"AMD Investigating Breach Claims After Hacker Offers to Sell Data"

"AMD Investigating Breach Claims After Hacker Offers to Sell Data"

AMD has launched an investigation after a well-known hacker announced the sale of sensitive data that allegedly belonged to the company. The hacker known as "IntelBroker" announced on the BreachForums cybercrime forum that he was selling the AMD data, which allegedly includes information about future AMD products, customer and employee databases, datasheets, source code, property files, firmware, and financial documents. The employee database allegedly contains information such as names, job roles, phone numbers, and email addresses.

Submitted by Gregory Rigby on

"Clever macOS Malware Delivery Campaign Targets Cryptocurrency Users"

"Clever macOS Malware Delivery Campaign Targets Cryptocurrency Users"

Researchers at Recorded Future warn that cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware. The threat actor behind this operation targets both Windows and Mac users, using social media and messaging platforms to trick them into installing the malicious apps. This article continues to discuss how cryptocurrency users are getting tricked into downloading the malware.

Submitted by Gregory Rigby on

"US, Indonesia Hold Port-Focused Cybersecurity Exercise"

"US, Indonesia Hold Port-Focused Cybersecurity Exercise"

The US and Indonesia recently conducted their first port-focused cybersecurity tabletop exercise to improve responses to cyberattacks on critical maritime infrastructure. According to the US Department of Homeland Security (DHS), the exercise simulated major cyber incidents and ransomware attacks on port operations, ship-to-shore cranes, and other aspects of maritime activity. This article continues to discuss the port-focused cybersecurity tabletop exercise and the importance of combating cyber threats in the maritime environment.

Submitted by Gregory Rigby on

"G7 to Develop Cybersecurity Framework for Energy Sector"

"G7 to Develop Cybersecurity Framework for Energy Sector"

G7 nations will develop a cybersecurity framework for operational technologies in energy systems, with the intended users being manufacturers and operators. The agreement was announced by US National Security Advisor Jake Sullivan at the G7 Leaders' Summit on June 18. The framework seeks to improve the cybersecurity of the global supply chain for critical technologies used to manage and operate electricity, oil, and natural gas systems. This article continues to discuss the cybersecurity framework that will be developed by the G7 nations. 

Submitted by Gregory Rigby on

"US, Allies Publish Guidance on Securing Network Access"

"US, Allies Publish Guidance on Securing Network Access"

Government agencies in the US, New Zealand, and Canada have released new guidance, titled "Modern Approaches to Network Access Security," for organizations to use stronger security solutions and improve network activity visibility. The document delves into modern security solutions that organizations can use beyond Virtual Private Networks (VPNs) to ensure secure access to hybrid environments.

Submitted by Gregory Rigby on

"Quishing Campaign Targets Chinese Citizens via Fake Official Documents"

"Quishing Campaign Targets Chinese Citizens via Fake Official Documents"

According to new research by Cyble Research and Intelligence Labs (CRIL), a QR code-based phishing campaign has targeted individuals in China, tricking victims by using QR codes in fake official documents. As part of the campaign, Microsoft Word files are disguised as official documents from the Chinese Ministry of Human Resources and Social Security. CRIL security researchers believe the files were distributed via spam email attachments. This article continues to discuss the QR code-based phishing campaign targeting individuals in China.

Submitted by Gregory Rigby on

"CISA Warns of PoC Exploit for Vulnerability in RAD SecFlow-2 Industrial Switch"

"CISA Warns of PoC Exploit for Vulnerability in RAD SecFlow-2 Industrial Switch"

The US Cybersecurity and Infrastructure Security Agency (CISA) has released an Industrial Control System (ICS) advisory informing organizations of a high-severity vulnerability discovered in an outdated industrial switch made by the Israel-based networking equipment manufacturer RAD Data Communications. The agency recently found a publicly available Proof-of-Concept (PoC) exploit aimed at a path traversal vulnerability in RAD's SecFlow-2 ruggedized switch/router, which is intended for harsh industrial environments.

Submitted by Gregory Rigby on

"Massachusetts 911 Outage Caused by Errant Firewall"

"Massachusetts 911 Outage Caused by Errant Firewall"

It has recently been announced that a statewide outage of the 911 emergency response system in Massachusetts this week was caused by an errant firewall that prevented calls from getting to the 911 dispatch centers.  The Massachusetts  Executive Office of Public Safety and Security described the two-hour outage on Tuesday as a “technical issue” with its 911 vendor Comtech that was the result of a firewall installed to provide protection against cyberattacks and hacking.

Submitted by Adam Ekwall on

"Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition"

"Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition"

Google recently announced a Chrome 126 update that contains six security fixes, four of which address high-severity vulnerabilities reported by external researchers.  The first externally reported bug addressed with this update, CVE-2024-6100, is a high-severity type confusion issue in the V8 JavaScript engine.  The second issue addressed is CVE-2024-6101, which was described as an inappropriate implementation in WebAssembly.

Submitted by Adam Ekwall on

"Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks"

"Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks"

Amtrak is starting to notify some customers that their Guest Rewards Accounts have been hacked.  According to Amtrak, no Amtrak systems were compromised in the attacks, as credential stuffing was employed.  During credential stuffing attacks, threat actors leverage username and password combinations obtained from other data breaches, malware infections, or phishing, in an attempt to gain access to accounts that use the same login credentials.  Amtrak noted that they believe the unauthorized party may have obtained login credentials from third-party sources.

Submitted by Adam Ekwall on
Subscribe to