"86% of Firms Identify Unknown Cyber-Risks as Top Concern"

"86% of Firms Identify Unknown Cyber-Risks as Top Concern"

Eighty-six percent of firms say unknown organizational cyber risks are a top concern, according to the "Critical Start 2024 Cyber Risk Landscape Peer Report." The report found that 66 percent of businesses have limited insight into their cyber risk profiles. Sixty-five percent of executives are concerned about cybersecurity investments and organizational risk reduction priorities not aligning. Eighty-three percent of cybersecurity professionals reported facing a cyber breach that required attention despite implementing traditional threat-based detection and response measures.

Submitted by grigby1 CPVI on

"Chinese Hackers Compromised an ISP to Deliver Malicious Software Updates"

"Chinese Hackers Compromised an ISP to Deliver Malicious Software Updates"

According to researchers at Volexity, the Advanced Persistent Threat (APT) group "StormBamboo" compromised an Internet Service Provider (ISP) to poison Domain Name System (DNS) queries and deliver malware to organizations. The Chinese-speaking cyber espionage threat actor, also known as "Evasive Panda" and "StormCloud," typically compromises third parties to breach targets. This article continues to discuss StormBamboo's compromise of an ISP to deliver malicious software updates.

Submitted by grigby1 CPVI on

"New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous"

"New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous"

Researchers from the Graz University of Technology have published a paper on "SLUBStick," a new Linux kernel exploitation technique that makes heap vulnerabilities increasingly dangerous. The team pointed out that Linux kernel flaws have increased in recent years, but many have limited impact. The researchers showed that the new SLUBStick technique can elevate a limited heap vulnerability to an arbitrary memory read/write primitive, enabling privilege escalation and container escapes even with the implementation of modern defenses.

Submitted by grigby1 CPVI on

"Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"

"Attacks on Bytecode Interpreters Conceal Malicious Injection Activity"

According to a team of researchers from the University of Tokyo and NTT Security, attackers can conceal their malicious injection activity by inserting commands into the machine code stored in memory by the software interpreters that many programming languages use. Interpreters translate each line of human-readable software code into bytecode. The researchers successfully inserted malicious instructions into the bytecode stored in memory before execution. Since most security software does not scan bytecode, their changes went undetected.

Submitted by grigby1 CPVI on

"Cloudflare Tunnels Abused for Malware Delivery"

"Cloudflare Tunnels Abused for Malware Delivery"

According to Proofpoint, threat actors have been using Cloudflare Tunnels to deliver different Remote Access Trojan (RAT) families. Since February 2024, attackers have abused the TryCloudflare feature to create one-time tunnels without an account in order to distribute "AsyncRAT," "GuLoader," and other RATs. This article continues to discuss threat actors' abuse of Cloudflare's TryCloudflare feature to create one-time tunnels for the distribution of RATs.

Submitted by grigby1 CPVI on

"Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal"

"Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal"

The SANS Internet Storm Center reported that new Mirai botnet variants are targeting the open source Enterprise Resource Planning (ERP) framework OFBiz. The Apache Foundation supports OFBiz, a Java-based framework for creating ERP applications. OFBiz seems less prevalent than commercial alternatives, but like any other ERP system, organizations use it for sensitive business data, making security crucial. This article continues to discuss the targeting of the ERP framework OFBiz by the Mirai botnet.

Submitted by grigby1 CPVI on

"Fake Google Authenticator Ads Lure Users to Download Malware on GitHub"

"Fake Google Authenticator Ads Lure Users to Download Malware on GitHub"

Attackers have been pushing fake ads to lure users into downloading the popular Google Authenticator Multi-Factor Authentication (MFA) app, which actually leads to downloading malware on GitHub. According to Malwarebytes researchers, hosting the malware file on GitHub enables the threat actor to use a trusted cloud resource that is unlikely to get blocked through traditional means. This article continues to discuss attackers luring users to download malware on GitHub through fake Google Authenticator ads.

Submitted by grigby1 CPVI on

"StackExchange Abused to Spread Malicious PyPI Packages as Answers"

"StackExchange Abused to Spread Malicious PyPI Packages as Answers"

According to Checkmarx researchers, threat actors uploaded malicious Python packages to the PyPI repository and promoted them on the online question-and-answer platform StackExchange. The packages download scripts that steal sensitive data from messaging apps, cryptocurrency wallets, and more. The information-stealing malware can also exfiltrate files containing specific keywords, take screenshots, and send all of the data to a Telegram channel. This article continues to discuss hackers' distribution of malicious Python packages through StackExchange.

Submitted by grigby1 CPVI on

"Gaming Industry Faces 94% Surge in DDoS Attacks"

"Gaming Industry Faces 94% Surge in DDoS Attacks"

According to Akamai, layer 7 Distributed Denial-of-Service (DDoS) attacks on the gaming industry have increased 94 percent over the past year. The gaming industry is an attractive target for cybercriminals due to its high revenues and extensive player base. The increase in subscription services, which are important for accessing several new games, introduces vulnerabilities. In addition, the rise in new accounts and transactions is accompanied by increased credential theft and phishing scams.

Submitted by grigby1 CPVI on

"Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain"

"Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain"

According to Picus Security, 40 percent of tested environments enabled attack paths leading to domain admin access. Since domain admin access is the highest level of access within an organization's Information Technology (IT) infrastructure, it is like giving attackers a master key. Based on the analysis of over 136 million cyberattacks simulated by the Picus Security Validation Platform, the company's report shows that, on average, organizations prevent 7 out of 10 attacks.

Submitted by grigby1 CPVI on
Subscribe to