"Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability"

"Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability"

According to the Shadowserver Foundation, a recently addressed vulnerability could affect about 6,000 Internet-accessible Palo Alto Networks firewalls. Palo Alto Networks disclosed the flaw on April 12 and began rolling out patches a few days later. State-sponsored threat actors had exploited the vulnerability, and this activity recently increased after Proof-of-Concept (PoC) code was released.

Submitted by Gregory Rigby on

"Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow"

"Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow"

A hack that caused a small Texas town’s water system to overflow in January has recently been linked to a shadowy Russian hacktivist group. The attack was one of three on small towns in the rural Texas Panhandle. Local officials said the public was not in danger, and the attempts were reported to federal authorities. Mike Cypert, the city manager of Hale Center, said there were 37,000 attempts in four days to log into their firewall. He added that the attempted hack failed as the city “unplugged” the system and operated it manually.

Submitted by Adam Ekwall on

"Cannes Hospital Cancels Medical Procedures Following Cyberattack"

"Cannes Hospital Cancels Medical Procedures Following Cyberattack"

Cannes Hospital Centre – Simone Veil (CHC-SV) recently shut down its systems in response to a cyberattack it fell victim to. Also known as the Broussailles Hospital, the healthcare organization decided to completely cut off computer access to contain the attack, which forced employees to turn to pen and paper to continue providing services to patients. CHC-SV says it is making all the efforts to ensure that it can provide the full range of care across its fields of activity, adding that it has been working with regional healthcare entities to redirect patients based on their needs.

Submitted by Adam Ekwall on

"MITRE Reveals Ivanti Breach By Nation State Actor"

"MITRE Reveals Ivanti Breach By Nation State Actor"

The MITRE Corporation recently became the latest high-profile victim of an Ivanti-related breach after a nation-state actor compromised its R&D network via two chained zero-day vulnerabilities. The non-profit said the last time it suffered a significant cyber-incident like this was 15 years ago. MITRE noted that an unnamed state actor on this occasion comprised MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative network that provides storage, computing, and networking resources.

Submitted by Adam Ekwall on

"NSF Career Award Boosts LSU Researcher's Work Fighting 'Hidden' Privacy Leaks During Videoconferencing"

"NSF Career Award Boosts LSU Researcher's Work Fighting 'Hidden' Privacy Leaks During Videoconferencing"

According to Louisiana State University (LSU) researcher and professor Chen Wang, muting microphones and turning off cameras during video conferences may not provide users with the privacy they expect. A National Science Foundation (NSF) CAREER Award will help him in his efforts to reduce the risk posed by "micro signals" from those devices. Wang says that even when turned off, computer microphones and cameras can leak information beyond what is seen and heard via signals that are too small for humans to recognize but detectable by machines.

Submitted by Gregory Rigby on

"ASU Receives Three DEPSCoR Awards for Research Critical to National Security"

"ASU Receives Three DEPSCoR Awards for Research Critical to National Security"

The US Department of Defense (DOD) has awarded Defense Established Program to Stimulate Competitive Research (DEPSCoR) grants to three researchers in the Ira A. Fulton Schools of Engineering at Arizona State University (ASU). The three researchers will each receive up to $600,000 over three years to research cybersecurity, cyber deception, and more. Adil Ahmad and his team want to revolutionize computer logging infrastructure with the DEPSCoR grant. They will use logs to improve cybersecurity.

Submitted by Gregory Rigby on

"51% of Enterprises Experienced a Breach Despite Large Security Stacks"

"51% of Enterprises Experienced a Breach Despite Large Security Stacks"

According to Pentera, 93 percent of enterprises that admitted to a breach experienced unplanned downtime, data exposure, or financial loss. Pentera surveyed 450 Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), and Information Technology (IT) security leaders from companies with over 1,000 employees. On average, enterprises use 53 security solutions across their organization. However, despite large security stacks, 51 percent of enterprises reported a breach in the previous 24 months.

Submitted by Gregory Rigby on

"BlackTech Targets Tech, Research, and Gov Sectors with New 'Deuterbear' Tool"

"BlackTech Targets Tech, Research, and Gov Sectors with New 'Deuterbear' Tool"

A threat actor called "BlackTech" has been targeting the Asia-Pacific region's technology, research, and government sectors. The attacks deliver an updated version of the modular backdoor named "Waterbear," and its enhanced successor, "Deuterbear." According to Trend Micro researchers, Waterbear is notoriously complex, using multiple evasion mechanisms to avoid detection and analysis. In 2022, "Earth Hundun" started using the new version of Waterbear, which includes several changes, such as anti-memory scanning and decryption routines.

Submitted by Gregory Rigby on

"Hackers Are Threatening to Leak World-Check, a Huge Sanctions and Financial Crimes Watchlist"

"Hackers Are Threatening to Leak World-Check, a Huge Sanctions and Financial Crimes Watchlist"

A financially motivated criminal hacking group that calls itself "GhostR" claims to have stolen a confidential database containing millions of records companies use to screen potential customers for links to sanctions and financial crime. The hackers claimed they stole 5.3 million records from the World-Check screening database in March and are threatening to release the data online.

Submitted by Gregory Rigby on

"Quishing Attacks Jump Tenfold, Attachment Payloads Halve"

"Quishing Attacks Jump Tenfold, Attachment Payloads Halve"

According to a new Egress report, quishing attacks, a type of phishing involving QR codes, have increased significantly, jumping from 0.8 percent in 2021 to 10.8 percent in 2024. The report also highlighted a decrease in attachment-based payloads, which fell from 72.7 percent to 35.7 percent during the same period. Impersonation attacks have persisted, with 77 percent posing as well-known brands, such as DocuSign and Microsoft.

Submitted by Gregory Rigby on
Subscribe to