"Phishing Campaign Targeted US Executives Exploiting a Flaw in Indeed Job Search Platform"

"Phishing Campaign Targeted US Executives Exploiting a Flaw in Indeed Job Search Platform"

According to Menlo Security researchers, threat actors have used an open redirection vulnerability contained by the Indeed job search platform to carry out phishing attacks. The phishing attacks targeted senior executives in banking, finance, insurance, real estate, manufacturing, and other industries. The campaign was observed between July and August, with threat actors using the phishing kit known as EvilProxy. EvilProxy actors use Reverse Proxy and Cookie Injection to circumvent two-factor authentication (2FA).

Submitted by grigby1 CPVI on

"ChatGPT 'Not a Reliable' Tool for Detecting Vulnerabilities in Developed Code"

"ChatGPT 'Not a Reliable' Tool for Detecting Vulnerabilities in Developed Code"

According to a new report by NCC Group that examines various Artificial Intelligence (AI) cybersecurity use cases, generative AI, particularly ChatGPT, should not be considered a reliable resource for detecting vulnerabilities in developed code without human expert oversight. However, Machine Learning (ML) models show significant promise for helping detect zero-day attacks.

Submitted by grigby1 CPVI on

"Qualcomm Patches 3 Zero-Days Reported by Google"

"Qualcomm Patches 3 Zero-Days Reported by Google"

US chip giant Qualcomm recently announced patches for over two dozen product vulnerabilities, including three zero-days reported by Google cybersecurity units.  Qualcomm learned from Google's Threat Analysis Group and Google Project Zero that flaws tracked as CVE-2023-33106, CVE-2023-33107, CVE-2023-33063, and CVE-2022-22071 "may be under limited, targeted exploitation." No information has been shared on the attacks exploiting these vulnerabilities, but the fact that they were reported by Google suggests that they may have been exploited by commercial spyware vendors.

 

Submitted by Adam Ekwall on

"NSA and ESF Partners Release Report on MFA and SSO Challenges"

"NSA and ESF Partners Release Report on MFA and SSO Challenges"

The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have released a Cybersecurity Technical Report (CTR) titled "Developer and Vendor Challenges to Identity and Access Management" to provide multi-factor authentication (MFA) and single sign-on (SSO) technology developers and vendors with actionable recommendations to address major challenges with their products.

Submitted by grigby1 CPVI on

"Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain Attack"

"Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain Attack"

The discovery of a new deceptive package hidden within the npm package registry that deploys the open-source rootkit r77 marks the first time a malicious package has provided rootkit functionality. The package is node-hide-console-windows, and it imitates the legitimate npm package node-hide-console-window as part of a typosquatting campaign. It was downloaded 704 times in the previous two months before being removed. According to ReversingLabs, which detected the activity in August 2023, the package downloaded a Discord bot that facilitated the planting of the open-source rootkit r77.

Submitted by grigby1 CPVI on

"New 'Looney Tunables' Linux Bug Gives Root on Major Distros"

"New 'Looney Tunables' Linux Bug Gives Root on Major Distros"

By exploiting a buffer overflow flaw in the GNU C Library's (glibc) ld.so dynamic loader, a newly discovered Linux vulnerability called Looney Tunables allows local attackers to gain root privileges. The glibc is present in most Linux kernel-based systems, providing essential functionality, including system calls such as open, malloc, printf, and exit, required for the execution of a program. The dynamic loader within glibc is responsible for program preparation and execution on Linux systems that use glibc.

Submitted by grigby1 CPVI on

"Fast-Growing Dropbox Campaign Steals Microsoft SharePoint Credentials"

"Fast-Growing Dropbox Campaign Steals Microsoft SharePoint Credentials"

Threat actors in a Business Email Compromise (BEC) campaign are using Dropbox messages to steal Microsoft user credentials. The campaign bypasses security scans based on Natural Language Processing (NLP) and shows how fast these types of attacks evolve. In the first two weeks of September alone, researchers at Check Point Harmony observed over 5,000 attacks where fake login pages directed victims to a credential-harvesting site.

Submitted by grigby1 CPVI on

"Factors Leading to Organizations Losing Control Over IT and Security Environments"

"Factors Leading to Organizations Losing Control Over IT and Security Environments"

According to Cloudflare, organizations are facing a growing need to connect everything in their business while trying to maintain control over their security, productivity, and competitive growth. Over the past several years, organizations worldwide have seen a significant increase in adopting more Software-as-a-Service (SaaS)-based applications to help teams operate in a hybrid work environment efficiently and collaboratively.

Submitted by grigby1 CPVI on

"Police Issue Quishing Email Warning"

"Police Issue Quishing Email Warning"

Police in Northern Ireland have recently warned organizations in the province to be on their guard after issuing a new Crime Prevention Notice on “quishing,” or phishing via QR code.  QR phishing, or quishing, has a similar end goal to regular scam emails, which are designed to trick the victim into handing over their credentials/personal information or unwittingly installing malware.  The police noted that the victim typically receives an unsolicited email, but this time containing a PDF or PNG image of a QR code.

Submitted by Adam Ekwall on

"Lyca Mobile Services Significantly Disrupted by Cyberattack"

"Lyca Mobile Services Significantly Disrupted by Cyberattack"

International mobile virtual network operator Lyca Mobile has recently confirmed that its services were significantly disrupted due to a cyberattack that may have also resulted in a data breach.   The company noted that the attack, which started late last week, prevented customers and retailers from accessing top-ups and also impacted national and international calling. Lyca Mobile, which claims to have more than 16 million customers, is based in the UK and operates across 60 countries.

Submitted by Adam Ekwall on
Subscribe to