cyber security
-
Google security report reveals more than 60 0day used for commercial spyware
More than 60 zero-day vulnerabilities (0day) that have been made public since 2016 are associated with commercial spyware vendors for government agencies, and vulnerabilities exist in products from a number of companies, including Apple, Adobe, Google, and others, where they have been used for attack purposes including targeting journalists and political dissidents. The report notes that a large number of vulnerabilities are actively exploited in 2023.
-
Russian APT28 Hacking Group Exploits NTLM Security Vulnerability to Attack High-Value Targets Worldwide
The Russian APT28 hackers launched a cyberattack against the NTLMv2 hash relay attack, targeting high-value sectors such as diplomacy, energy, defense, and transportation across the globe. They exploited vulnerabilities in software including Cisco networking equipment, Microsoft Outlook and WinRAR to gain access and data.
-
Remote desktop AnyDesk hacked, user data security at risk!
AnyDesk, the well-known remote desktop software, has been hacked and some of its data compromised. The company has taken steps to fix the vulnerability and is advising users to reset their passwords and download the latest version of the software.
-
Cloudflare suspected of being attacked by state-sponsored hacker group
Cloudflare has disclosed that it was subjected to a potential national-level hack in which attackers illegally accessed its Atlassian servers through stolen credentials and ultimately accessed some of the documentation and limited source code.
-
GitLab Create Workspace Write Arbitrary File Overwrite Vulnerability
GitLab has released a security patch to address a critical vulnerability in its workspace creation feature. The vulnerability allows authenticated users to write arbitrary files to GitLab servers, which could lead to data breaches, malware infections, or other security issues.
-
Malvertising on Google targets Chinese users with fake spoofing apps
Recently, a series of malicious advertisements targeting Chinese-speaking users appeared on Google platforms, enticing users to download fake communication applications, which were actually malware containing Remote Administration Trojans (RATs). These ads were found to link to fake websites hosted on Google Docs or Google Sites and spread through Google infrastructure.
-
Multiple High-Risk Security Vulnerabilities Found in Rapid SCADA Open Source Industrial Automation Platform
Rapid Software LLC's industrial automation platform, Rapid SCADA, has been found to be susceptible to multiple critical vulnerabilities, posing significant risks of remote code execution, unauthorized access and privilege escalation. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a bulletin detailing the potential vulnerabilities and urging immediate action.
-
Danish Energy Ministry Cyber Attack Not Linked to Sandworm Hacking Group
An investigation into cyberattacks in the energy sector has revealed that the attacks may not have been perpetrated by a state-sponsored organization, but rather two waves of attacks that exploited vulnerabilities against the unpatched Zyxel firewall. The attacks were not limited to Denmark, but also included Europe and the United States.
-
Five years of safe operation practice summary and future thinking
The report emphasizes the need for security operations automation, pointing out that 80%'s security operations can be automated, which not only saves a lot of manpower, but also promotes the interconnection of security devices. Liu Yixiang looks at the future of operational intelligence, which will enable immediate adaptive handling of events and alarms, as well as adaptive remediation of vulnerabilities.
-
X (formerly twitter) security team confirms theft of SEC account
The U.S. Securities and Exchange Commission compromised the X (formerly twitter) account after unidentified individuals took control of the X (formerly twitter) account cell phone number. Approval for the Bitcoin ETF to be listed on all registered national stock exchanges was posted through the account, which did not have two-factor authentication enabled at the time of the theft.The X security team recommends that all users enable two-factor authentication to secure their accounts.