"BlackCat Ransomware Gang Targets Businesses Via Google Ads"

"BlackCat Ransomware Gang Targets Businesses Via Google Ads"

According to security researchers at eSentire’s Threat Response Unit (TRU), the notorious ALPHV/BlackCat ransomware has been observed using Google Ads to distribute malware.  In a new advisory published recently, the researchers said it intercepted and thwarted attempts by ALPHV/BlackCat affiliates to breach a law firm, a manufacturer, and a warehouse provider within the past three weeks.  The new tactic the researchers observed involves using Google Ads promoting popular software like Advanced IP Scanner and Slack, leading business professionals to attacker-controlled websites.

Submitted by Adam Ekwall on

19th International Conference on emerging Networking Experiments and Technologies (CoNEXT)

"CoNEXT 2023 will be a major forum for presentations and discussions of novel networking technologies that will shape the future of Internetworking. The conference is single track and features a high-quality technical program with significant opportunities for individual and small-group technical and social interactions among a diverse set of participants. The CoNEXT conferences focus on stimulating exchanges between various international research communities."

8th ACM/IEEE Symposium on Edge Computing (SEC)

"SEC is a forum for top researchers, engineers, students, entrepreneurs, and government officials come together under one roof to discuss the opportunities and challenges that arise from rethinking cloud computing architectures and embracing edge computing. SEC takes a broad view of edge computing and solicits contributions from many fields of systems practice that embrace any aspect of edge computing."

Topics of interest include, but are not limited to security and privacy.

24th ACM/IFIP International Middleware Conference

"The annual ACM/IFIP Middleware conference is a major forum for the discussion of innovations and recent scientific advances of middleware systems with a focus on the design, implementation, deployment, and evaluation of distributed systems, platforms and architectures for computing, storage, and communication."

Topics of interest include, but are not limited to security and privacy.

ACM-SIAM Symposium on Discrete Algorithms (SODA24)

"This symposium focuses on research topics related to design and analysis of efficient algorithms and data structures for discrete problems. The scope includes theoretical analysis, as well as experimental validation, and the mathematical problems related to their development or limitations. The scope also includes aspects of combinatorics and discrete mathematics related to discrete algorithms."

Topics of interest include, but are not limited to cryptography, security and privacy.

"Hackers Are Exploiting 'CitrixBleed' Bug in the Latest Wave of Mass Cyberattacks"

"Hackers Are Exploiting 'CitrixBleed' Bug in the Latest Wave of Mass Cyberattacks"

According to security researchers, hackers are mass-exploiting CitrixBleed, a critical-rated vulnerability in Citrix NetScaler systems, to launch cyberattacks against top organizations globally. These cyberattacks have targeted the aerospace giant Boeing, the world's largest bank ICBC, one of the world's largest port operators DP World, and the international law firm Allen & Overy. Thousands of other organizations are still unpatched against the vulnerability, tracked as CVE-2023-4966.

Submitted by grigby1 CPVI on

"Crypto Asset Discovery and the Post-Quantum Migration"

"Crypto Asset Discovery and the Post-Quantum Migration"

Quantum computers are expected to break RSA and ECC encryption within the next 7 to 10 years. RSA and ECC are public key encryption algorithms that serve as the foundation for nearly all cybersecurity systems, applications, and protocols. They secure credit card transactions, online banking, medical devices, connected cars, and other systems. Therefore, companies must prepare to ensure they are protected once an adequately advanced quantum computer has been developed.

Submitted by grigby1 CPVI on

"VMware Disclosed a Critical and Unpatched Authentication Bypass Flaw in VMware Cloud Director Appliance"

"VMware Disclosed a Critical and Unpatched Authentication Bypass Flaw in VMware Cloud Director Appliance"

VMware has disclosed an authentication bypass vulnerability in its Cloud Director Appliance, tracked as CVE-2023-34060 with a CVSS score of 9.8, that can be exploited by an attacker with network access to the appliance to bypass login restrictions when authenticating on port 22 (SSH) or port 5480 (Appliance Management Console). This bypass is not present on port 443 (VCD provider and tenant login). It is also not present on a new installation of Cloud Director Appliance 10.5.

Submitted by grigby1 CPVI on

"Pharmacy Provider Truepill Data Breach Hits 2.3 Million Customers"

"Pharmacy Provider Truepill Data Breach Hits 2.3 Million Customers"

Postmeds, a company doing business as Truepill, is sending data breach notifications, informing recipients that threat actors have compromised their sensitive personal information. Truepill is a Business-to-Business (B2B) pharmacy platform that uses Application Programming Interfaces (APIs) to fulfill orders and service delivery for Direct-to-Consumer (D2C) brands, digital health companies, and other healthcare organizations across the US.

Submitted by grigby1 CPVI on

"WP Fastest Cache Plugin Bug Exposes 600K WordPress Sites to Attacks"

"WP Fastest Cache Plugin Bug Exposes 600K WordPress Sites to Attacks"

It has recently been discovered that the WordPress plugin WP Fastest Cache is vulnerable to an SQL injection vulnerability that could allow unauthenticated attackers to read the contents of the site’s database.  WP Fastest Cache is a caching plugin used to speed up page loads, improve visitor experience, and boost the site’s ranking on Google search.  According to WordPress.org stats, it is used by more than a million sites.

Submitted by Adam Ekwall on
Subscribe to