"Vulnerabilities Enable Attackers to Spoof Emails From 20 Million Domains"

"Vulnerabilities Enable Attackers to Spoof Emails From 20 Million Domains"

Researchers have discovered two vulnerabilities that could allow threat actors to abuse hosted email services in order to spoof the sender's identity and evade protections. The identified vulnerabilities impact millions of domains. The CERT Coordination Center (CERT/CC) at Carnegie Mellon University warns that authenticated attackers can spoof the identity of a shared, hosted domain and use network authorization to spoof the email sender. The flaws stem from the failure of many hosted email services in properly verifying trust between the authenticated sender and their allowed domains.

Submitted by Gregory Rigby on

"New PyPI Package Zlibxjson Steals Discord, Browser Data"

"New PyPI Package Zlibxjson Steals Discord, Browser Data"

A malicious package named "zlibxjson version 8.2," has been discovered in the PyPI repository. The package was detected by Fortinet's Artificial Intelligence (AI)-powered OSS malware detection system on July 3, 2024, closely following its release on June 29, 2024. The package downloaded multiple files, including a PyInstaller-packed executable (.exe) that revealed several Python and DLL files when unpacked. This article continues to discuss findings regarding the new malicious PyPI package.

Submitted by Gregory Rigby on

"North Korea-Linked Malware Targets Developers on Windows, Linux, and macOS"

"North Korea-Linked Malware Targets Developers on Windows, Linux, and macOS"

The North Korea-linked "DEV#POPPER" malware campaign targeting software developers has expanded its focus on Windows, Linux, and macOS systems with new malware and tactics. The campaign targeted victims in South Korea, North America, Europe, and the Middle East. Securonix researchers called this attack an advanced form of social engineering that manipulates people into disclosing confidential information or performing actions they would not usually take. This article continues to discuss findings regarding the ongoing DEV#POPPER malware campaign.

Submitted by Gregory Rigby on

"Dynamically Evolving SMS Stealer Threatens Global Android Users"

"Dynamically Evolving SMS Stealer Threatens Global Android Users"

"SMS Stealer" is a novel malware with more than 107,000 samples that has been targeting Android devices for over two years. It steals SMS messages to obtain One-Time Passwords (OTPs) and other sensitive user data. According to researchers at Zimperium zLabs, SMS Stealer spreads through dynamically changing mobile apps distributed via Telegram messages or ads for legitimate apps. This article continues to discuss findings regarding the SMS Stealer malware.  

Submitted by Gregory Rigby on

"Insecure File-Sharing Practices in Healthcare Put Patient Privacy at Risk"

"Insecure File-Sharing Practices in Healthcare Put Patient Privacy at Risk"

Metomic reports that healthcare organizations continue to expose their most sensitive data, putting their business and patients at risk. Twenty-five percent of healthcare organizations' publicly shared files contain Personally Identifiable Information (PII). PII was found in 68 percent of externally shared private files and 77 percent of private files shared internally. Publicly shared files with sensitive data pose the biggest risk for healthcare organizations and highlight the need for data security.

Submitted by Gregory Rigby on

"Hackers Can Now Even Use Your PC's HDMI Cable to Steal Data"

"Hackers Can Now Even Use Your PC's HDMI Cable to Steal Data"

According to researchers at the University of the Republic of Uruguay, hackers can apply Artificial Intelligence (AI) to spy on a user's display by capturing leaked electromagnetic radiation from a PC's HDMI cable. Hackers can carry out the attacks using various methods, such as placing an antenna outside a building to intercept signals from the HDMI cable. Once they have successfully intercepted the data, hackers can take additional steps to gain access to users' sensitive data.

Submitted by Gregory Rigby on

"New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries"

"New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries"

The nation-state threat actor "SideWinder" is behind a new cyber espionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. According to the BlackBerry Research and Intelligence Team, the spear-phishing campaign has targeted Pakistan, Egypt, Sri Lanka, Bangladesh, Myanmar, Nepal, and more. SideWinder, also known as "APT-C-17," "Baby Elephant," "Hardcore Nationalist," "Rattlesnake," and "Razor Tiger," is believed to be linked to India. This article continues to discuss findings regarding the SideWinder spear-phishing campaign.

Submitted by Gregory Rigby on

"New Specula Tool Uses Outlook for Remote Code Execution in Windows"

"New Specula Tool Uses Outlook for Remote Code Execution in Windows"

The new red team post-exploitation framework "Specula," released by the cybersecurity company TrustedSec, uses Microsoft Outlook as a Command-and-Control (C2) beacon for Remote Code Execution (RCE). The C2 framework creates a custom Outlook Home Page using WebView by exploiting an Outlook security feature bypass vulnerability patched in October 2017. This article continues to discuss the new Specula tool.

Submitted by Gregory Rigby on

"Microsoft Says Ransomware Gangs Exploiting Just-Patched VMware ESXi Flaw"

"Microsoft Says Ransomware Gangs Exploiting Just-Patched VMware ESXi Flaw"

According to Microsoft's threat intelligence team, ransomware groups are exploiting a critical vulnerability in ESXi hypervisors to gain full administrative access on domain-joined systems less than a week after VMware shipped patches for the flaw. Multiple ransomware groups have exploited the vulnerability, tracked as CVE-2024-37085 with a CVSS severity score of 6.8, to deploy data-extortion malware on enterprise networks. This article continues to discuss the exploitation of a recently patched VMware ESXi flaw by ransomware groups.

Submitted by Gregory Rigby on

"Average Data Breach Cost Jumps to $4.88 Million, Collateral Damage Increased"

"Average Data Breach Cost Jumps to $4.88 Million, Collateral Damage Increased"

IBM released its annual "Cost of a Data Breach Report," which revealed that the global average cost of a data breach hit $4.88 million in 2024, as breaches become more disruptive and place additional demands on cyber teams. Breach costs increased 10 percent over the previous year, the largest annual increase since the pandemic, with 70 percent of breached organizations reporting significant or very significant disruption. This article continues to discuss key findings from IBM's report regarding data breach costs.

Submitted by Gregory Rigby on
Subscribe to