Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Ivanti has patched two vulnerabilities in its Neurons for IT Service Management (ITSM) product that could allow remote attackers to maintain access to user accounts even after they have been disabled. Additionally, these flaws could enable attackers to access information from other user sessions. This raises serious concerns for organizations using Ivanti's ITSM solutions, as it puts sensitive user data at risk and undermines account security. Companies should ensure they update to the latest versions to mitigate these risks and protect their systems from potential exploitation. The vulnerabilities highlight the need for continuous monitoring and prompt application of security patches in IT management tools.

Impact: Ivanti Neurons for ITSM
Remediation: Users are advised to update to the latest version of Ivanti Neurons for ITSM to address these vulnerabilities.
Read Original

Congress is preparing to discuss the reauthorization of a contentious foreign surveillance program that allows U.S. intelligence agencies to monitor the communications of non-U.S. citizens. Former President Donald Trump has expressed support for extending this program, arguing it is essential for national security. However, some lawmakers are advocating for stronger privacy protections for American citizens, raising concerns about potential overreach and the impact on civil liberties. The debate reflects growing tensions between security measures and individual privacy rights in the digital age. As this issue unfolds, it could significantly influence how surveillance is conducted and regulated in the U.S.

Impact: N/A
Remediation: N/A
Read Original
13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent report from Qrator Labs indicates that the largest known DDoS botnet has expanded to encompass 13.5 million devices. This massive botnet is capable of launching Distributed Denial of Service (DDoS) attacks reaching up to 2 terabits per second. The primary target of these attacks has been the financial technology sector, raising concerns for companies in that space. With such a vast number of devices potentially under the control of attackers, the threat to both service availability and data security is significant. Companies in the FinTech sector, as well as other industries relying on online services, need to bolster their defenses to mitigate the risks associated with these powerful DDoS attacks.

Impact: FinTech companies and online services reliant on uninterrupted access.
Remediation: Companies should implement advanced DDoS protection measures and traffic filtering solutions.
Read Original

Fortinet has addressed serious vulnerabilities in its FortiSandbox product that could allow attackers to bypass authentication and execute arbitrary commands through HTTP requests. These flaws pose a significant risk, as they could lead to unauthorized access and control over affected systems. Users of FortiSandbox should prioritize applying the patches released by Fortinet to protect their environments. The vulnerabilities highlight the ongoing need for vigilance in cybersecurity practices, especially for companies using Fortinet's security solutions. Timely updates and patches are crucial in preventing potential exploitation of these weaknesses.

Impact: FortiSandbox
Remediation: Fortinet has released patches to address the vulnerabilities. Users are advised to update their FortiSandbox installations with the latest versions.
Read Original

Researchers at Barracuda have reported a significant increase in brute-force attacks originating from the Middle East, with a startling 88% of such attempts occurring in the region during the first quarter of the year. This surge raises concerns for organizations that may be targeted, especially those with weak password policies or inadequate security measures. Brute-force attacks involve systematically trying various password combinations to gain unauthorized access to accounts, which can lead to data breaches and financial losses. Companies in sectors like finance, healthcare, and e-commerce should take this trend seriously and reinforce their security protocols to protect sensitive information. Implementing stronger password requirements and two-factor authentication are crucial steps to mitigate these risks.

Impact: N/A
Remediation: Companies should implement stronger password policies and enable two-factor authentication.
Read Original

Raspberry Pi OS 6.2, which is based on the Trixie version, has made a significant change by disabling passwordless sudo for new installations. This adjustment aims to enhance security and reduce the risk of unauthorized access. While passwordless sudo can be convenient for users, it also poses a security risk that can be exploited by attackers. The Raspberry Pi Foundation continues to review the operating system's security measures to strike a balance between usability and protection. Users installing the latest version will now be required to enter a password when using sudo commands, which adds a layer of security against potential threats.

Impact: Raspberry Pi OS 6.2
Remediation: New installations of Raspberry Pi OS 6.2 will have passwordless sudo disabled by default.
Read Original

Researchers have identified two high-severity vulnerabilities in PHP Composer, a tool widely used by developers to manage PHP libraries. These flaws could allow attackers to execute arbitrary commands by exploiting malicious repository configurations and specially crafted inputs, particularly affecting those using Perforce version control system. This is concerning for developers who rely on Composer to securely manage their dependencies, as the vulnerabilities could lead to unauthorized access or control over systems. Immediate action is necessary to protect applications that depend on this tool, especially since the risks associated with such command execution can be severe. Developers are advised to review their configurations and stay updated on any patches released to address these vulnerabilities.

Impact: PHP Composer, Perforce VCS
Remediation: Developers should review their repository configurations and apply any patches or updates released by PHP Composer and Perforce.
Read Original

OpenAI is enhancing its cybersecurity efforts by expanding its Trusted Access for Cyber (TAC) program, which now aims to provide thousands of verified cybersecurity professionals with prioritized access to advanced AI tools. This expansion includes the introduction of GPT-5.4-Cyber, a specialized version of their AI designed to assist in identifying and addressing vulnerabilities in critical software. The initiative focuses on empowering defenders who are responsible for protecting software systems from potential attacks. By equipping these professionals with better resources, OpenAI hopes to improve the speed and effectiveness of vulnerability management. This move is significant as it addresses the ongoing challenge of staying ahead of attackers in the cybersecurity landscape.

Impact: Critical software systems and applications
Remediation: N/A
Read Original

The Cloud Security Alliance has issued a warning about a significant change in how quickly vulnerabilities can be exploited. Researchers are particularly concerned about Anthropic’s Claude Mythos, an AI system capable of autonomously identifying thousands of zero-day vulnerabilities in popular operating systems and web browsers. It doesn't just find these flaws; it also creates working exploits without any human intervention. This rapid pace of exploit development poses a challenge for organizations that rely on traditional patch cycles, as the time to fix vulnerabilities is shrinking. Companies will need to adapt their security strategies to keep up with this evolving threat landscape.

Impact: Major operating systems and web browsers
Remediation: Organizations should review and update their patch management processes to address vulnerabilities more swiftly.
Read Original

The Office of Personnel Management (OPM) in the United States is actively recruiting cybersecurity specialists to bolster security across various federal agencies. This initiative is part of the US Tech Force program, which aims to enhance the government’s cybersecurity capabilities amid increasing threats. The hiring effort underscores the ongoing need for skilled professionals in the face of persistent cyber challenges that affect national security and the protection of sensitive data. By expanding its workforce in this critical area, OPM is taking steps to better defend against potential cyberattacks that could target federal infrastructure. This move is particularly relevant as agencies seek to improve their defenses and respond more effectively to evolving cybersecurity threats.

Impact: Federal agencies in the United States
Remediation: N/A
Read Original
Actively Exploited

Mercor, an AI staffing company, is currently dealing with multiple class-action lawsuits stemming from a security breach linked to the LiteLLM open-source AI platform. The breach reportedly compromised Mercor’s systems, leading to allegations of damages against the company. At least four lawsuits have been filed, highlighting the potential legal and financial repercussions for Mercor as it navigates the fallout from this incident. This situation raises concerns not only about the security of AI platforms but also about how companies manage and protect sensitive information in the face of vulnerabilities. The outcome of these lawsuits could set important precedents for accountability in the tech industry.

Impact: Mercor systems, LiteLLM platform
Remediation: N/A
Read Original

APT37, a North Korean state-sponsored hacking group, has launched a new social engineering campaign aimed at Facebook users. This operation utilizes the RokRAT trojan, which allows attackers to gain access to victims' devices and sensitive information. The campaign is multi-faceted, indicating a sophisticated approach to trick users into downloading the malware. This is particularly concerning as it targets a widely-used platform, potentially affecting millions of users. As cyber threats continue to evolve, individuals and organizations must remain vigilant about the security of their online activities and the links they interact with.

Impact: Facebook users, RokRAT trojan
Remediation: Users should be cautious of unsolicited messages and links, enable two-factor authentication on their accounts, and regularly update their security software.
Read Original

Kraken, a major cryptocurrency exchange, is facing extortion threats from a cybercrime group that claims to have gained access to sensitive internal systems. The attackers are demanding ransom, threatening to release videos that allegedly demonstrate how they accessed client data. This incident raises serious concerns about the security of client information and the overall integrity of the exchange. Kraken has not disclosed the extent of the breach or how the hackers gained access, but the situation puts pressure on the company to bolster its security measures and protect its users. The threat of exposing internal operations is particularly alarming for any organization, especially in the cryptocurrency sector where trust is paramount.

Impact: Kraken cryptocurrency exchange, client data systems
Remediation: Strengthen internal security measures, conduct a thorough security audit, and educate staff on security protocols. Specific steps not provided.
Read Original

The article discusses the challenges posed by EDR killers, which utilize a technique called bring-your-own-vulnerable-driver (BYOVD) to bypass Endpoint Detection and Response (EDR) systems. These attackers exploit vulnerabilities in drivers that are already present on a victim's system, making it difficult for security measures to detect their activities. The article emphasizes the need for stronger defenses against these types of attacks, as they can compromise sensitive systems and data. Organizations must be aware of this tactic and take proactive measures to protect their environments from potential exploitation.

Impact: EDR systems, vulnerable drivers
Remediation: Implement stronger security measures for driver validation and monitoring, conduct regular audits of installed drivers
Read Original

A Space Force official has stated that artificial intelligence is changing the way the military branch approaches cyber compliance. The acting Chief Information Security Officer (CISO) noted that AI is moving the compliance process away from merely checking boxes to a more dynamic and meaningful assessment. This shift aims to improve how the Space Force measures cybersecurity standards and tracks adherence to them. By incorporating AI, the service hopes to enhance its ability to respond to cyber threats and manage compliance more effectively. This development is significant as it reflects a broader trend in military and government sectors to utilize advanced technologies for better security practices.

Impact: N/A
Remediation: N/A
Read Original
PreviousPage 5 of 158Next