"PoC for Easily Exploitable Fortra GoAnywhere MFT Vulnerability Released"

"PoC for Easily Exploitable Fortra GoAnywhere MFT Vulnerability Released"

Proof-of-Concept (PoC) exploit code for a critical vulnerability, tracked as CVE-2024-0204, in Fortra's GoAnywhere Managed File Transfer (MFT) solution has been made public, raising concerns that attackers will soon exploit it. Organizations of various sizes widely use Fortra's GoAnywhere MFT solution. In early 2023, the Cl0P ransomware gang used a zero-day vulnerability, tracked as CVE-2023-0669, in the same solution to exfiltrate data from more than 130 victim organizations. Following the exfiltration, the group threatened to publish the data unless they were paid not to.

Submitted by Gregory Rigby on

AI in Automotive Cybersecurity USA 2024 Conference

"As the application of AI in automotive gains momentum, and threat actors become more intelligent, it’s never been more important to prepare for emerging cybersecurity threats as well as understand the risks and opportunities that AI presents.   We have industry professionals from across automotive cybersecurity, artificial intelligence, machine learning, quantum computing, R&D, LLM, innovation and other domains to AI for Automotive Cybersecurity USA 2024 and giving them the opportunity to understand the impact of and prepare for AI in cybersecurity."

"Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters"

"Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters"

Threat actors with a Google account could exploit a loophole impacting Google Kubernetes Engine (GKE) to take over a Kubernetes cluster. The flaw has been dubbed "Sys:All" by the cloud security company Orca. About 250,000 active GKE clusters in the wild are said to be vulnerable to the attack vector. According to security researcher Ofir Yakobi, there is a common misconception that the system:authenticated group in GKE only includes verified and deterministic identities. However, it includes any Google-authenticated account, even those from outside the organization.

Submitted by Gregory Rigby on

"UK Says AI Will Empower Ransomware Over the Next Two Years"

"UK Says AI Will Empower Ransomware Over the Next Two Years"

According to the UK's National Cyber Security Centre (NCSC), Artificial Intelligence (AI) tools will negatively impact cybersecurity in the near future, contributing to the rise of the ransomware threat. Cybercriminals are already using AI for various purposes, and the trend is expected to worsen over the next two years, increasing the volume and severity of attacks. AI will allow inexperienced threat actors, hackers-for-hire, and low-skilled hacktivists to carry out more effective, targeted attacks.

Submitted by Gregory Rigby on

"Magecart Adds Middle East Retailers to Long List of Victims"

"Magecart Adds Middle East Retailers to Long List of Victims"

Retailers in the Middle East and Africa are more vulnerable to web-skimming attacks, but they make up a small fraction of all consumer victims. An independent researcher recently discovered web-skimming code on the staging server of the clothing retail website Khaadi, which is based in Pakistan and the United Arab Emirates. The code was discovered during an investigation into a web-skimming attack on a German football team's website, and an Internet-wide search revealed 1,800 other potentially compromised websites.

Submitted by Gregory Rigby on

"Tesla Hacked, 24 Zero-Days Demoed at Pwn2Own Automotive 2024"

"Tesla Hacked, 24 Zero-Days Demoed at Pwn2Own Automotive 2024"

Security researchers hacked a Tesla Modem and collected awards of $722,500 on the first day of Pwn2Own Automotive 2024 for three bug collisions and 24 unique zero-day exploits.  Synacktiv Team took home $100,000 after successfully chaining three zero-day bugs to get root permissions on a Tesla Modem.  The team also used two unique two-bug chains to hack a Ubiquiti Connect EV Station and a JuiceBox 40 Smart EV Charging Station, earning an additional $120,000.

Submitted by Adam Ekwall on

"Chrome 121 Patches 17 Vulnerabilities"

"Chrome 121 Patches 17 Vulnerabilities"

Google recently announced the promotion of Chrome 121 to the stable channel with patches for 17 vulnerabilities, including 11 reported by external researchers.  Of the externally reported security defects, three have a severity rating of "high." Google says it handed over $30,000 in bug bounty rewards to the reporting researchers.  Google noted that the first high-severity bug that Chrome 121 addresses is a use-after-free issue in WebAudio. Tracked as CVE-2024-0807, the flaw earned the reporting researcher a $11,000 bug bounty.

Submitted by Adam Ekwall on

"340,000 Jason’s Deli Customers Potentially Impacted by Credential Stuffing Attack"

"340,000 Jason’s Deli Customers Potentially Impacted by Credential Stuffing Attack"

Restaurant chain Jason’s Deli just recently started informing customers that their user accounts and personal information might have been compromised in credential stuffing attacks.  Over the weekend, the company, which owns over 200 fast casual restaurants across the United States, began informing customers that attackers have been observed accessing user accounts using login credentials obtained from other data breaches.

Submitted by Adam Ekwall on

"New Research Combats Burgeoning Threat of Deepfake Audio"

"New Research Combats Burgeoning Threat of Deepfake Audio"

A new study by three UC Berkeley School of Information students and alums aims to make it easier to determine the authenticity of an audio clip as deepfakes and doctored audio have become more common. Deepfakes are a type of media, including images, audio, and videos, manipulated or created using Artificial Intelligence (AI). In addition to spreading false information, deepfakes can decrease the effectiveness of security systems. The team explored various techniques for distinguishing a real voice from a cloned one made to impersonate a specific person.

Submitted by Gregory Rigby on
Subscribe to