Sat.Sep 04, 2021

article thumbnail

U.S. Cyber Command Warns of Ongoing Attacks Exploiting Atlassian Confluence Flaw

The Hacker News

The U.S. Cyber Command on Friday warned of ongoing mass exploitation attempts in the wild targeting a now-patched critical security vulnerability affecting Atlassian Confluence deployments that could be abused by unauthenticated attackers to take control of a vulnerable system.

143
143
article thumbnail

FIN7 group leverages Windows 11 Alpha-Themed docs to drop Javascript payloads

Security Affairs

FIN7 cybercrime gang used weaponized Windows 11 Alpha-themed Word documents to drop malicious payloads, including a JavaScript backdoor. Anomali Threat Research experts have monitored recent spear-phishing attacks conducted by financially motivated threat actor FIN7. The messages used weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including a JavaScript backdoor, in an attack aimed at a US point-of-sale (PoS) service provider.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Watch out for new malware campaign’s 'Windows 11 Alpha' attachment

Bleeping Computer

Relying on a simple recipe that has proved successful time and time again, threat actors have deployed a malware campaign recently that used a Windows 11 theme to lure recipients into activating malicious code placed inside Microsoft Word documents. [.].

Malware 128
article thumbnail

Microsoft Says Chinese Hackers Were Behind SolarWinds Serv-U SSH 0-Day Attack

The Hacker News

Microsoft has shared technical details about a now-fixed, actively exploited critical security vulnerability affecting SolarWinds Serv-U managed file transfer service that it has attributed with "high confidence" to a threat actor operating out of China.

116
116
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Source code for the Babuk is available on a hacking forum

Security Affairs

The complete source code for the Babuk ransomware is available for sale on a Russian-speaking hacking forum. A threat actor has leaked the source code for the Babuk ransomware on a Russian-speaking hacking forum. The Babuk Locker operators halted their operations at the end of April after the attack against the Washington, DC police department. Experts believe that the decision of the group to leave the ransomware practice could be the result of an operational error, it was a bad idea to threate

Hacking 112
article thumbnail

Apple Delays Plans to Scan Devices for Child Abuse Images After Privacy Backlash

The Hacker News

Apple is temporarily hitting the pause button on its controversial plans to screen users' devices for child sexual abuse material (CSAM) after receiving sustained blowback over worries that the tool could be weaponized for mass surveillance and erode the privacy of users.

More Trending

article thumbnail

Apple will delay the rollout of new child pornography protection tools

Security Affairs

Apple will delay the introduction of its new child pornography protection tools due to a heated debate raised by privacy advocates. Apple announced this week that it will delay the rollout of its new child pornography protection tools after many experts and privacy advocated claimed it poses a threat to user privacy. The tools were announced by the IT giant in August, the company explained that every image containing child sexual abuse on iPhones and iPads will be reported to its experts and upl

Hacking 98
article thumbnail

Windows 11 may not get security updates on unsupported devices

Bleeping Computer

Microsoft is turning a blind eye to a loophole that allows you to install Windows 11 on incompatible hardware but warns that your device may no longer receive security updates. [.].

108
108
article thumbnail

SEC warns of investment scams related to Hurricane Ida

Security Affairs

The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and Exchange Commission (SEC)’s Office of Investor Education and Advocacy is warning investors of potential investment scams related to Hurricane Ida. Scammers will likely target individuals and organizations that are eligible to receive large payouts from insurance companies to compensate for the damages caused by Hurricane Ida.

Scams 96
article thumbnail

BrakTooth Flaws Affect Billions of Bluetooth Devices

WIRED Threat Level

Plus: A spyware ban, a big WhatsApp fine, and more of the week's top security news.

Spyware 97
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CommitStrip ‘End-Of-Project Review’

Security Boulevard

via the textual amusements of Thomas Gx , along with the Illustration talents of Etienne Issartia and superb translation skillset of Mark Nightingale - the creators of CommitStrip ! Permalink. The post CommitStrip ‘End-Of-Project Review’ appeared first on Security Boulevard.

62
article thumbnail

wtf v0.5.1 releases: cross-platform snapshot-based fuzzer designed for attacking user/ kernel-mode targets

Penetration Testing

what the fuzz what the fuzz or wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and or kernel-mode targets running on Microsoft Windows. Execution of the target can be done inside... The post wtf v0.5.1 releases: cross-platform snapshot-based fuzzer designed for attacking user/ kernel-mode targets appeared first on Penetration Testing.

article thumbnail

DEF CON 29 Main Stage – Jiska Classen’s & Alexander Heinrich’s ‘Wibbly Wobbly, Timey Wimey Whats Inside Apple’s U1 Chip’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel. Permalink. The post DEF CON 29 Main Stage – Jiska Classen’s & Alexander Heinrich’s ‘Wibbly Wobbly, Timey Wimey Whats Inside Apple’s U1 Chip’ appeared first on Security Boulevard.

article thumbnail

DEF CON 29 Main Stage – Martin Doyhenard’s ‘Response Smuggling: Pwning HTTP 1 1 Connections’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel. Permalink. The post DEF CON 29 Main Stage – Martin Doyhenard’s ‘Response Smuggling: Pwning HTTP 1 1 Connections’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.