"Mallox Ransomware Deployed Via MS-SQL Honeypot Attack"

"Mallox Ransomware Deployed Via MS-SQL Honeypot Attack"

Cyberattackers launching "Mallox" ransomware, also known as "Fargo," "TargetCompany," and "Mawahelper" have applied sophisticated methods, as shown by a recent Microsoft SQL (MS-SQL) honeypot incident. The Sekoia research team's honeypot was attacked by an intrusion set involving brute-force methods to deploy Mallox via PureCrypter, exploiting MS-SQL vulnerabilities. This article continues to discuss findings regarding the deployment of Mallox ransomware. 

Submitted by Gregory Rigby on

"FBCS Collection Agency Data Breach Impacts 2.7 Million"

"FBCS Collection Agency Data Breach Impacts 2.7 Million"

A recent data breach faced by the Debt collection agency Financial Business and Consumer Solutions (FBCS) compromised the personal information of almost 2.7 million people. In an update to a filing with the Maine Attorney General's Office, FBCS revealed the identification of an additional 724,000 individuals affected by the breach, increasing the estimated impact to 2,679,555 people. This article continues to discuss new findings regarding the FBCS breach.

Submitted by Gregory Rigby on

"Fake Online Stores Scam Over 850,000 Shoppers"

"Fake Online Stores Scam Over 850,000 Shoppers"

Security researchers at Security Research (SR) Labs have warned online shoppers to be on their guard after revealing news of an extensive network of fake e-commerce stores designed to steal victims’ card details and cash. Operated primarily from China, the researchers noted that the BogusBazaar network has processed over one million orders since 2021. The researchers estimated that over 850,000 shoppers have already fallen victim, mostly from Western Europe and the US.

Submitted by Adam Ekwall on

"Millions of IoT Devices at Risk From Integrated Cellular Modem Flaws"

"Millions of IoT Devices at Risk From Integrated Cellular Modem Flaws"

Several vulnerabilities in cellular modem technology impact millions of Internet of Things (IoT) devices in financial services, telecommunications, healthcare, and other sectors. Telit Cinterion modems have Remote Code Execution (RCE) flaws. The most severe is a memory heap overflow vulnerability that lets remote attackers execute arbitrary code via SMS on affected devices. This article continues to discuss the vulnerabilities found in widely deployed Telit Cinterion modems.

Submitted by Gregory Rigby on

"Threat Actor Claims Major Europol Data Breach"

"Threat Actor Claims Major Europol Data Breach"

A well-known threat actor is starting to sell what they claim to be a legitimate trove of highly sensitive internal data stolen from Europol this month. "IntelBroker" recently took to the hacking site BreachForums to advertise their wares. IntelBroker claimed that in May 2024, Europol suffered a data breach that led to the exposure of FOUO and classified data.

Submitted by Adam Ekwall on

"Black Basta Ransomware Victim Count Tops 500"

"Black Basta Ransomware Victim Count Tops 500"

According to a Joint Cybersecurity Advisory (CSA) issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the Black Basta ransomware group and its affiliates compromised hundreds of organizations worldwide between April 2022 and May 2024. The advisory claims that Black Basta attacks have impacted more than 500 organizations in North America, Europe, and Australia.

Submitted by Adam Ekwall on

"New Tool Pinpoints Security Fixes in Open Source Software Updates"

"New Tool Pinpoints Security Fixes in Open Source Software Updates"

Researchers from North Carolina State University have demonstrated a new tool called "VFCFinder" that analyzes open source software updates to determine which sections of code are being modified to address recently identified security vulnerabilities. VFCFinder should help programmers quickly and easily identify security updates needed to prevent vulnerabilities without making unnecessary changes. This article continues to discuss the research and benefits behind the VFCFinder tool.

Submitted by Gregory Rigby on

"'TunnelVision' DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic"

"'TunnelVision' DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic"

Attackers can manipulate routing tables to bypass traffic meant for a Virtual Private Network (VPN) and redirect it to an untrusted local network using a technique called "TunnelVision." It involves the exploitation of a Dynamic Host Configuration Protocol (DHCP) design flaw. According to researchers at the Leviathan Security Group, this technique does not rely on exploiting VPN technologies or underlying protocols. Instead, it works entirely independently of the VPN provider or implementation.

Submitted by Gregory Rigby on

"VR May Pose Privacy Risks for Kids: A New Study Finds Parents Aren't as Worried as They Should Be"

"VR May Pose Privacy Risks for Kids: A New Study Finds Parents Aren't as Worried as They Should Be"

As more children use Virtual Reality (VR) apps, new research suggests that few parents understand VR technologies' security and privacy risks. According to the study, few parents actively address security and privacy issues. North Carolina State University researchers interviewed 20 parents with children under 18 who use VR apps.

Submitted by Gregory Rigby on

"Cornell Tech Launches Security, Trust, and Safety Initiative"

"Cornell Tech Launches Security, Trust, and Safety Initiative"

Cornell Tech's Security, Trust, and Safety (SETS) Initiative will guide new teaching, research, engagement, and entrepreneurial activities aimed at addressing critical problems posed by unsafe digital technologies to societies globally. SETS will delve into topics, including foundational theory on computer security and privacy, as well as emerging threats to online safety. Industry practitioners must understand generative Artificial Intelligence (AI) as a vector for abuse and a way to mitigate it.

Submitted by Gregory Rigby on
Subscribe to