An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka “Kryptonite Panda”), a state-sponsored Chinese cyber-espionage actor. […]
Evolve Bank says data breach impacts 7.6 million Americans
Evolve Bank & Trust (Evolve) is sending notices of a data breach to 7.6 million Americans whose data was stolen during a recentĀ LockBit ransomware attack. […]
RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks
Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain circumstances.
“The RADIUS protocol allows certain Access-Request messages to have no integrity or authentication checks,” InkBridge
“The RADIUS protocol allows certain Access-Request messages to have no integrity or authentication checks,” InkBridge
Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks
Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured Jenkins Script Console instances to further criminal activities such as cryptocurrency mining.
“Misconfigurations such as improperly set up authentication mechanisms expose the ‘/script’ endpoint to attackers,” Trend Micro’s Shubham Singh and Sunil Bharti said in a technical write-up
“Misconfigurations such as improperly set up authentication mechanisms expose the ‘/script’ endpoint to attackers,” Trend Micro’s Shubham Singh and Sunil Bharti said in a technical write-up
HUMINT: Diving Deep into the Dark Web
Clear Web vs. Deep Web vs. Dark Web
Threat intelligence professionals divide the internet into three main components:
Threat intelligence professionals divide the internet into three main components:
Clear Web – Web assets that can be viewed through public search engines, including media, blogs, and other pages and sites.
Deep Web – Websites and forums that are unindexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some
GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel
Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android data-gathering tool called GuardZoo.
The campaign, believed to have commenced as early as October 2019, has been attributed to a Houthi-aligned threat actor based on the application lures, command-and-control (C2) server logs, targeting footprint, and the attack
The campaign, believed to have commenced as early as October 2019, has been attributed to a Houthi-aligned threat actor based on the application lures, command-and-control (C2) server logs, targeting footprint, and the attack
Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation
Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have released a joint advisory about a China-linked cyber espionage group called APT40, warning about its ability to co-opt exploits for newly disclosed security flaws within hours or days of public release.
“APT 40 has previously targeted organizations in various countries, including
“APT 40 has previously targeted organizations in various countries, including
Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what appears to be an instance of a “complex and persistent” supply chain attack.
“This attack stands out due to the high variability across packages,” Phylum said in an analysis published last week.
“The attacker has cleverly hidden the malware in the seldom-used ‘end’ function of
“This attack stands out due to the high variability across packages,” Phylum said in an analysis published last week.
“The attacker has cleverly hidden the malware in the seldom-used ‘end’ function of
Computer maker Zotac exposed customers’ RMA info on Google Search
Computer hardware maker Zotac has exposed return merchandise authorization (RMA) requests and related documents online for an unknown period, exposing sensitive customer information. […]
Hackers leak 39,000 print-at-home Ticketmaster tickets for 154 events
In an ongoing extortion campaign against Ticketmaster, threat actors have leaked almost 39,000 print-at-home tickets for 150 upcoming concertsĀ and events, including Pearl Jam, Phish, Tate McCrae, and Foo Fighters. […]
