"New FASTCash Malware Linux Variant Helps Steal Money From ATMs"

"New FASTCash Malware Linux Variant Helps Steal Money From ATMs"

North Korean hackers are infecting financial institutions' payment switch systems with a new Linux variant of "FASTCash" to withdraw cash. FASTCash previously targeted Windows and IBM AIX (Unix) systems, but security researcher "HaxRob" found a Linux variant that targets Ubuntu 22.04 LTS distributions.

Submitted by Gregory Rigby on

"Organizations Slow to Protect Doors Against Hackers: Researcher"

"Organizations Slow to Protect Doors Against Hackers: Researcher"

Shawn Merdinger, a cybersecurity researcher, found that many organizations whose door access controllers he analyzed failed to protect them from hacker attacks. He showed how S2 Security door access controllers used by schools, hospitals, and other organizations could have been remotely hacked in 2010. Years later, he started a cybersecurity research project to show that physical access control vulnerabilities still affect many organizations.

Submitted by Gregory Rigby on

"Volkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theft"

"Volkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theft"

The Volkswagen Group has recently made a public statement after a known ransomware group claimed to have stolen valuable information from the carmaker's systems.  The spokesperson says that this incident is known but added that the IT infrastructure of the Volkswagen Group is not affected.  The Volkswagen Group owns car brands such as Volkswagen, Skoda, Seat, Audi, Lamborghini, Porsche, Cupra, and Bentley. The company has not shared any other information on the cyberattack.

Submitted by Adam Ekwall on

"GitHub Patches Critical Vulnerability in Enterprise Server"

"GitHub Patches Critical Vulnerability in Enterprise Server"

Code hosting platform GitHub has recently released patches for a critical severity vulnerability in the GitHub Enterprise Server that could lead to unauthorized access to affected instances.  The vulnerability is tracked as CVE-2024-9487 (CVSS score of 9.5), and was introduced in May 2024 as part of the remediations released for CVE-2024-4985, a critical authentication bypass defect allowing attackers to forge SAML responses and gain administrative access to the Enterprise Server.

Submitted by Adam Ekwall on

"Critical Vulnerability Patched in 101 Releases of WordPress Plugin Jetpack"

"Critical Vulnerability Patched in 101 Releases of WordPress Plugin Jetpack"

Automattic recently announced patches for 101 versions of the popular WordPress security plugin Jetpack to resolve a critical severity vulnerability introduced in 2016.  The bug, which was discovered internally and does not have a CVE identifier yet, was introduced in Jetpack version 3.9.9 and affects all subsequent releases.  The company noted that during an internal security audit, they found a vulnerability with the Contact Form feature in Jetpack ever since version 3.9.9, released in 2016.

Submitted by Adam Ekwall on

"Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities"

"Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities"

Splunk recently announced fixes for 11 vulnerabilities in Splunk Enterprise, two of which are high-severity bugs leading to remote code execution on Windows systems.  Splunk noted that the most severe of the flaws is CVE-2024-45733 (CVSS score of 8.8), an insecure session storage configuration issue that could allow a user without "admin" or "power" Splunk roles to execute code remotely.  According to Splunk, only instances running on Windows machines are affected by this vulnerability.  Instances that do not run Splunk Web are not impacted either.

Submitted by Adam Ekwall on

"Skills Shortages Now a Top-Two Security Risk for SMBs"

"Skills Shortages Now a Top-Two Security Risk for SMBs"

According to a new study by Sophos, a shortage of cybersecurity expertise and capacity in global SMBs is fueling talent burnout and creating new opportunities for threat actors.

Submitted by Adam Ekwall on

"Eight Million Users Install 200+ Malicious Apps from Google Play"

"Eight Million Users Install 200+ Malicious Apps from Google Play"

Between June 2023 and April 2024, security researchers at Zscaler discovered over 200 malicious apps on Google Play, which is nominally a safer platform for Android downloads than third-party app stores.  These apps collectively garnered more than eight million installs.  The researchers noted that Joker was the most prolific malware, accounting for nearly two-fifths (38%) of malicious apps identified by Zscaler. Joker enables Wireless Application Protocol (WAP) fraud, by covertly subscribing victims to premium-rate services without their consent.

Submitted by Adam Ekwall on

"Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open Source Ecosystems"

"Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open Source Ecosystems"

Researchers at Checkmarx have discovered that threat actors could abuse entry points across PyPI, npm, Ruby Gems, and other programming ecosystems to stage software supply chain attacks. The researchers warned that attackers could use these entry points to execute malicious code when specific commands are run, putting the open source landscape at significant risk. Entry point attacks enable threat actors to sneakily and persistently compromise systems without triggering traditional security defenses.

Submitted by Gregory Rigby on

"Georgia Tech's New Tool Can Detect Malware on Android Phones"

"Georgia Tech's New Tool Can Detect Malware on Android Phones"

Researchers at the Georgia Institute of Technology (Georgia Tech) have developed a new tool named "Detector of Victim-specific Accessibility" (DVa) to check for malware on Android phones. DVa runs on the cloud, checking the phone for malware, then producing a report for the user that outlines which apps are malware and how to remove them. Smartphones are accessible to people with disabilities because of the implementation of screen readers, voice-to-text, and other features. However, these features also make phones more hackable.

Submitted by Gregory Rigby on
Subscribe to