A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Hackers can take over Ecovacs home robots to spy on their owners

Russian national arrested in Argentina for laundering money of crooks and Lazarus APT

Qilin ransomware steals credentials stored in Google Chrome

Phishing attacks target mobile users via progressive web applications (PWA)

New malware Cthulhu Stealer targets Apple macOS users

China-linked APT Velvet Ant exploited zero-day to compromise Cisco switches

A cyberattack hit US oil giant Halliburton

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog

SolarWinds fixed a hardcoded credential issue in Web Help Desk

A cyberattack disrupted operations of US chipmaker Microchip Technology

Google addressed the ninth actively exploited Chrome zero-day this year

GitHub fixed a new critical flaw in the GitHub Enterprise Server?

Experts disclosed a critical information-disclosure flaw in Microsoft Copilot Studio

North Korea-linked APT used a new RAT called MoonPeak

Pro-Russia group Vermin targets Ukraine with a new malware family

A backdoor in millions of Shanghai Fudan Microelectronics RFID cards allows cloning

Ransomware payments rose from $449.1 million to $459.8 million

Previously unseen Msupedge backdoor targeted a university in Taiwan

Oracle NetSuite misconfiguration could lead to data exposure

Toyota disclosed a data breach after ZeroSevenGroup leaked stolen data on a cybercrime forum

CISA adds Jenkins Command Line Interface (CLI) bug to its Known Exploited Vulnerabilities catalog

Researchers uncovered new infrastructure linked to the cybercrime group FIN7Hacking

From 2018: DeepMasterPrints: deceive fingerprint recognition systems with MasterPrints generated with GANs

Large-scale extortion campaign targets publicly accessible environment variable files (.env)

International Press – Newsletter

Cybercrime ?

The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for??

New U.N. Cybercrime Treaty Could Threaten Human Rights?

FIN7: The Truth Doesn't Need to be so STARK?

2024 Crypto Crime Mid-year Update Part 1: Cybercrime Climbs as Exchange Thieves and Ransomware Attackers Grow Bolder?? ???

Pulaski County Man Sentenced for Cyber Intrusion and Aggravated Identity Theft?

Microchip Technology says operations disrupted by cyberattack?

Member of Russian cybercrime group charged in Ohio??

Argentinian Authorities Arrest Russian National for Laundering the Crypto Proceeds of Illicit Activity?

Hacker tried to dodge child support by breaking into registry to fake his death, prosecutors say??

Malware

Meet UULoader: An Emerging and Evasive Malicious Installer

BlindEagle flying high in Latin America??

Finding Malware: Unveiling NUMOZYLOD with Google Security Operations?? ???

NGate Android malware relays NFC traffic to steal cash??

From the Depths: Analyzing the Cthulhu Stealer Malware for macOS??

PEAKLIGHT: Decoding the Stealthy Memory-Only Malware??

Qilin ransomware caught stealing credentials stored in Google Chrome??

Hacking

MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles

Potential Widespread Data Exposure Analysis: Oracle NetSuite??

MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors

SSRFing the Web with the help of Copilot Studio??

$4,998 Bounty Awarded and 100,000 WordPress Sites Protected Against Unauthenticated Remote Code Execution Vulnerability Patched in GiveWP WordPress Plugin

Phrack hacker zine publishes new edition after three years

Google fixes ninth Chrome zero-day exploited in attacks this year

Hackers now use AppDomain Injection to drop CobaltStrike beacons

Ecovacs says it will fix bugs that can be abused to spy on robot owners??

Be careful what you pwish for – Phishing in PWA applications??

Intelligence and Information Warfare?

Disrupting a covert Iranian influence operation??

Safeguarding Digital Freedom: How a Gen Discovery Helped to Protect Windows Users Everywhere???

Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Russia-linked Vermin hackers target Ukraine with new malware strain??

TodoSwift Disguises Malware Download Behind Bitcoin PDF??

MoonPeak malware from North Korean actors unveils new details on attacker infrastructure

China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches??

From cybercrime to terrorism, FBI director says America faces many elevated threats ‘all at once’??

US government accuses Iran of Trump campaign hack; Iran scoffs??

Cybersecurity

Nvidia Sued for Scraping YouTube After 404 Media Investigation?

The Rise of Techno-Colonialism??

Toyota confirms breach after stolen data leaks on hacking forum

Researchers Have Ranked AI Models Based on Risk—and Found a Wild Range??

Critical Privilege Escalation in LiteSpeed Cache Plugin Affecting 5+ Million Sites??

Memory corruption vulnerabilities in Suricata and FreeRDP??

Top US oilfield firm Halliburton hit by cyberattack, source says?

Local Networks Go Global When Domain Names Collide??

The New Bioweapons??

Hack on North Miami Tests Ransom Payment Bans??

National Public Data Published Its Own Passwords

Finding security flaws in Android ahead of malicious hackers?? ???

Follow me on Twitter:?@securityaffairs?and?Facebook?and?Mastodon

Pierluigi?Paganini

(SecurityAffairs?–?hacking,?newsletter)


要查看或添加评论,请登录

社区洞察

其他会员也浏览了