"Hackers Use Malware to Hunt Software Vulnerabilities"

"Hackers Use Malware to Hunt Software Vulnerabilities"

Many threat actors are using malware to scan software vulnerabilities that they can exploit in future cyberattacks. According to security researchers at Palo Alto Networks' Unit 42, there was a large number of malware-initiated scans among the scanning attacks they detected in 2023. Vulnerability scanning is a common reconnaissance step for malicious actors planning to launch cyberattacks. Similar to port scanning and Operating System (OS) fingerprinting, vulnerability scanning initiates network requests to exploit the target hosts' potential vulnerabilities.

Submitted by Gregory Rigby on

"Vietnamese Cybercrime Group CoralRaider Nets Financial Data"

"Vietnamese Cybercrime Group CoralRaider Nets Financial Data"

A new Vietnam-connected cybercrime group called "CoralRaider" has targeted individuals and organizations in Asia, stealing social media account information and user data. CoralRaider, which first emerged in late 2023, mainly uses social engineering techniques and legitimate services to exfiltrate data. The group creates custom tools for loading malware onto victim systems. However, according to a new analysis by researchers with Cisco's Talos threat intelligence group, the group has made some mistakes, such as inadvertently infecting their own systems and exposing their activities.

Submitted by Gregory Rigby on

"Over 90,000 D-Link NAS Devices Are Under Attack"

"Over 90,000 D-Link NAS Devices Are Under Attack"

Network attached storage (NAS) vendor D-Link has recently urged users of end-of-life (EOL) products to retire and replace them, after news emerged of mass exploitation of legacy kit via a newly discovered vulnerability.  A security researcher who calls himself "netsecfish" published details of the vulnerability, which affects various D-Link NAS devices, on March 26.

Submitted by Adam Ekwall on

"Over 90,000 LG Smart TVs May Be Exposed to Remote Attacks"

"Over 90,000 LG Smart TVs May Be Exposed to Remote Attacks"

Bitdefender has discovered four vulnerabilities affecting multiple versions of WebOS, the operating system used in LG smart TVs. The flaws enable unauthorized access and control over the impacted models. They allow authorization bypasses, privilege escalation, and command injection. Possible attacks are based on the ability to create arbitrary accounts on the device using a service that runs on ports 3000/3001.

Submitted by Gregory Rigby on

"10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet"

"10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet"

"RUBYCARP," a threat group with suspected Romanian origins, has been observed operating a long-running botnet for cryptocurrency mining, Distributed Denial-of-Service (DDoS), and phishing attacks. According to Sysdig, the group has been active for at least ten years and uses the botnet for financial gain. Its main mode of operation is a botnet launched through various public exploits and brute-force attacks.

Submitted by Gregory Rigby on

"Second Ransomware Group Extorting Change Healthcare"

"Second Ransomware Group Extorting Change Healthcare"

It has recently been revealed that one month after paying cybercriminals to prevent the public release of data stolen in a February 2024 ransomware attack, Change Healthcare is being extorted again by a different cybercrime group.  Change Healthcare, a subsidiary of health insurance and services company UnitedHealth Group processes billions of healthcare transactions each year, and the ransomware attack crippled the healthcare system throughout the US.

Submitted by Adam Ekwall on

"DOJ-Collected Information Exposed in Data Breach Affecting 340,000"

"DOJ-Collected Information Exposed in Data Breach Affecting 340,000"

Economic analysis and litigation support firm Greylock McKinnon Associates, Inc. (GMA) recently started notifying over 340,000 individuals that their personal and medical information was compromised in a year-old data breach.  The incident was detected on May 30, 2023, but it took the firm roughly eight months to investigate and determine what type of information was compromised and to identify the impacted individuals.  The company noted that both personal and Medicare information was compromised in the data breach.

Submitted by Adam Ekwall on

"Protecting Art and Passwords With Biochemistry"

"Protecting Art and Passwords With Biochemistry"

ETH Zurich researchers have presented a secure one-way cryptographic function that differs from current methods. Instead of processing data using arithmetic operations, it is stored as a sequence of nucleotides, the chemical building blocks of DNA. Some experts believe that Q-Day will arrive within the next ten years. When this day comes, quantum computers will be so powerful that they can crack today's passwords. Password checks are based on the use of cryptographic one-way functions that calculate an output value from an input value.

Submitted by Gregory Rigby on

"22% of Employees Admit to Breaching Company Rules With GenAI"

"22% of Employees Admit to Breaching Company Rules With GenAI"

According to 1Password, disruptive technologies such as Artificial Intelligence (AI) have exacerbated the tension between organizational security and employee productivity. Information Technology (IT) and security teams are struggling to keep up, even as their organizations face new challenges in a landscape constantly reshaped by rising cyber threats and disruptive technologies.

Submitted by Gregory Rigby on
Subscribe to