"New Tool Xeon Sender Enables Large-Scale SMS Spam Attacks"

"New Tool Xeon Sender Enables Large-Scale SMS Spam Attacks"

"Xeon Sender," a cloud-based tool, helps attackers launch large-scale SMS spam and phishing campaigns using legitimate Software-as-a-Service (SaaS) providers. The tool, which is distributed via Telegram and different hacking forums, makes it easier to send bulk SMS messages by using valid Application Programming Interface (API) credentials from Amazon SNS, Twilio, and other popular service providers. This article continues to discuss findings regarding the Xeon Sender tool.

Submitted by Gregory Rigby on

"Windows Zero-Day Attack Linked to North Korea's Lazarus APT"

"Windows Zero-Day Attack Linked to North Korea's Lazarus APT"

Researchers at Gen Threat Labs have linked the exploitation of one of the zero-days recently patched by Microsoft to North Korea's "Lazarus" Advanced Persistent Threat (APT) group. The vulnerability marked as "actively exploited" by Microsoft enables SYSTEM privileges on the latest Windows operating systems. Gen Threat Labs posted a note connecting the exploitation to Lazarus through the use of the "FudModule" rootkit, previously documented by Avast as part of the Lazarus APT toolkit.

Submitted by Gregory Rigby on

"Oregon Zoo Ticketing Service Hack Impacts 118,000"

"Oregon Zoo Ticketing Service Hack Impacts 118,000"

The Oregon Zoo recently notified roughly 118,000 individuals that their names and payment card information were stolen from its online ticketing service.  The incident was identified on June 26, resulting in names, payment card numbers, CVVs, and expiration dates being exfiltrated.  The zoo noted that transactions processed between December 20, 2023, and June 26, 2024, were likely affected.  According to the zoo, threat actors redirected transactions from the third-party vendor that processed online ticketing purchases for Oregon Zoo.

Submitted by Adam Ekwall on

"City of Flint Scrambling to Restore Services Following Ransomware Attack"

"City of Flint Scrambling to Restore Services Following Ransomware Attack"

The City of Flint, Michigan, is trying to restore network systems impacted by an August 14 ransomware attack that knocked some of its online services offline.  The city noted that the attack impacted the city’s payment and communication services but did not affect emergency services, including 911, dispatch, law enforcement, and fire operations.  BS&A, the city’s billing system, was disrupted, preventing online or credit card transactions for water, sewer, and tax payments.

Submitted by Adam Ekwall on

"Microsoft Apps for macOS Exposed to Library Injection Attacks"

"Microsoft Apps for macOS Exposed to Library Injection Attacks"

According to researchers at Cisco Talos, eight Microsoft apps for macOS are vulnerable to library injection attacks that could enable adversaries to breach sensitive data. Affected Microsoft apps include Microsoft Teams, Outlook, PowerPoint, and Word. Attackers could bypass macOS' permission model using app permissions without the need for additional user verification. Through this, attackers could send emails from the user account, record audio, and more.

Submitted by Gregory Rigby on

"National Public Data Says Breach Impacts 1.3 Million People"

"National Public Data Says Breach Impacts 1.3 Million People"

National Public Data (NPD) has recently confirmed that it is suffering a data breach following reports of 2.9 billion personal information records being compromised, but the company has recently announced that the incident only affects 1.3 million people in the US.  The information that was suspected of being breached included names, email addresses, phone numbers, social security numbers, and mailing addresses.

Submitted by Adam Ekwall on

"Numerous Manufacturers Use Insecure Android Kernels"

"Numerous Manufacturers Use Insecure Android Kernels"

Researchers at Graz University of Technology (TU Graz) analyzed smartphones from ten manufacturers, finding that the Android kernels used are vulnerable to "one-day exploits" despite the implementation of protection mechanisms. Only 29 to 55 percent of the 994 smartphones tested by the research team could prevent attacks, depending on manufacturer and model. In contrast, the Generic Kernel Image (GKI) version 6.1 provided by Google could prevent about 85 percent of attacks. In comparison to the GKI, manufacturer kernels were up to 4.6 times worse at defending against attacks.

Submitted by Gregory Rigby on

"FBI and CISA Release Joint PSA, Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting"

"FBI and CISA Release Joint PSA, Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting"

The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have jointly released a Public Service Announcement (PSA) titled "Just So You Know: Ransomware Disruptions During Voting Periods Will Not Impact the Security and Resilience of Vote Casting or Counting." It is the latest in their PSA series aimed at putting potential cyber-related election day disruptions during the 2024 election cycle into context for the American people.

Submitted by Gregory Rigby on

"3 Questions: How to Prove Humanity Online"

"3 Questions: How to Prove Humanity Online"

As Artificial Intelligence (AI) agents advance, it may become harder to distinguish AI-powered users from real humans online. In a new white paper, researchers from MIT, OpenAI, Microsoft, and other technology and academic institutions propose using "personhood credentials" to enable someone to prove they are an actual human online while protecting their privacy. MIT News interviewed co-authors of the paper, Nouran Soliman and Tobin South, about why personhood credentials are important, the risks posed by such credentials, and how to safely implement them.

Submitted by Gregory Rigby on

"New Study Reveals Loophole in Digital Wallet Security—Even if Rightful Cardholder Doesn't Use a Digital Wallet"

"New Study Reveals Loophole in Digital Wallet Security—Even if Rightful Cardholder Doesn't Use a Digital Wallet"

Over 5.3 billion people are expected to use digital wallets such as Apple Pay, Google Pay, and PayPal by the year 2026. Although these wallets are supposed to provide greater security than traditional payment methods, the reliance on outdated authentication methods and a preference for convenience over security make digital wallets vulnerable, according to new research led by computer engineers at the University of Massachusetts Amherst. This article continues to discuss the study "In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping."

Submitted by Gregory Rigby on
Subscribe to