Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent supply chain attack has targeted four SAP npm packages, embedding malware designed to steal user credentials. This incident is part of a broader campaign known as mini Shai-Hulud, which researchers have linked to a group of attackers aiming to exploit vulnerable software components. Organizations that rely on these SAP packages for their applications could be at risk, as the compromised packages can put sensitive information in jeopardy. Users are advised to review their systems for these packages and take appropriate measures to secure their credentials. The incident highlights ongoing vulnerabilities in software supply chains and the importance of vigilance in software management.

Impact: SAP npm packages
Remediation: Users should review and update their SAP npm packages and implement security practices to monitor for unauthorized access.
Read Original
Story retracted

BleepingComputer

BleepingComputer retracted a recent article about a supposed data breach at Instructure after realizing that the information was incorrect and based on outdated details from a previous incident. This situation highlights the importance of verifying information before publication, especially in the realm of cybersecurity where misinformation can lead to unnecessary panic or confusion. Instructure, a company known for its educational software, was initially thought to be affected by a new breach, but it turns out that the claims were unfounded. The retraction serves as a reminder to both media outlets and users to seek accurate information, as false reports can have significant implications for a company's reputation and user trust.

Impact: Instructure's educational software
Remediation: None specified
Read Original

Cybersecurity researchers have revealed that two cybercrime groups, known as Cordial Spider and Snarky Spider, are conducting fast-paced attacks primarily targeting Software as a Service (SaaS) environments. These groups utilize methods like vishing and Single Sign-On (SSO) abuse to execute their operations, which are designed to steal data while leaving minimal traces. The attacks are characterized by a rapid execution style, making them particularly dangerous for companies relying on SaaS applications. As these threats evolve, organizations need to bolster their security measures to protect against such sophisticated tactics, which can lead to significant data breaches and financial losses. Users and businesses must remain vigilant and implement stronger authentication protocols to mitigate these risks.

Impact: SaaS applications, Single Sign-On systems, user accounts
Remediation: Implement stronger authentication protocols, monitor for unusual account activity, and educate users on recognizing vishing attempts.
Read Original

A card-checking service used by cybercriminals, known as Jerry’s Store, has exposed 345,000 stolen payment card details due to a misconfigured server that was left accessible online. This incident has raised concerns as the exposed information includes sensitive data that can be exploited by other criminals for fraudulent transactions. The leak highlights the vulnerabilities within the infrastructure of illegal services that facilitate carding, putting countless victims at risk of financial loss. Users whose payment information has been compromised should monitor their accounts closely for any unauthorized activity and consider taking steps to protect their financial information. This incident serves as a stark reminder of the importance of securing sensitive data, even in illegitimate operations.

Impact: 345,000 stolen payment cards
Remediation: Users should monitor accounts for unauthorized transactions and consider identity theft protection services.
Read Original

Ryan Goldberg from Georgia and Kevin Martin from Texas have both been sentenced to four years in prison for their involvement with a ransomware gang. These two security experts were found to have assisted the group in their criminal activities, which included targeting various organizations and demanding ransom payments. The case sheds light on the growing issue of insider threats in the cybersecurity field, where individuals with technical knowledge exploit their skills for malicious purposes. Their sentencing serves as a warning to others in the industry about the consequences of engaging with cybercriminals. This incident also raises concerns about trust in security professionals and the ongoing battle against ransomware attacks.

Impact: N/A
Remediation: N/A
Read Original
Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A serious vulnerability has been discovered in cPanel, a popular web hosting control panel, allowing attackers to bypass login credentials and gain root access to servers. This flaw has been actively exploited before any patches were released, putting many web hosting providers and their clients at risk. The vulnerability affects users of cPanel, particularly those running outdated versions of the software. With root access, attackers could manipulate server settings, steal sensitive data, or take the server offline, which could lead to significant operational and financial consequences for affected companies. It is crucial for users to update their systems as soon as patches become available to mitigate these risks.

Impact: cPanel, affected versions not specified
Remediation: Users should apply patches as soon as they are released by cPanel. Additionally, implementing strong access controls and monitoring server logs for unusual activity can help mitigate potential exploitation until patches are available.
Read Original

A researcher from Theori, a security firm, has discovered a nine-year-old vulnerability in the Linux kernel using artificial intelligence tools. This flaw could potentially allow attackers to exploit systems running affected versions of the Linux kernel, putting many users and organizations at risk. The vulnerability's age raises concerns about how long it has gone unnoticed and the implications for systems that rely on Linux for their operations. As Linux is widely used across various platforms, including servers and embedded systems, this discovery highlights the need for ongoing vigilance in software security. Users and administrators are encouraged to review their systems and apply any available patches to mitigate the risk associated with this vulnerability.

Impact: Linux kernel versions affected (specific versions not specified)
Remediation: Users should apply available patches and updates for their Linux kernel.
Read Original

SonicWall has released urgent firmware updates to address three vulnerabilities found in its SonicOS software, which affects Gen 6, Gen 7, and Gen 8 firewalls. These flaws could potentially allow attackers to bypass security controls and gain unauthorized access to restricted services. Users of these firewall models are strongly advised to apply the patches immediately to protect their systems from possible exploitation. The vulnerabilities underscore the importance of keeping security software up to date, as failure to patch could leave networks open to attacks. Companies relying on these firewalls should prioritize this update to safeguard their network environments.

Impact: SonicWall Gen 6, Gen 7, and Gen 8 firewalls running SonicOS
Remediation: Firmware updates have been released; users should apply the latest patches as soon as possible.
Read Original

Two former employees from cybersecurity firms Sygnia and DigitalMint were sentenced to four years in prison for their involvement in BlackCat (ALPHV) ransomware attacks against U.S. companies. These individuals exploited their insider knowledge to facilitate cyberattacks that resulted in significant financial losses for the targeted organizations. The BlackCat ransomware group has gained notoriety for its sophisticated attacks and has been responsible for numerous breaches in recent years. This case underscores the risks posed by insider threats in the cybersecurity landscape, as even trusted employees can engage in malicious activities. The sentences aim to deter similar behavior and reinforce the importance of vigilance within the cybersecurity community.

Impact: U.S. companies targeted by BlackCat ransomware attacks
Remediation: Organizations should enhance their insider threat detection programs and conduct regular audits of employee activities.
Read Original

Dataiku has introduced Kiji Privacy Proxy, an open-source tool designed to protect sensitive customer information when interacting with external AI services. Many organizations send prompts containing personally identifiable information (PII) to large language models without proper sanitization, risking data exposure. Kiji acts as a local gateway, filtering out customer emails, support transcripts, and other identifying data before requests reach APIs like OpenAI and Anthropic. This tool is particularly relevant for enterprise developers who need to ensure customer privacy while still utilizing advanced AI capabilities. By integrating this proxy, companies can better safeguard user data and comply with privacy regulations.

Impact: OpenAI, Anthropic, and other external AI services
Remediation: Implement Kiji Privacy Proxy to sanitize PII before sending requests to external AI APIs.
Read Original

Ukrainian police have arrested three individuals, including a 19-year-old, for allegedly hijacking approximately 610,000 accounts on the popular gaming platform Roblox. The suspects reportedly exploited stolen session cookies, allowing them to bypass traditional password protections and gain unauthorized access to user accounts. This incident underscores the risks associated with session management and the potential for significant breaches in online gaming communities. The large number of affected accounts highlights the need for users to be vigilant about their account security and for platforms like Roblox to strengthen their defenses against such attacks. The situation serves as a reminder of the ongoing challenges in protecting digital identities in an increasingly interconnected world.

Impact: Roblox accounts
Remediation: Users should enable two-factor authentication and monitor their account activity for any unauthorized access. Roblox should enhance security measures related to session management.
Read Original

Ryan Goldberg and Kevin Martin, both former incident responders, have been sentenced to four years in prison for their involvement in a series of ransomware attacks against five companies in 2023. The duo extorted nearly $1.3 million from one of their victims, showcasing a troubling trend where individuals with cybersecurity expertise turn to criminal activities. This case raises concerns about trust within the cybersecurity community and highlights the ongoing risks of ransomware, which continues to threaten businesses across various sectors. The sentencing serves as a reminder that those who exploit their knowledge for malicious purposes will face serious consequences.

Impact: Five companies targeted by ransomware attacks, with one victim extorted for $1.3 million.
Remediation: N/A
Read Original

Sri Lankan officials are investigating the disappearance of a $625,000 payment intended for the U.S. Postal Service. This payment went missing several weeks ago, raising concerns about potential hacking or cyber fraud. Authorities suspect that the incident might be linked to cybersecurity issues, although specific details about how the payment went missing remain unclear. This situation could signify vulnerabilities in the financial transaction processes between countries, potentially impacting international postal services and financial exchanges. The investigation aims to uncover the circumstances surrounding the missing funds and ensure that similar incidents do not occur in the future.

Impact: U.S. Postal Service, Sri Lankan financial systems
Remediation: N/A
Read Original

The European Commission has accused Meta of failing to properly manage the risks associated with children under 13 accessing its platforms, which is a serious concern for child safety online. The allegations suggest that Meta did not effectively identify or address potential dangers for younger users, raising questions about the company's compliance with the Digital Services Act (DSA). This scrutiny comes amid growing concerns about the protection of minors on social media and the responsibilities of tech companies to safeguard this vulnerable group. If found in violation, Meta could face significant penalties and be required to implement stricter safety measures. This situation emphasizes the ongoing debate about how to balance user engagement with the safety of young internet users.

Impact: Meta platforms, specifically services accessible to children under 13.
Remediation: Meta may need to enhance its risk assessment processes and implement stricter safety protocols for underage users.
Read Original
Actively Exploited

Recent research by Cybernews has shown a notable increase in deepfake incidents aimed at U.S. officials, with 156 cases documented over the last two years. These incidents involve the use of manipulated videos or audio to create convincing impersonations of public figures, which can lead to misinformation and potentially harm public trust. The rise in deepfakes poses a significant challenge for cybersecurity and public safety, as they can be used to spread false information or manipulate political discourse. Officials and cybersecurity experts are urging increased awareness and preparedness to combat this growing threat, emphasizing the need for better detection tools and public education on recognizing deepfakes. As these incidents become more frequent, the implications for national security and the integrity of information could be profound.

Impact: U.S. officials, public trust, information integrity
Remediation: Increase awareness and education about deepfakes, develop better detection tools, implement verification processes for media.
Read Original
PreviousPage 7 of 187Next