally picked holes in a US witness, pointing out that Singh used a $3.7M FTX loan of user funds Israel announces talks with SpaceX to set up Starlink, a first for the country, as a backup in case its other wartime communication systems are disrup D-Link confirms data breach, but downplayed the impact Researchers: soundscapes and an AI model trained on 100+ wildlife songs can be an effective and low-cost tool to track biodiversity recovery in tropic Israel is in talks with SpaceX to set up Starlink internet, a first for the country, as a backup in case its other wartime communication systems are d D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack CVE-2023-39276 CVE-2023-22093 CVE-2023-22069 The benefits of using the new Data Privacy Framework Israel says it's in talks with SpaceX on setting up Starlink internet services as a backup in case other systems are disrupted (Marissa Newman Bl SPF Macros Everything You Need to Know Summit Sabotage: Malicious Phishing Campaign Hits Female Political Leaders Using Social Engineering The Colorado Supreme Court rules that Google evidence obtained via a "keyword search warrant" may be used, one of the first tests of the con CVE-2023-5240 (devolutions_server) CVE-2023-45108 (mailrelay) CVE-2023-20198 zero-day widely exploited to install implants on Cisco IOS XE systems Mandia: China replaces Russia as top cyber threat The Colorado Supreme Court ruled evidence from Google obtained via a "keyword search warrant" may be used, one of the first tests of the con Snapchat now lets users embed the app's content into a website, matching long-used Instagram and TikTok features, and adds an OpenAI-based photo Tech CEO Sentenced to 5 Years in IP Address Scheme Fake Browser Updates Used in Malware Distribution CVE-2023-42628 Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers Snapshot fuzzing direct composition with WTF Addressing increased potential for insider threats with ChatGPT CVE-2023-45375 Ransomware realities in 2023: one employee mistake can cost a company millions US v. SBF: Nishad Singh says SBF used customer funds for spending sprees that "reeked of excess" and he learned of an $8B hole two months be New technique helps robots pack objects into a tight space CVE-2023-38720 Hacked Skype accounts are being used to spread malware - TechRadar CVE-2023-4990 (mcl-net_firmware) CVE-2023-40180 How Is Machine Learning Used in Fraud Detection? 'RomCom' Cyber Campaign Targets Women Political Leaders Fraudsters target Booking.com customers claiming hotel stay could be cancelled CVE-2023-38000 (gutenberg, wordpress) CVE-2023-44101 (harmonyos) Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability Coin Flips Are Biased CVE-2023-45641 New RomCom Backdoor Targets Female Political Leaders CVE-2023-45576 Microsoft Defender thwarted Akira ransomware attack on an industrial engineering firm DarkGate malware campaign abuses Skype and Teams How Brad Smith, who became Microsoft's top legal officer in 2002, used a legal, policy, and influence machine costing $1B+ per year to close the Easing job jitters in the digital revolution Security Affairs newsletter Round 441 by Pierluigi Paganini INTERNATIONAL EDITION How Brad Smith, who became Microsoft's top legal officer in 2002, used a legal, policy, and influence machine costing $1B+ a year to close the Ac Some AI image detectors are labeling real photographs from the Israel-Hamas war as fake, creating what an expert calls a "second level of disinfo Some AI image detecting tools are labeling real photographs from the Israel-Hamas war as fake, creating what an expert calls a "second level of d CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks The US Congress Was Targeted With Predator Spyware CVE-2023-38251 (commerce, magento) Access Key Used in Voice Messaged Phishing Campaign CVE-2023-5492 (smart_s45f_firmware) CVE-2023-36581 (windows_10, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_21h2, windows_11_22h2, windows_server_2008, Stayin’ Alive campaign targets high-profile Asian government and telecom entities. Is it linked to ToddyCat APT? Should You Use Controversial Simulated Phishing Test Emails? CVE-2023-5240 CVE-2023-45465 CVE-2023-45130 CVE-2023-39999 FBI and CISA published a new advisory on AvosLocker ransomware DarkGate Malware Spreading via Messaging Services Posing as PDF Files CD Projekt used AI to recreate the voice of Miłogost Reczek, a Polish voice actor who died in 2021, for Cyberpunk 2077's new Polish DLC, Editorial: 7 Ways AI Can be Used by Hackers to Steal Healthcare Data - HIPAA Journal More than 17,000 WordPress websites infected with the Balada Injector in September Unlocking the Future of Application Security: Evolution from ASOC to ASPM Improvements to the IP page – more flexibility and new methods to interact with data CVE-2023-38171 (.net, visual_studio_2022, windows_11_22h2, windows_server_2022) Ransomlooker, a new tool to track and analyze ransomware groups’ activities Elliptic: the FTX hackers who stole $415M to $432M in crypto in November 2022 used Russia-linked money launderers in October 2023 after moving the fun How to Banish Heroes from Your SOC? CVE-2023-43149 CVE-2023-41850 (outbound_link_manager) Top resources for Cybersecurity Awareness Month CVE-2023-25774 Beware of Bogus Roborock Retailers: The Perils of Misleading URLs in E-Commerce Vulnerability Exposed in WordPress Plugin User Submitted Posts CVE-2023-45058 The Difference Between Secure and Safe Is Bigger Than You Might Think Microsoft s October security update for multiple high-risk product vulnerabilities Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers Phishing, the campaigns that are targeting Italy A new Magecart campaign hides the malicious code in 404 error page CVE-2023-44261 (block_plugin_update) A Paramedic s Top 2 Tips for Cloud Incident Response Cleanlab, which offers automated data curation tools to increase the accuracy of data used by AI, raised a $25M Series A at a $100M valuation (Alex Ko What to know about the HTTP 2 Rapid Reset DDoS attacks CVE-2023-41876 (wp_gallery_metabox) CVE-2023-41730 (sendpress) Long-awaited curl vulnerability flops Long-awaited curl vulnerability fails to live up to the hype CVE-2023-35645 JPMorgan says BlackRock used the bank's TCN blockchain to move collateral almost instantaneously, vs. over the course of a day, and plans to add CVE-2023-44860 (n3m_firmware) CVE-2023-40646 (android) CVE-2023-40639 (android) CVE-2023-34987 (fortiwlm) 10 zero-day vulnerabilities in industrial cell router could lead to code execution, buffer overflows Resurgence of LinkedIn Smart Links Identified in Sizable Credential Phishing Campaign GNOME Libcue Flaw is a Risk to Linux Systems CVE-2023-44097 JPMorgan says BlackRock used its TCN blockchain to move collateral almost instantaneously, compared with over the course of a day, and plans to add ot [DISINFORMATION ALERT] Israel-Hamas war causes deluge of dis- and misinformation The robots of #IROS2023 Online used car marketplace Shift files for Chapter 11 bankruptcy and begins shutting down its business, after going public via a SPAC merger in Octob Online used car marketplace Shift files for Chapter 11 bankruptcy and begins the process to shut down its business, after going public via a SPAC merg Patch Tuesday, October 2023 Edition CVE-2023-44807 (dir-820l_firmware) Largest-ever DDoS leverages zero-day vulnerability Savvy Israel-linked hacking group reemerges amid Gaza fighting Utilizing Artificial Intelligence Effectively in Cybersecurity CVE-2023-41768 CVE-2023-36722 Millions of hacked Android and iOS phones are being used to run a ... - TechRadar CVE-2023-44061 (simple_and_nice_shopping_cart_script) CVE-2020-27213 A flaw in libcue library impacts GNOME Linux systems Exposed security cameras in Israel and Palestine pose significant risks How Keyloggers Have Evolved From the Cold War to Today Flagstar Bank MOVEit Breach Affects 800K Customer Records Hacktivists send fake nuclear attack warning via Israeli Red Alert app GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia s invasion Perfect Loader Implementations Hacktivists in Palestine and Israel after SCADA and other industrial control systems Sources: X shut down a tool for identifying coordinated disinformation campaigns in recent months, as the company moved services off Google Cloud to c Meet Hackie-AI, The New Kid on the Block. Sources: X shut down a tool used to identify coordinated disinformation campaigns in recent months, as it moved services away from Google Cloud to cut Large-scale Citrix NetScaler Gateway credential harvesting campaign exploits CVE-2023-3519 Introducing the SaaS Event Maturity Matrix (EMM) Phishers Spoof USPS, 12 Other Natl’ Postal Services Hackers used X to target Congress with spyware, Amnesty ... - Washington Times Source: Microsoft's GitHub Copilot, the $10 month service used by 1.5M+ people, loses an average of $20+ per month per user and as much as $80 fo 8 ways MSSPs gain competitive advantage with the SecOps Cloud Platform The source code of the 2020 variant of HelloKitty ransomware was leaked on a cybercrime forum Gaza-linked hackers and Pro-Russia groups are targeting Israel Stay a Step Ahead of your #1 Downtime Threat - Business Email Compromise Flagstar Bank suffered a data breach once again Android devices shipped with backdoored firmware as part of the BADBOX network CVE-2023-45355 How is Malware Detected in 2023? Uncover the Latest Techniques Security Affairs newsletter Round 440 by Pierluigi Paganini International edition North Korea-linked Lazarus APT laundered over $900 million through cross-chain crime Finger-shaped sensor enables more dexterous robots CVE-2023-40639 QakBot threat actors are still operational after the August takedown DinodasRAT used against governmental entity in Guayana Week in security with Tony Anscombe CVE-2023-44765 (concrete_cms) THORSwap moves to "maintenance mode" after criminals linked to the FTX hack in 2022 used the decentralized exchange to convert $38M worth of THORSwap moves to a "maintenance mode" after criminals linked to the FTX hack last year used the decentralized exchange to swap $38M worth o The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt Strike Qakbot Gang Still Active Despite FBI Takedown Little Rock FBI warns of 'Phantom Hacker' scam used to access ... - KRZK 106.3 Report: the US DHS finds that ICE, CBP, and the Secret Service illegally used phone location data; a CBP official tracked coworkers for no investigati How to Put Clock On Desktop In Windows 11 Report: a US DHS oversight body finds that ICE, CBP, and the Secret Service illegally accessed smartphone location data; CBP tracked coworkers without CVE-2023-44212 A WhatsApp zero-day exploit can cost several million dollars DNA testing service 23andMe investigating theft of user data Critical 'ShellTorch' Flaws Light Up Open Source AI Users, Like Google CVE-2023-44828 Sources: some US FTX staff found and internally reported Alameda's backdoor used to allegedly withdraw billions in client funds, months before FT The Hong Kong Stock Exchange announces Synapse to help execute post-trade processes and reduce settlement risk using smart contracts, launching on Oct Sources: FTX employees in the US found and reported the backdoor Alameda used to allegedly withdraw billions in customer funds, months before FTX&apos Political Disinformation and AI The Hong Kong Stock Exchange announces Synapse, designed to streamline post-trade processes using smart contracts, which will go live on October 9 (Sa 10 Bot Detection Tools for 2023: Features & Mitigation Methods Global CRM Provider Exposed Millions of Clients Files Online Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia How to Pay with Cash App via Scanning QR Code | Cash App Scan to Pay Sony sent data breach notifications to about 6,800 individuals Carter s Credit Card Login, Payment, Customer Service (2023) Exclusive Report: The Rise of Credit Union Brand Impersonations Online in 2023 How to Pay with Cash App via Scanning QR Code CVE-2023-2544 (peix) NYC-based Headway, which connects patients with therapists who offer care covered by insurance, raised a $125M Series C led by Spark Capital at a $1B CVE-2023-4099 (qsige) A Guide to IAM Compliance: Set Your Organization Up for Success CVE-2023-24853 (ar8035_firmware, fastconnect_6200_firmware, fastconnect_6700_firmware, fastconnect_6800_firmware, fastconnect_6900_firmware, fastconne CVE-2022-47892 (netman_204_firmware) Available Now: Java Endpoint Analyzer from Onapsis Research Labs Two Campaigns Drop Malicious Packages into NPM Mastering SECaaS: Your Ultimate Implementation Guidance for 2023 CVE-2022-43906 Top 3 Tips Learned from Getting Fairwinds Insights into AWS Marketplace CVE-2023-4496 CVE-2023-3153 CVE-2023-5375 Sony researchers: standardized skin tone scales used by Google, Meta, and others to test their image algorithms don't capture red and yellow hues Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor Phishing campaign targeted US executives exploiting a flaw in Indeed job search platform Certificate Authorities: What They Are & Why They re Important MrBeast asks whether social media platforms are "ready to handle the rise of AI deepfakes" after a deepfake scam TikTok ad, since deleted, u CVE-2023-41736 (email_posts_to_subscribers) The FTC's lawsuit against Amazon details a company algorithm that raised product prices and held them there if rivals followed, allegedly showing NATO investigating breach, leak of internal documents FTC's suit against Amazon describes an algorithm where Amazon would raise product prices and hold them there if rivals followed, allegedly showin CVE-2023-3196 Akamai Sees Surge of Cyberattacks Aimed at Financial Services Keeping SEC-ure: Using Threat Intelligence to Stay Ahead of the New SEC Regulations Predator Spyware Linked to Madagascar's Government Ahead of Presidential Election CVE-2023-37990 Elliptic Curve Cryptography Explained Bing Chat beat a CAPTCHA used to stop hackers and spammers - Digital Trends Bing Chat just beat a CAPTCHA used to stop hackers and spammers - Digital Trends Two hacker groups are back in the news, LockBit 3.0 Black and BlackCat AlphV CVE-2023-3440 CVE-2023-43268 CVE-2023-41687 (goods_catalog) CVE-2023-44123 (android) WS_FTP flaw CVE-2023-40044 actively exploited in the wild How to Stop Phishing Attacks with Protective DNS US v. Google: Satya Nadella says Google cemented its search dominance via default search deals with Apple and he may have been overenthusiastic about CVE-2023-5283 (engineers_online_portal) US v. Google: Satya Nadella says Google cemented search dominance via mobile default search deals with Apple and he may have been overenthusiastic abo In US v. Google testimony, Satya Nadella says Google cemented its search dominance through Apple deals, he may have been overenthusiastic about ChatGP CVE-2023-44266 Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge CVE-2023-44244 ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year - CSO Online North Korea-linked Lazarus targeted a Spanish aerospace company Food card hacked and used in New York City: Brunswick Hills Township Police Blotter - cleveland.com Nick Clegg says Meta used public Facebook and Instagram posts to train its new AI assistant and took steps to filter out private details from training Sources: John Giannandrea's team built a next-gen search engine, "Pegasus", for Apple's own apps, used in Spotlight and Siri, and CVE-2023-5323 Nick Clegg says Meta used public Facebook and Instagram posts to train its new AI assistant and took steps to filter private details from training dat A Compilation of Personally Identifiable Email Address Accounts from Verified.cm Forum Team Members An OSINT Analysis A Closer Look at the Snatch Data Ransom Group Michigan thief used Bluetooth to steal 800 gallons of gas by hacking into pumps - New York Post Going Live on Twitter Spaces Today! FBI warns of dual ransomware attacks Progress Software fixed two critical severity flaws in WS_FTP Server CVE-2023-43708 Researchers report critical vulnerabilities in the Exim mail transfer agent allowing remote code execution; Exim is used by as many as 253K servers (D CVE-2023-5284 Anticipating File-Borne Threats: How Deep File Inspection Technology Will Shape the Future of Cyber Defense CVE-2023-42453 (synapse) Michigan thief used Bluetooth to steal 800 gallons of gas by hacking into pumps, station owner says - Fox Business Michigan thief used Bluetooth to steal 800 gallons of gas by hacking ... - Fox Business CVE-2023-3024 Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks CVE-2023-43909 QR Code 101: What the Threats Look Like Chinese threat actors stole around 60,000 emails from US State Department in Microsoft breach Microsoft's AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites Threat Report: High Tech Industry targeted the most with 46% of attack traffic tagged by NLX What You Need to Know About the libwebp Exploit FBI disrupts Russian hacking tool used to steal information from foreign governments - CNN Crocs enhances customer journey and safeguards revenue growth with Kasada The Next Generation of AppSec is Upon Us (Part 1 of 2) | Impart Security Pharma Industry Seeing Reduction in Data Breach Costs, But Still Have Much to Do Anticipating File-Borne Threats: How Deep File Inspection Technology Will Shape the Future of Cyber Defense CVE-2023-43664 Google lets publishers use a robots.txt flag to opt out of the company using their data to train its AI models, while remaining accessible through Goo Lawsuit Filed Against Google, Meta, H&R Block for Sharing Taxpayer Data Mayorkas warns Latin American leaders of Beijing’s technology influence CVE-2023-41232 (ipados, iphone_os, macos) CVE-2023-39195 Email: Serve Robotics, used by Uber Eats in Los Angeles, shared video filmed by one of its food delivery robots to the LAPD as part of a criminal inve CVE-2023-40307 Dark Angels Team ransomware group hit Johnson Controls What we know about BlackCat and the MGM hack Google Patches Chrome Zero-Day Used in Spyware Attacks CVE-2023-43614 (welcart_e-commerce) Russian zero-day broker is willing to pay $20M for zero-day exploits for iPhones and Android devices China-linked APT BlackTech was spotted hiding in Cisco router firmware US v. Google: Microsoft says the company has tried for years to displace Google as the iPhone's default search engine, but Apple never seriously CVE-2023-44018 (ac10u_firmware) CVE-2023-37448 (macos) CVE-2023-2315 (opencart) Millions of files with potentially sensitive information exposed online, researchers say US v. Google: Microsoft says it's been trying for years to displace Google as the iPhone's default search engine, but Apple never seriously CVE-2023-4506 CVE-2023-44156 CVE-2023-44129 CVE-2023-42460 CVE-2023-41986 CVE-2023-41305 CVE-2023-40419 HYAS Insight Shines a Light on Financial Fraud Watch out! CVE-2023-5129 in libwebp library affects millions applications ‘Snatch’ Ransom Group Exposes Visitor IP Addresses ‘Ransomed.vc’ in the Spotlight – What is Known About the Ransomware Group Targeting Sony and NTT Docomo A short guide to Multidisciplinary Research Top 5 Problems Solved by Data Lineage The WGA contract calls for streaming data transparency and guarantees on AI use, including preventing AI-generated material to be used as a source mat The federal judge overseeing US et al v. Google says documents used during the trial can be posted online at the end of each day, resolving a weeklong The federal judge overseeing US v. Google says documents used during the trial can be published online at the end of each day, resolving a weeklong di Sources: the WGA and AMPTP's deal lets studios train AI models on writers' work while writers would be compensated for work on scripts even Source: WGA and AMPTP's deal lets studios train AI models on writers' work, while writers would get compensation for work on scripts even if Canadian Flair Airlines left user data leaking for months CVE-2023-38907 (tapo, tapo_l530e_firmware) Russian hacking operations target Ukrainian law enforcement CVE-2023-43338 (mjs) CVE-2023-42456 (sudo) CVE-2023-42753 (enterprise_linux, linux_kernel) Enhancing Cybersecurity Investigations With Protective DNS ICS protocol coverage using Snort 3 service inspectors How a private company helps ICE track migrants every move BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic Xenomorph malware is back after months of hiatus and expands the list of targets CISA Publishes Hardware Bill of Materials Framework Smishing Triad Stretches Its Tentacles into the United Arab Emirates CVE-2023-4259 CVE-2023-5002 (pgadmin) SCCM Hierarchy Takeover A phishing campaign targets Ukrainian military entities with drone manual lures CVE-2023-41293 CVE-2023-41294 Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals Pitfalls of relying on eBPF for security monitoring (and some solutions) Are You Willing to Pay the High Cost of Compromised Credentials? Your Boss s Spyware Could Train AI to Replace You From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese CVE-2015-6964 Is Gelsemium APT behind a targeted attack in Southeast Asian Government? CVE-2023-41874 Deadglyph, a very sophisticated and unknown backdoor targets the Middle East Alphv group claims the hack of Clarion, a global manufacturer of audio and video equipment for cars Popular Thesaurus Website Used in Sneaky Cryptojacking Scheme National Student Clearinghouse data breach impacted approximately 900 US schools New stealthy and modular Deadglyph malware used in govt attacks - BleepingComputer City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack Soft robotic tool provides new ‘eyes’ in endovascular surgery New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware Apple and Chrome Zero-Days Exploited to Hack Egyptian ex-MP with Predator Spyware Stealth Falcon preying over Middle Eastern skies with Deadglyph 3 iOS 0-days, a cellular network implant, and HTTP used to infect an iPhone - Ars Technica LastPass: ‘Horse Gone Barn Bolted’ is Strong Password Recently patched Apple and Chrome zero-days exploited to infect devices in Egypt with Predator spyware CVE-2023-42464 (debian_linux, netatalk) CVE-2023-0829 (plesk) The US issues final rules to stop Chips Act subsidies from going to countries of concern, like China, such as limiting foreign chip fab expansions for Signal Intros Quantum-Resistant Encryption for App Dallas ransomware: Hackers used stolen credentials to access city data, report says - The Dallas Morning News Sandman APT targets telcos with LuaDream backdoor Dallas ransomware: Hackers used stolen credentials to access city ... - The Dallas Morning News The US issues final rules to stop Chips Act subsidies from going to countries like China, including limiting chips fab expansions in such countries fo Experts warn of a 600X increase in P2Pinfect traffic CVE-2023-43240 (dir-816_a2_firmware) CVE-2023-43135 (tl-er5120g_firmware) Detection Engineering and SOC Scalability Challenges (Part 2) SMIC used DUV lithography, not EUV, for its 7nm chip, which isn't a breakthrough but does show progress and reaffirms China's commitment to New Capabilities with the September Release of the HYAS Platform Bastian Lehmann's TipTop launches an app that scans for past purchases in users' Gmail and Amazon accounts and offers to buy their used prod Bastian Lehmann's TipTop launches an app that scans for past purchases in users' Gmail or Amazon accounts and offers to buy their used produ Ukrainian hackers are behind the Free Download Manager supply chain attack New threat intel effort to study ‘undermonitered’ regions Mastering Defense-In-Depth and Data Security in the Cloud Era Hikvision Intercoms Allow Snooping on Neighbors Space and defense tech maker Exail Technologies exposes database access CVE-2023-43242 Ukrainian Hacker Suspected to be Behind "Free Download Manager" Malware Attack Hackers and scammers target classrooms with ransomware. What can you do? CVE-2023-43135 The art of security chaos engineering CVE-2023-42454 (sqlpage) Experts found critical flaws in Nagios XI network monitoring software FTC nominees urge Congress to pass federal data privacy law CVE-2023-43502 CVE-2023-43494 CVE-2023-42660 CVE-2023-5063 (widget_responsive_for_youtube) CVE-2023-43200 Fake YouTube Android Apps Used to Distribute CapraRAT Fake PoC Script Used to Trick Researchers into Downloading VenomRAT CVE-2023-3025 (dropbox_folder_share) DeepMind researchers detail Optimization by PROmpting to improve LLM performance by using "meta-prompts" like "take a deep breath" Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace The dark web drug marketplace PIILOPUOTI was dismantled by Finnish Customs A Wave of Chinese Cyberthreat Campaigns Use Old and New Malware The hacker who used his skills to play Doom on a printer - Softonic EN Battery-free origami microfliers from UW researchers offer a new bio-inspired future of flying machines How To Change Windows 11 Virtual Memory Size How to Fix Snapchat Won t Load Snaps or Stories CVE-2023-36319 CVE-2023-31009 CVE-2023-25525 CVE-2023-40934 ShroudedSnooper threat actors target telecom companies in the Middle East CVE-2023-39039 (camp_style_project_line) Trend Micro Patches Zero-Day Endpoint Vulnerability Black Hat: Stephen Chin, JFrog #mWISE: Chinese Cyber Power Bigger Than the Rest of the World Combined Exploring SEC’s Cybersecurity Rules – Material Cybersecurity Incident (Part 3) How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams Chinese Group Exploiting Linux Backdoor to Target Governments Austin-based HiddenLayer, which focuses on hardening the security of AI models used by companies, raised a $50M Series A led by M12 and Moore Strategi CVE-2023-37281 (contiki-ng) Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and Political Entities New ShroudedSnooper actor targets telecommunications firms in the Middle East with Novel Implants 12,000 Juniper SRX firewalls and EX switches vulnerable to CVE-2023-36845 Flawed Implementation of RCS Standard putting data of millions at risk A look at ShadowDragon, which offers social media surveillance tools that gather data from games and more, used by ICE, the State Department, the DEA, Earth Lusca expands its arsenal with SprySOCKS Linux malware Trend Micro: Chinese cyberespionage group Earth Lusca used a new Linux malware dubbed SprySOCKS to target government agencies in multiple countries in Security Issues in FINS protocol Woman, 20, reveals how hackers took over her Facebook account when she clicked on used car advert - before her - Daily Mail Who’s Behind the 8Base Ransomware Website? CVE-2023-42454 Microsoft AI research division accidentally exposed 38TB of sensitive data CVE-2023-4806 Dragos Raises $74M in Latest Funding Round New SprySOCKS Linux malware used in cyber espionage attacks - BleepingComputer Crooks Exploited Satellite Live Feed Delay for Betting Advantage Analyzing Four Diverse Attack Techniques Used by XeGroup Exposing the Bulgarian Cyber Army Cyber Threat Actor Hook: New Android Banking Trojan That Expands on ERMAC's Legacy Rust Implant Used in New Malware Campaign Against Azerbaijan AI writing startup Writer, used by L'Oréal, Spotify, and Uber to create digital marketing campaigns, raised $100M led by Iconiq Growth Deepfake and smishing. How hackers compromised the accounts of 27 Retool customers in the crypto industry Remote Access Checklist Illegal Betting Ring Used Satellite Tech to Get Scoop on Results AI in Software Development: The Good, the Bad, and the Dangerous North Korea’s Lazarus APT stole almost $240 million in crypto assets since June Clop gang stolen data from major North Carolina hospitals CardX released a data leak notification impacting their customers in Thailand Security Affairs newsletter Round 437 by Pierluigi Paganini International edition CVE-2023-4918 (keycloak) German prosecutors say Elon Musk's X has complied with hundreds of hate-crime user data requests; Twitter used to push back if requests threatene German prosecutors say Musk's X has complied with hundreds of hate-crime user data requests; Twitter used to push back if such requests threatene Iranian Peach Sandstorm group behind recent password spray attacks Virtual-reality tech is fast becoming more real CVE-2023-38507 Okta Agent Involved in MGM Resorts Breach, Attackers Claim Microsoft Flushes Out 'Ncurses' Gremlins Google Account Sync Vulnerability Used to Steal $15 Million Cybersecurity Insights with Contrast CISO David Lindner | 9 15 Okta Flaw Involved in MGM Resorts Breach, Attackers Claim Dangerous permissions detected in top Android health apps CVE-2023-3935 (codemeter_runtime, oseon, programmingtube, teczonebend, tops_unfold, topscalculation, trumpflicenseexpert, trutops, trutops_cell_classi CVE-2023-29305 (connect) 91% of Cybersecurity Professionals Have Experienced Cyber Attacks that Use AI CVE-2023-36551 (fortisiem) Caesars Entertainment paid a ransom to avoid stolen data leaks The Details of Microsoft s September 2023 Patch Tuesday Release Apple plans a software update for iPhone 12 in France to address radiation concerns, says "this is related to a specific testing protocol" u Microsoft Septemer Security Updates for Multiple High-Risk Product Vulnerabilities Zero-Click iPhone Exploit Drops Pegasus Spyware on Exiled Russian Journalist Shifting Perspectives and Regulations Relating to Consent Management CVE-2019-8884 CVE-2018-4767 CVE-2018-4765 CVE-2018-4706 CVE-2018-4705 CVE-2018-4654 CVE-2018-4603 CVE-2018-4531 CVE-2018-4519 CVE-2018-4515 CVE-2018-4492 CVE-2017-13980 CVE-2017-13976 CVE-2017-13967 CVE-2017-13957 CVE-2017-13915 CVE-2017-13896 CVE-2015-20002 CVE-2013-5146 CVE-2011-3465 CVE-2010-4017 CVE-2010-3807 Turns out even the NFL is worried about deepfakes CVE-2023-40725 (qms_automotive) CVE-2023-38074 (jt2go, teamcenter_visualization) CVE-2023-38070 (jt2go, teamcenter_visualization) DHS warns of malicious AI use against critical infrastructure MGM was likely hacked by Scattered Spider, an English-speaking group that previously used help desk calls to get passwords and planned to hack the slo Groups linked to Las Vegas cyber attacks are prolific criminal hacking gangs MGM was likely hacked by "Scattered Spider", an English-speaking group that previously used help desk phone calls to get passwords and plann Microsoft: Iranian espionage campaign targeted satellite and defense sectors BLASTPASS: Government agencies told to secure iPhones against spyware attacks HP unveils the $5,000+ Spectre Fold, an OLED foldable PC that can be used as a 17-inch tablet, a 17-inch laptop, or a 12.3-inch laptop and weighs less Linear, which sells project management tools to startups like Cohere, Runway, and Ramp, raised a $35M Series B led by Accel, sources say at a $400M v Linear, which makes project management software used by startups like Cohere and Ramp, raised a $35M Series B led by Accel, sources say at a $400M val HP unveils the Spectre Fold, a foldable PC that can be used as 17-inch tablet or laptop, or as a 12.3-inch laptop, weighing under 3lb, starting at $5, The iPhone of a Russian journalist was infected with the Pegasus spyware On day two of the Google trial, an Apple lawyer protested two numbers the DOJ used in its opening statement, including Google paying Apple $4B-$7B for Wake-Up Call as 3AM Ransomware Variant Is Discovered P2P File Sharing Policy Kubernetes flaws could lead to remote code execution on Windows endpoints Read it right! How to spot scams on Reddit High-tech microscope with ML software for detecting malaria in returning travellers CVE-2023-35666 (android) CVE-2022-34224 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc) CVE-2019-7819 (acrobat_dc, acrobat_reader_dc) New Paper: Securing AI: Similar or Different? AI being used for hacking and misinformation, top Canadian cyber ... - Reuters FBI Hacker Dropped Stolen Airbus Data on 9 11 Smashing Security podcast #339: Bitcoin boo-boo, deepfakes for good, and time to say goodbye to usernames? ALPHV Ransomware Used Vishing to Scam MGM Resorts Employee NSO's Pegasus Spyware Used to Hack CEO of Russia's Meduza ... - Bloomberg A new ransomware family called 3AM appears in the threat landscape Patch EVERYTHING: Widely Used WebP Code has Critical Bug Researchers: the iPhone of Meduza owner Galina Timchenko was infected with Pegasus in Germany, the first known case of the tool being used against a R Washington summit grapples with securing open source software Redfly group infiltrated an Asian national grid as long as six months How Congress can make the most of Schumer’s AI Insight Forums 6 Ways Passwords Can be Stolen and How Passwordless Can Stop Them All Microsoft Fixes Two Zero-Day Bugs Used in Attacks Mozilla fixed a critical zero-day in Firefox and Thunderbird How drones are used during earthquakes Symantec: Chinese cyberespionage group Redfly used the ShadowPad trojan to compromise a national grid in an Asian country from February 28 until Augus CVE-2023-4847 (simple_book_catalog_app) Apple's USB-C AirPods Pro will support 20-bit, 48 kHz lossless audio when used with the upcoming Vision Pro headset (Chris Welch The Verge) Adobe, Apple, Google & Microsoft Patch 0-Day Bugs CVE-2023-4900 Washington-based Treasury4, which sells data analytics software for risk management of financial and treasury processes, raised a $20M Series A led by Unity announces fees based on a game's installations and the developer's plan tier, starting on January 1, 2024, joining Unreal Engine, whic Unity announces new fees based on a game's number of installs and the developer's plan tier, starting January 1, 2024, joining Unreal Engine Former Twitter executives: Privacy and security practices deteriorated under Musk CVE-2023-38143 CVE-2023-36800 A new Repojacking attack exposed over 4,000 GitHub repositories to hack CVE-2023-40611 SAP Patch Day: September 2023 CVE-2023-41033 CVE-2023-38076 CVE-2021-40723 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc) Cybercriminals Selling "Golden Tickets" to Phish Microsoft 365... $500,000 in Sales in 10 Months A survey of 2,203 US adults: 53% say AI misinformation will impact who wins the 2024 election, 35% say AI will decrease their trust in election ads, a Parents of trans youth rally against controversial kids online safety bill Anonymous Sudan launched a DDoS attack against Telegram Iranian Charming Kitten APT targets various entities in Brazil, Israel, and the U.A.E. using a new backdoor CVE-2023-40623 Exclusive: AI being used for hacking and misinformation, top ... - Reuters.com Survey of 2,203 US adults: 53% say AI misinformation will impact who wins the 2024 election, and 35% say AI will decrease their trust in election ads CVE-2023-4060 CVE-2021-36021 (magento) CVE-2020-19320 CISA adds recently discovered Apple zero-days to Known Exploited Vulnerabilities Catalog Apple Fixes Zero-Day Bugs Used To Plant Pegasus Spyware - Slashdot CVE-2021-44193 (after_effects) CVE-2023-4589 (secret_server) Data Breach of AP Stylebook Leads to Phishing Attacks UK and US sanctioned 11 members of the Russia-based TrickBot gang You can try to hide your firmware from Kelly Patterson, but she ll find it (and break it) CVE-2023-4583 New HijackLoader malware is rapidly growing in popularity in the cybercrime community Hackers Exploit Zero-Day Flaw in Software Used by Resorts and Hotels - GBHackers Some of TOP universities wouldn t pass cybersecurity exam: left websites vulnerable Evil Telegram campaign: Trojanized Telegram apps found on Google Play The FBI s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15 Akamai prevented the largest DDoS attack on a US financial company Security Affairs newsletter Round 436 by Pierluigi Paganini International edition CVE-2023-4865 Ragnar Locker gang leaks data stolen from the Israel’s Mayanei Hayeshua hospital Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining Attacks Fiber-infused ink enables 3D-printed heart muscle to beat CVE-2023-4487 (cimplicity) CVE-2023-30712 (android) CVE-2023-4844 CVE-2023-40306 CVE-2023-33015 (315_5g_firmware, aqt1000_firmware, ar8035_firmware, ar9380_firmware, csr8811_firmware, csrb31024_firmware, fastconnect_6200_firmware, CVE-2023-30995 North Korea-linked threat actors target cybersecurity experts with a zero-day CVE-2023-4034 (smartrise_document_management_system) CVE-2023-21662 (aqt1000_firmware, ar8035_firmware, fsm10056_firmware, ipq5010_firmware, ipq5018_firmware, ipq5028_firmware, ipq9008_firmware, ipq9574_ Zero-day in Cisco ASA and FTD is actively exploited in ransomware attacks CVE-2023-40015 (vyper) Nation-state actors exploit Fortinet FortiOS SSL-VPN and Zoho ManageEngine ServiceDesk Plus, CISA warns CVE-2023-41775 Zero-days fixed by Apple were used to deliver NSO Group s Pegasus spyware CVE-2023-38456 (android) CVE-2023-38448 (android) The US Commerce Department begins an official probe to "obtain more information" on a "purported" 7nm chip made by SMIC in China u CVE-2023-40584 Apple releases macOS, iOS, iPadOS, and watchOS updates to address two zero-day flaws that Citizen Lab says were used to deliver NSO Group's Pegas Apple releases OS updates to address two zero-day vulnerabilities that Citizen Lab says were used to deliver NSO Group's Pegasus spyware (Joe War Russian businessman convicted in insider trading scheme that used ... - The Durango Herald Ex-FTX Digital Markets co-CEO Ryan Salame pleads guilty to federal campaign finance and money transmitting crimes and will forfeit $1.5B+ as part of t CVE-2023-41061 CVE-2023-20832 (android, openwrt, rdk-b, yocto) Former FTX Digital Markets co-CEO Ryan Salame pleads guilty to criminal charges, less than a month before the trial of Sam Bankman-Fried is set to beg From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management A secondhand account of the worst possible timing for a scammer to strike US, UK take action against members of the Russian-linked Trickbot hacker syndicate Beyond the Code: Unearthing the Subtle Business Ramifications of Six Months in Vulnerabilities Google plans to update Chrome in the coming weeks to incorporate the company's Material You design language, including refreshed icons and new co Multiple nation-state hackers infiltrate single aviation organization A malvertising campaign is delivering a new version of the macOS Atomic Stealer Microsoft commits to defending customers of its AI Copilots from copyright infringement lawsuits, as long as they've "used the guardrails an Thousands of dollars stolen from Texas ATMs using Raspberry Pi Exclusive: AI being used for hacking and misinformation, top ... - Reuters Google plans to update Chrome to incorporate its Material You design language in the coming weeks, including refreshed icons and new color palettes (J China turns to AI in hopes of creating viral online propaganda, Microsoft researchers say Cybercriminals target graphic designers with GPU miners Facebook Trains Its AI on Your Data. Opting Out May Be Futile Chinese Hacker Steals Microsoft Signing Key, Spies on US Government Ghostwriter, the anonymous creator who used AI to mimic Drake and The Weeknd, has met with record labels, Grammy organizers, and more, and releases a Chinese cyberspies obtained Microsoft signing key from Windows crash dump due to a mistake CVE-2023-4754 (gpac) CVE-2023-32102 (library_viewer) Demystifying Smishing vs Phishing Attacks for a Safer Online Experience CVE-2023-41601 CVE-2023-41053 Microsoft says Chinese hackers who in June breached US government email accounts stole an MSA key from a crash dump after hacking a Microsoft engineer CVE-2023-41330 CVE-2020-10132 Mystery solved? Microsoft thinks it knows how Chinese hackers stole its signing key W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit UK lawmakers back down on encryption-busting ‘spy clause’ Authenticating like the transportation security administration AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses Microsoft says Chinese hackers who recently breached US government email accounts stole a key from a crash dump after hacking a Microsoft engineer&apo Why DNS Security Can Be Your Most Problematic Blind Spot Russia's 'Fancy Bear' APT Targets Ukrainian Energy Facility CVE-2023-41943 GUEST ESSAY: Securing your cryptocurrency best practices for Bitcoin wallet security Interview with Jean Pierre Sleiman, author of the paper “Versatile multicontact planning and control for legged loco-manipulation” MITRE and CISA release Caldera for OT attack emulation Back to Basics: The Key Elements of a Strong Security Program CVE-2023-32432 CVE-2023-30720 CVE-2023-30717 CVE-2023-28195 Paytm, whose "soundbox" is used by 7M+ merchants, launches a $12 model that can accept tap and pay card payments, as rival Pine Labs unveils Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach CVE-2023-30534 Amazon will now charge $1.99 per delivery for in-garage deliveries that used to be free if the date is outside a customer's designated weekly &qu CVE-2023-41635 (realgimm) Shadow Wizard Registry Gang: Structured Registry Querying CVE-2023-34317 AGs in all 50 US states urge Congress to study how AI can be used to exploit kids, including via AI-made pornography, and pass legislation to guard ag Hackers stole $41M worth of crypto assets from crypto gambling firm Stake Bilyana Lilly on Western cybersecurity assistance to Ukraine Grip Security Blog 2023-09-05 07:31:50 New BLISTER Malware Update Fuelling Stealthy Network Infiltration As LotL Attacks Evolve, So Must Defenses Researchers Warn of Cyber Weapons Used by Lazarus Group's Andariel Cluster CVE-2023-41908 Securing Linux Policy Fix: Failed to Find Roblox Process on KRNL Injector 2023 A massive DDoS attack took down the site of the German financial agency BaFin Senator Marsha Blackburn, the Kids Online Safety Act's lead sponsor, says the US legislation would be used to "protect minor children" “Smishing Triad” Targeted USPS and US Citizens for Data Theft Publicly available Evil_MinIO exploit used in attacks on MinIO Storage Systems New Attack Technique MalDoc in PDF Alarms Experts CVE-2023-39162 Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising CVE-2023-38466 CVE-2023-38443 CVE-2023-38437 CVE-2023-4751 PoC exploit code released for CVE-2023-34039 bug in VMware Aria Operations for Networks Avoid The Hack: 7 Best Private Search Engine Recommendations CVE-2023-38387 Security Affairs newsletter Round 435 by Pierluigi Paganini International edition Social engineering attacks target Okta customers to achieve a highly privileged role Russian Hackers Used Microsoft Teams to Target Govt Agencies - Petri.com CVE-2023-4709 CVE-2022-3407 CVE-2023-39710 CVE-2023-33320 (wp-hijri) Why is .US Being Used to Phish So Many of Us? UNRAVELING EternalBlue: inside the WannaCry s enabler CVE-2023-34172 (wordpress_social_login) Researchers released a free decryptor for the Key Group ransomware From frustration to clarity: Embracing Progressive Disclosure in security design North Korea-linked APT Labyrinth Chollima behind PyPI supply chain attacks Russian State-Backed 'Infamous Chisel' Android Malware Targets Ukrainian Military 'Infamous Chisel' used by GRU-backed Sandworm to hack Ukraine - Tech Monitor MIT engineers use kirigami to make ultrastrong, lightweight structures Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic How to Delete WhatsApp Messages Permanently in 2023 (4 Ways) CVE-2023-4481 CVE-2023-39558 (audimexee) Russia-linked hackers target Ukrainian military with Infamous Chisel Android malware Insurance Costs Rise, Coverage Shrinks, But Policies Remain Essential CVE-2023-32801 (composite_products) New open-source infostealer, and reflections on 2023 so far ‘Five Eyes’ nations release technical details of Sandworm malware ‘Infamous Chisel’ Akira Ransomware gang targets Cisco ASA without Multi-Factor Authentication From Simple Beginnings, Classiscam Fraud Campaigns Go Global SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations Infamous Chisel Malware Analysis Report SapphireStealer: Open-source information stealer enables credential and data theft Paramount Global disclosed a data breach GRU Blamed for Infamous Chisel Malware Targeting Ukraine's Military Phones SSL Deprecation: Understanding the Evolution of Security Protocols Lessons from the rapid grocery delivery boom: $10B+ of VC money, used for ads and promos, created the market from nothing, app downloads have cratered CVE-2023-4315 CVE-2023-3636 National Safety Council data leak: Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organization X updates its privacy policy to include new biometric data, which the company plans to collect for safety and security, along with data on jobs and ed Meta lets users submit requests to access, alter, or delete some of their third-party information that the company uses for generative AI training (Jo Abusing Windows Container Isolation Framework to avoid detection by security products Hashcat Tips and Tricks for Hacking Competitions: A CMIYC Writeup Part 3 Meta lets users submit requests to access, alter, or delete some of their third-party information that Meta uses for generative AI training (Jonathan X updates its privacy policy to include biometric information as data it plans to collect for safety and security, along with data on users' jobs CVE-2023-39139 Chinese Group Spreads Android Spyware Via Trojan Signal, Telegram Apps Chinese GREF APT distributes spyware via trojanized Signal and Telegram apps on Google Play and Samsung Galaxy stores Qakbot Botnet Disrupted, Infected 700,000 Computers Globally CVE-2023-3992 CVE-2023-4013 An Introduction to Deep File Inspection CVE-2023-41561 CVE-2023-41556 CVE-2023-41552 CVE-2023-25019 Qakbot: How the FBI, NCA and other European officials broke notorious cybercrime hacking network - Sky News Huawei quietly launches the $960 Mate 60 Pro, giving no advance notice and releasing no ads; some investors speculate that Huawei used its own 5G chi FBI: Operation ‘Duck Hunt’ dismantled the Qakbot botnet CVE-2023-40706 (snap_pac_s1_firmware) CVE-2020-18912 FBI, European agencies announce major takedown of hacker network that used Qakbot software - KABC-TV FBI Dismantles Global Malware Network Qakbot Used For Ransomware Attacks - Forbes UNC4841 threat actors hacked US government email servers exploiting Barracuda ESG flaw FBI announces it has dismantled global network of hacked computers used in major fraud scheme - Yahoo! Voices CVE-2023-40892 (ac8v4_firmware) Microsoft joins a growing chorus of organizations criticizing a UN cybercrime treaty FBI takes down notorious 'Qakbot' hacking network that used 700K infected computers worldwide to steal hundreds of ... - Daily Mail U.S. Hacks QakBot, Quietly Removes Botnet Infections FBI takes down notorious 'Qakbot' hacking network that used 700K infected computers worldwide to steal hundred - Daily Mail Somalia Orders ISPs to Block Telegram and TikTok CVE-2023-40751 (fundraising_script) The FBI led an effort to dismantle the Qakbot botnet, which ransomware gangs used as an infection vector for years, on August 25 after infiltrating it FBI, DOJ disrupt massive Qakbot botnet connected to millions of dollars in ransomware losses FBI, DOJ disrupt massive botnet connected to millions of dollars in ransomware losses Avoid The Hack: 11 Best Privacy Friendly Operating Systems (Desktops) FBI announces it has dismantled global network of hacked computers used in major fraud scheme - CNN LockBit 3.0 Ransomware Variants Surge Post Builder Leak Meta: Pro-Chinese influence operation was the largest in history Apollo.io, which offers sales and marketing tools used by 500K+ firms, raised $100M led by Bain at a $1.6B valuation, up from $900M after raising $11 FIN8-linked actor targets Citrix NetScaler systems Four in Five Cyber-Attacks Powered by Just Three Malware Loaders Japan’s JPCERT warns of new ‘MalDoc in PDF’ attack technique CVE-2023-4569 CVE-2023-34725 Grip Security Blog 2023-08-28 17:36:24 OpenAI Debuts ChatGPT Enterprise, touting better privacy for business Presidential council recommends launching a Department of Water to confront cyberthreats, climate change CVE-2023-39062 Black Hat USA 2023 NOC: Network Assurance Protect Active Directory Better Tor Adopts a Proof-of-Work Defense to Protect Against DDoS Attacks CVE-2023-40766 CVE-2023-40762 Beware of fake fried chicken businesses on Facebook: Victims phones hacked, thousands lost in scam, forged Halal certificates used - Yahoo Updated Kmsdx botnet targets IoT devices Massive MOVEit campaign already impacted at least 1,000 organizations and 60 million individuals Leaked LockBit 3.0 ransomware builder used by multiple actors - Security Affairs Hackers breached WebDetetive, an Android spyware app used mainly in Brazil, and deleted victims' stolen data; Poland-based LetMeSpy was similarly CVE-2023-4558 Poland’s authorities investigate a hacking attack on country’s railways Leaked LockBit 3.0 ransomware builder used by multiple threat actors AI helps robots manipulate objects with their whole bodies Stephen King reflects on his books being used for AI training, arguing the sum is lesser than its parts, so far, as creativity can't happen witho Hackers breached WebDetetive, an Android spyware app used mainly in Brazil, and deleted data on its victims; Poland-based LetMeSpy was similarly hacke EXCLUSIVE: I used to be a cyber criminal making $500000 a year ... - Daily Mail Rajshree More reacts to Rakhi Sawant's Instagram hacking allegations, says 'She had used the same tactic - Times of India Deepfakes Are Being Used to Circumvent Facial Recognition Systems EXCLUSIVE: I used to be a cyber criminal making $500,000 a year: Here's what you need to know to protect yours - Daily Mail Orbit Sprinkler Timer Manual PDF: Ultimate Guide to Installation & Features CVE-2022-41444 (cacti) Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses CVE-2020-21723 (ogg_video_tools) Adversary On The Defense: ANTIBOT.PW 'Whiffy Recon' Malware Transmits Device Location Every 60 Seconds Demonstrating Transparency through Software Bill of Materials (SBOM) A More Resilient Future with Automated Ransomware Recovery Demystifying Duo APIs: Advanced Security with Duo Integrations ThousandEyes Pi4 Wireless Deployment at Black Hat USA EPSS and Its Role in Cisco Vulnerability Management Risk Scoring Whiffy Recon malware triangulates the position of infected systems via Wi-Fi The Travel Bug: NetSec Edition FBI: Patches for Barracuda ESG Zero-Day CVE-2023-2868 are ineffective CVE-2020-19188 (ncurses) Researchers released PoC exploit for Ivanti Sentry flaw CVE-2023-38035 CVE-2023-4451 (cockpit) Microsoft says Chinese hacking crew is targeting Taiwan IT leaders report concern over generative AI in SaaS applications GTA 6 hacker used an Amazon Fire Stick in a hotel while out on bail ... - Dot Esports Years into these games histories, attackers are still creating Fortnite and Roblox -related scams Lazarus APT exploits Zoho ManageEngine flaw to target an Internet backbone infrastructure provider Ransomware hackers dwell time drops to 5 days, RDP still widely used - BleepingComputer CoinsPaid claims North Korean hacking group used fake job ... - Cointelegraph CVE-2023-2318 (marktext) North Korea's Lazarus APT Uses GUI Framework to Build Stealthy RAT NIST Publishes Draft Post-Quantum Cryptography Standards Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT Insider IP Theft: Knicks sue Toronto Raptors for a Flagrant Foul North Korea's Lazarus Group Used GUI Framework to Build Stealthy RAT eSentire Labs Open Sources Project to Monitor LLMs New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute CVE-2023-38288 Malware-as-a-Service: Redline Stealer Variants Demonstrate a Low-Barrier-to-Entry Threat DoJ charged Tornado Cash founders with laundering more than $1 billion CVE-2023-4409 (nbs&happysoftwechat) Data Breaches Involving Social Engineering Attacks Take Longer to Identify and Contain CVE-2023-4443 (free_hospital_management_system_for_small_practices) CVE-2023-4441 (free_hospital_management_system_for_small_practices) CVE-2023-37379 US charges founders of Tornado Cash mixer used by Lazarus hackers - BleepingComputer Social Engineering Is the Number One Cybersecurity Problem by Far CVE-2023-32496 CVE-2023-32499 WinRAR Vulnerability Affects Traders Worldwide Scarabs colon-izing vulnerable servers State of Trust Insights: The 2023 Security SaaS Leaderboard HP Report Details Tactics Used to Evade Detection Tools 5 Early Warning Indicators That Are Key to Protecting National Secrets Phishing Campaigns Targeting Microsoft Login Credentials Jump an Unprecedented 6100% Phishing Tops the List as the Most Costly Initial Attack Vector in Data Breaches Thousands of High-Risk Incidents Neutralized Using AI Bruce Schneier gets inside the hacker’s mind Agniane Stealer: Dark Web s Crypto Threat Barracuda Networks Report Details Benefits of Cybersecurity AI Terra Developers Shut Down Website Amid A Phishing Campaign Electronic Communication Policy Carderbee APT targets Hong Kong orgs via supply chain attacks Binance.US partners with MoonPay to let users use debit or credit cards and Apple Pay or Google Pay to buy Tether, which can then be used to buy other How to See Old Notifications on iPhone 2023: Quick and Easy Steps Fix Roblox Keeps Crashing Issues: Why Does Roblox Crashing When i Start? How to Delete Zola Account 2023: Follow These Simple Steps CVE-2023-4430 CVE-2023-40144 Binance.US teams up with MoonPay to let users use their debit or credit cards, Apple Pay or Google Pay to buy Tether, which can then be used to buy ot CVE-2023-32108 (albo_pretorio_online) CVE-2023-37434 CVE-2023-37432 CVE-2023-37427 CVE-2022-36648 CVE-2022-28071 CVE-2021-32292 CVE-2020-22524 CVE-2020-21426 CVE-2020-19188 CVE-2020-18378 Defense contractor Belcan leaks admin password with a list of flaws Ivanti warns of a Sentry API authentication bypass flaw being exploited in the wild, after hackers used another Ivanti zero-day to breach Norway' US tech firms offer data protections for Europeans to comply with EU big tech rules Chinese APT Targets Hong Kong in Supply Chain Attack New APT Group Launches Supply Chain Campaign Previously unknown hacking group targets Hong Kong organizations in supply chain cyberattack Ivanti fixed a new critical Sentry API authentication bypass flaw Chinese Hacker Group Targets Southeast Asian Gambling Industry Using Stolen Ivacy VPN Certificate CVE-2023-4303 Customer data used for unwanted romantic contact, UK poll shows CVE-2023-25915 Taking Back Control: California’s SB 362 and the Fight Against Reckless Data Brokerage BlackCat ransomware group claims the hack of Seiko network CVE-2023-3954 New HiatusRAT campaign targets Taiwan and U.S. military procurement system A Basic Guide to Router and Wireless Security for Regular People CVE-2023-40735 How Science, Nature, and other peer-reviewed journals are grappling with outlines, drafts, or papers that authors used generative AI to write without TLS 1.2 Handshake vs TLS 1.3 Handshake Spoofing an Apple device and tricking users into sharing sensitive data Cabinet Division Warns Officials Against Fake SMS Calls Used By Hackers to Steal Data - ProPakistani People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection N. Korean Kimsuky APT targets S. Korea-US military exercises Vulnerability Summary for the Week of July 10, 2023 Vulnerability Summary for the Week of July 31, 2023 CVE-2023-4432 CVE-2023-4434 CVE-2023-4394 CVE-2023-4352 CVE-2023-4350 CVE-2023-4335 CVE-2023-4330 CVE-2023-4328 CVE-2023-40348 (gogs) CVE-2023-40337 CVE-2023-4030 CVE-2023-4028 CVE-2023-40168 CVE-2023-39971 CVE-2023-39944 CVE-2023-39668 CVE-2023-39507 CVE-2023-39125 CVE-2023-36106 CVE-2023-34217 CVE-2023-32106 CVE-2023-28783 CVE-2023-2915 CVE-2023-20201 The US Army will soon be able to see itself in cyberspace on the battlefield Cyberwarriors will soon have access to more training tools NSA s cybersecurity directorate looks to scale up this year DoD needs to improve how it tests cyber weapons architecture, weapons tester says In Before The Lock: ESXi Attack Surface Intelligence February 2023 Product Update: ServiceNow and Slack Integrations, Quick Reaction Team Alerts, and More! 2022 Annual Report IRS Cyberattack Highlights Risk of Tax Refund Fraud On Ukraine, China Prioritizes Its International Ambitions When Access Goes Wrong: The Dangers of Exposed Login Panels Russian Sanctions Evasion Puts Merchants and Banks at Risk With KEYPLUG, China s RedGolf Spies On, Steals From Wide Field of Targets What is Threat Intelligence? The Cloud Has Complicated Attack Surface Management Xiaoqiying Genesis Day Threat Actor Group Targets South Korea, Taiwan Top 7 Attack Surface Metrics You Should Keep Track Of Introducing Recorded Future AI: AI-driven intelligence to elevate your security defenses New Capabilities To Enhance Visibility, Increase Automation, and Reduce Threat Exposure From Speed to Consistency: The Power of Automation for Your SOC OilAlpha: A Likely Pro-Houthi Group Targeting Entities Across the Arabian Peninsula Attack Surface Intelligence: A Vital Piece of the Critical Infrastructure Protection Puzzle North Korea-Aligned TAG-71 Spoofs Financial Institutions in Asia and US Fortinet CVE-2023-27997: Impact and Mitigation Techniques North Korea s Cyber Strategy BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities Threat Intelligence to Elevate Your Security Defenses Recorded Future Threat Intelligence Delivers Measurable Outcomes for Security Teams BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken Security Defenses BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023 Recruiter Tips: Insights on the Hiring Process at Recorded Future H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers Tuning up my WordPress Install Kanye’s Password Airplay Annoyance Secure File Deletion CloudFlare Gateway DNS Filtering log4jmemes.com Safe Computing In An Unsafe World: Die Zeit Interview Talking with Stewart Baker A Skeleton Key of Unknown Strength Hacking the Universe with Quantum Encraption Yahoo! Yippee? What to Do? Encryption Flaws in Popular Chinese Language App Put Users' Typed Data at Risk New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks Lolek Bulletproof Hosting Servers Seized, 5 Key Operators Arrested Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools Polish Credentials - 1,204,870 breached accounts Resilient bug-sized robots keep flying even after wing damage Robotic system offers hidden window into collective bee behavior Education and healthcare are set for a high-tech boost A four-legged robotic system for playing soccer on various terrains Robot assistants in the operating room promise safer surgery Interactive fleet learning Drones navigate unseen environments with liquid neural networks We need to discuss what jobs robots should do, before the decision is made for us Miniscule device could help preserve the battery life of tiny sensors Robot fish makes splash with motion breakthrough Jellyfish-like robots could one day clean up the world s oceans Adama Sesay on solving problems with sensors and microsystems Making drones suitable for cities Building a Tablebot [UPDATE] A list of resources, articles, and opinion pieces relating to large language models & robotics Helping robots handle fluids Sponge makes robotic device a soft touch A step toward safe and reliable autopilots for flying Robot Talk Episode 54 – Robotics and science fiction Machine-learning method used for self-driving cars could improve lives of type-1 diabetes patients Flowstate: Intrinsic s app to simplify the creation of robotics applications Titan submersible disaster underscores dangers of deep-sea exploration an engineer explains why most ocean science is conducted with crewless submar Robo-Insight #1 Magnetic robots walk, crawl, and swim #RoboCup2023 in tweets – part 2 Heat-resistant drone could scope out and map burning buildings and wildfires Robo-Insight #2 Pangolin the inspiration for medical robot An updated guide to Docker and ROS 2 Oceans to get better protection with connected underwater technology Can charismatic robots help teams be more creative? Black Hat 2023: Understanding Mobile Exploitation Beyond the App WordPress Security Checklist How to Augment or Replace Your SIEM with the CrowdStrike Falcon Platform July 2023 Patch Tuesday: Six Actively Exploited Zero-Days and Nine Critical Vulnerabilities Identified Adversaries Can Log In with Microsoft through the nOAuth Azure Active Directory Vulnerability CrowdStrike Scores 100% in SE Labs Q2 2023 Enterprise Advanced Security Detection Test, Wins AAA Award The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia Linux malware strengthens links between Lazarus and the 3CX supply-chain attack Creating strong, yet user-friendly passwords: Tips for your business password policy APTs target MSP access to customer networks Week in security with Tony Anscombe Shedding light on AceCryptor and its operation The British Army is investigating after its Twitter and YouTube accounts were hijacked Northern Ireland police data breach is second in weeks, force reveals Hacked UK voter data could be used to target disinformation, warn experts Data leaks have given Irish republican groups upper hand against police, analysts warn AI could have bigger impact on UK than Industrial Revolution, says Dowden Norfolk and Suffolk police admit breach involving personal data of 1,230 people Bronze Starlight targets the Southeast Asian gambling sector APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countries Massive phishing campaign targets users of the Zimbra Collaboration email server Security Affairs newsletter Round 433 by Pierluigi Paganini International edition Over 3,000 Android Malware spotted using unsupported unknown compression methods to avoid detection Smuggler - An HTTP Request Smuggling Desync Testing Tool Phishing Spree Targets Zimbra Collaboration Account Holders Critical Flaws in PowerShell Gallery Enable Malicious Exploits Flaw in Ninja Forms WordPress plugin allows hackers to steal submitted data How to hack casino card-shuffling machines Crimeware server used by NetWalker ransomware seized and shut down LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack Who and What is Behind the Malware Proxy Service SocksEscort? Meet the Brains Behind the Malware-Friendly AI Chat Service ‘WormGPT’ Teach a Man to Phish and He’s Set for Life How Malicious Android Apps Slip Into Disguise Windows file archiver utility maker WinRAR fixes a vulnerability that could let an attacker remotely execute arbitrary code, after a researcher flagge Analysis: Books3, a dataset used to train Meta's Llama, BloombergGPT, and EleutherAI's GPT-J, contains 170K+ books from Stephen King and oth Pegasus Spyware Explained: Biggest Questions Answered U.S. State Department and Diplomat’s iPhones were Reportedly Hacked by Pegasus Spyware Hackers Exploiting Log4j Vulnerability to Infect Computers with Khonsari Ransomware This New Apple Safari Browser Bug Allows Cross-Site User Tracking Ukrainian Government is Officially Accusing Russia of Recent Cyberattacks Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers Details Google FrodoPIR: New Privacy-Focused Database Querying System Explained Researchers Observe A Hacker Spend 100 Hours Compromising Honeypot Computers EvilProxy Targets 120,000 Phishing Emails To Access Microsoft 365 Accounts Info-Stealing Malware Exposes More Than 100,000 Hacking Forums Apple Sacks it’s Server Supplier After Finding Infected Firmware in Siri Servers iPhone Robbers Try Unique Phishing Scam to Unlock Physical Device Web Tracking Gets Extremely Aggressive with New Hardware Level Fingerprinting Wikileaks Vault 7 Reveals a Detailed CIA Hacking Arsenal Vault 7: Marble Framework Reveals How the CIA Evaded Forensics & Attributed Malware to Other Countries List of Secure Dark Web Email Providers in 2023 Baldur’s Gate 3 Low FPS? Here’s 7 Ways to Fix and Improve it Ransomware's Paradox: Why Falling Monetization Rates Are Accompanied by Soaring Ransom Payments - A Must-Read Analysis. Social Media Platforms Become Half of all Phishing Attack Targets 8 Online Best Dark Web Search Engines for Tor Browser (2022) SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) Security Alert: Microsoft Releases July 2023 Security Updates What might authentication attacks look like in a phishing-resistant future? Every company has its own version of ChatGPT now The many vulnerabilities Talos discovered in SOHO and industrial wireless routers post-VPNFilter Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical Code leaks are causing an influx of new ransomware actors New threat actor targets Bulgaria, China, Vietnam and other countries with customized Yashma ransomware Half-Year in Review: Recapping the top threats and security trends so far in 2023 What is commercial spyware? What Cisco Talos knows about the Rhysida ransomware Out-of-bounds write vulnerabilities in popular chemistry software; Foxit PDF Reader issues could lead to remote code execution The rise of AI-powered criminals: Identifying threats and opportunities You ve Got Malware: The Rise of Threat Actors Using Microsoft OneNote for Malicious Campaigns Credential Caution: Exploring the New Public Cloud File-Borne Phishing Attack Shifting Left in Cyber Security - Part 1 Shifting Left in Cybersecurity: Balancing Detection and Prevention - Part 2 Mystic Stealer: The New Kid on the Block Top Malware Delivery Tactics to Watch Out for in 2023 Using JupyterLab to Manage Password Cracking Sessions (A CMIYC 2023 Writeup) Part 1 White House hosts roundtable on harmful data broker practices Data centers at risk due to flaws in power management software White House is fast-tracking executive order on artificial intelligence Hackers are increasingly hiding within services such as Slack and Trello to deploy malware Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say Senators urge FTC probe of alleged children’s privacy violations by Google Fifty minutes to hack ChatGPT: Inside the DEF CON competition to break AI