Ivanti has patched two vulnerabilities in its Neurons for IT Service Management (ITSM) product that could allow remote attackers to maintain access to user accounts even after they have been disabled. Additionally, these flaws could enable attackers to access information from other user sessions. This raises serious concerns for organizations using Ivanti's ITSM solutions, as it puts sensitive user data at risk and undermines account security. Companies should ensure they update to the latest versions to mitigate these risks and protect their systems from potential exploitation. The vulnerabilities highlight the need for continuous monitoring and prompt application of security patches in IT management tools.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Congress is preparing to discuss the reauthorization of a contentious foreign surveillance program that allows U.S. intelligence agencies to monitor the communications of non-U.S. citizens. Former President Donald Trump has expressed support for extending this program, arguing it is essential for national security. However, some lawmakers are advocating for stronger privacy protections for American citizens, raising concerns about potential overreach and the impact on civil liberties. The debate reflects growing tensions between security measures and individual privacy rights in the digital age. As this issue unfolds, it could significantly influence how surveillance is conducted and regulated in the U.S.
Hackread – Cybersecurity News, Data Breaches, AI and More
A recent report from Qrator Labs indicates that the largest known DDoS botnet has expanded to encompass 13.5 million devices. This massive botnet is capable of launching Distributed Denial of Service (DDoS) attacks reaching up to 2 terabits per second. The primary target of these attacks has been the financial technology sector, raising concerns for companies in that space. With such a vast number of devices potentially under the control of attackers, the threat to both service availability and data security is significant. Companies in the FinTech sector, as well as other industries relying on online services, need to bolster their defenses to mitigate the risks associated with these powerful DDoS attacks.
Fortinet has addressed serious vulnerabilities in its FortiSandbox product that could allow attackers to bypass authentication and execute arbitrary commands through HTTP requests. These flaws pose a significant risk, as they could lead to unauthorized access and control over affected systems. Users of FortiSandbox should prioritize applying the patches released by Fortinet to protect their environments. The vulnerabilities highlight the ongoing need for vigilance in cybersecurity practices, especially for companies using Fortinet's security solutions. Timely updates and patches are crucial in preventing potential exploitation of these weaknesses.
Infosecurity Magazine
Researchers at Barracuda have reported a significant increase in brute-force attacks originating from the Middle East, with a startling 88% of such attempts occurring in the region during the first quarter of the year. This surge raises concerns for organizations that may be targeted, especially those with weak password policies or inadequate security measures. Brute-force attacks involve systematically trying various password combinations to gain unauthorized access to accounts, which can lead to data breaches and financial losses. Companies in sectors like finance, healthcare, and e-commerce should take this trend seriously and reinforce their security protocols to protect sensitive information. Implementing stronger password requirements and two-factor authentication are crucial steps to mitigate these risks.
Help Net Security
Raspberry Pi OS 6.2, which is based on the Trixie version, has made a significant change by disabling passwordless sudo for new installations. This adjustment aims to enhance security and reduce the risk of unauthorized access. While passwordless sudo can be convenient for users, it also poses a security risk that can be exploited by attackers. The Raspberry Pi Foundation continues to review the operating system's security measures to strike a balance between usability and protection. Users installing the latest version will now be required to enter a password when using sudo commands, which adds a layer of security against potential threats.
Researchers have identified two high-severity vulnerabilities in PHP Composer, a tool widely used by developers to manage PHP libraries. These flaws could allow attackers to execute arbitrary commands by exploiting malicious repository configurations and specially crafted inputs, particularly affecting those using Perforce version control system. This is concerning for developers who rely on Composer to securely manage their dependencies, as the vulnerabilities could lead to unauthorized access or control over systems. Immediate action is necessary to protect applications that depend on this tool, especially since the risks associated with such command execution can be severe. Developers are advised to review their configurations and stay updated on any patches released to address these vulnerabilities.
OpenAI is enhancing its cybersecurity efforts by expanding its Trusted Access for Cyber (TAC) program, which now aims to provide thousands of verified cybersecurity professionals with prioritized access to advanced AI tools. This expansion includes the introduction of GPT-5.4-Cyber, a specialized version of their AI designed to assist in identifying and addressing vulnerabilities in critical software. The initiative focuses on empowering defenders who are responsible for protecting software systems from potential attacks. By equipping these professionals with better resources, OpenAI hopes to improve the speed and effectiveness of vulnerability management. This move is significant as it addresses the ongoing challenge of staying ahead of attackers in the cybersecurity landscape.
The Cloud Security Alliance has issued a warning about a significant change in how quickly vulnerabilities can be exploited. Researchers are particularly concerned about Anthropic’s Claude Mythos, an AI system capable of autonomously identifying thousands of zero-day vulnerabilities in popular operating systems and web browsers. It doesn't just find these flaws; it also creates working exploits without any human intervention. This rapid pace of exploit development poses a challenge for organizations that rely on traditional patch cycles, as the time to fix vulnerabilities is shrinking. Companies will need to adapt their security strategies to keep up with this evolving threat landscape.
SCM feed for Latest
The Office of Personnel Management (OPM) in the United States is actively recruiting cybersecurity specialists to bolster security across various federal agencies. This initiative is part of the US Tech Force program, which aims to enhance the government’s cybersecurity capabilities amid increasing threats. The hiring effort underscores the ongoing need for skilled professionals in the face of persistent cyber challenges that affect national security and the protection of sensitive data. By expanding its workforce in this critical area, OPM is taking steps to better defend against potential cyberattacks that could target federal infrastructure. This move is particularly relevant as agencies seek to improve their defenses and respond more effectively to evolving cybersecurity threats.
SCM feed for Latest
Mercor, an AI staffing company, is currently dealing with multiple class-action lawsuits stemming from a security breach linked to the LiteLLM open-source AI platform. The breach reportedly compromised Mercor’s systems, leading to allegations of damages against the company. At least four lawsuits have been filed, highlighting the potential legal and financial repercussions for Mercor as it navigates the fallout from this incident. This situation raises concerns not only about the security of AI platforms but also about how companies manage and protect sensitive information in the face of vulnerabilities. The outcome of these lawsuits could set important precedents for accountability in the tech industry.
SCM feed for Latest
APT37, a North Korean state-sponsored hacking group, has launched a new social engineering campaign aimed at Facebook users. This operation utilizes the RokRAT trojan, which allows attackers to gain access to victims' devices and sensitive information. The campaign is multi-faceted, indicating a sophisticated approach to trick users into downloading the malware. This is particularly concerning as it targets a widely-used platform, potentially affecting millions of users. As cyber threats continue to evolve, individuals and organizations must remain vigilant about the security of their online activities and the links they interact with.
BleepingComputer
Kraken, a major cryptocurrency exchange, is facing extortion threats from a cybercrime group that claims to have gained access to sensitive internal systems. The attackers are demanding ransom, threatening to release videos that allegedly demonstrate how they accessed client data. This incident raises serious concerns about the security of client information and the overall integrity of the exchange. Kraken has not disclosed the extent of the breach or how the hackers gained access, but the situation puts pressure on the company to bolster its security measures and protect its users. The threat of exposing internal operations is particularly alarming for any organization, especially in the cryptocurrency sector where trust is paramount.
The article discusses the challenges posed by EDR killers, which utilize a technique called bring-your-own-vulnerable-driver (BYOVD) to bypass Endpoint Detection and Response (EDR) systems. These attackers exploit vulnerabilities in drivers that are already present on a victim's system, making it difficult for security measures to detect their activities. The article emphasizes the need for stronger defenses against these types of attacks, as they can compromise sensitive systems and data. Organizations must be aware of this tactic and take proactive measures to protect their environments from potential exploitation.
A Space Force official has stated that artificial intelligence is changing the way the military branch approaches cyber compliance. The acting Chief Information Security Officer (CISO) noted that AI is moving the compliance process away from merely checking boxes to a more dynamic and meaningful assessment. This shift aims to improve how the Space Force measures cybersecurity standards and tracks adherence to them. By incorporating AI, the service hopes to enhance its ability to respond to cyber threats and manage compliance more effectively. This development is significant as it reflects a broader trend in military and government sectors to utilize advanced technologies for better security practices.