Cyber Security

Weekly Round-Up of Cyber Security News: Vulnerabilities and Threats

Cybersecurity News Summary

Cybersecurity News Roundup: Stay Informed and Protected

In today’s fast-paced world of cybersecurity, staying up to date with the latest developments, vulnerabilities, breaches, threats, and defensive strategies is crucial to protecting your systems and assets. Here is a summary of some recent news stories that highlight the ever-evolving landscape of cybersecurity:

Cyber Attack

– **Russian Hackers Exploit Outlook Flaw**: APT28 or Fancy Bear, Russian state-sponsored hackers, have exploited a critical flaw in Microsoft Outlook to steal email accounts on a large scale. Despite Microsoft issuing a patch for the vulnerability, threat actors continue to use it for advanced cyber espionage actions.

– **ArcaneDoor Hackers Exploited Cisco Firewall Zero-Days**: A state-sponsored threat actor known as “UAT4356” launched the ArcaneDoor campaign, exploiting Cisco Firewall zero-days to target government perimeter network devices worldwide.

– **Hackers Attacking GitLab Password Reset Vulnerability**: CISA declared a critical alert related to a flaw in GitLab that allows hackers to skip password reset protocols, gaining unauthorized access to private projects and confidential information.

– **Hackers Infiltrated 9-days Within UnitedHealth Network**: A ransomware attack targeted UnitedHealth Group, impacting the network of Change Healthcare, a part of the UnitedHealth network, causing severe disruptions.

– **Millions of Docker Hub Repositories Found Pushing Malware**: JFrog’s security research team discovered that almost one-fifth of repositories in Docker Hub were distributing malware and phishing scams, leading to the removal of 3.2 million potentially harmful repositories.

– **0-Day Vulnerability in Zyxel VPN Device**: Threat actors found a zero-day bug in Zyxel VPN devices, posing a significant security threat to organizations across various industries.

– **Mal.Metrica Malware Hijacks 17,000+ WordPress Sites**: A major malware campaign known as Mal.Metrica targeted over 17,000 WordPress sites, inserting harmful scripts into vulnerable plugins and redirecting users to malicious domains.

– **Hackers Exploit Microsoft Graph API**: Hackers have exploited the Microsoft Graph API for command-and-control communications, using legitimate cloud services to mask their activities and evade detection.

Vulnerability

– **Aiohttp Vulnerability**: A directory traversal vulnerability affecting aiohttp versions prior to 3.9.2 allows remote attackers to access sensitive files, highlighting the need for immediate patching to mitigate the risk.

– **Android Bug Leaks DNS Traffic**: An Android bug causes DNS traffic leaks while switching VPN servers, potentially exposing users’ online activities to threat actors.

– **Path Traversal Vulnerability**: Xiaomi’s File Manager and WPS Office were found vulnerable to a path-crossing vulnerability, allowing hackers to rewrite files and steal tokens.

– **Postman API Testing Platform Flaw**: A critical vulnerability in Postman exposed over 4,000 active credentials, leading to the exposure of sensitive URIs and live secrets from major firms.

– **Judge0 Security Flaw**: Judge0, a service for secure code execution, has a critical security flaw that allows attackers to execute arbitrary code on the host machine, emphasizing the need for immediate fixes to ensure system safety.

– **Cisco IP Phone Vulnerability**: Vulnerabilities in Cisco IP Phone firmware allow remote attackers to launch denial of service attacks, access sensitive information, and view unauthorized information.

Threats

– **New macOS Adload Malware**: A new variant of the Adload virus evades macOS’ built-in antivirus detection, posing a significant risk to Mac security.

– **Threat Actors Selling RDP Access**: Underground hacker forums are selling Remote Desktop Protocol (RDP) access, raising concerns about unauthorized access to critical systems and data.

– **MailCleaner Vulnerabilities**: Critical vulnerabilities in MailCleaner allow attackers to take over devices remotely, emphasizing the need for strong safeguards against cyber-attacks.

– **Dropbox Sign Hacked**: A security compromise in Dropbox Sign led to unauthorized access to sensitive consumer information, prompting immediate password resets and enhanced security measures.

– **New Android Trojan**: A new strain of Android malware called “Wpeeper” avoids antivirus detection by infiltrating Android systems through repackaged apps on third-party platforms.

– **GoldDigger Malware**: The GoldFamily trojan, also known as GoldDigger Malware, uses AI-generated deep fake photos to trick users into giving up control over their bank accounts.

– **VNC Is The Hacker’s New Remote Desktop Tool**: VNC has become a prevalent tool for cyber attacks due to its vulnerabilities, posing security challenges for IT teams.

– **Russian Hackers Attacking Small-Scale Infrastructure Sectors**: Russian hackers are targeting small-scale operational technology systems in critical sectors, posing threats to public safety and health.

– **USB Malware Attacks**: Malware on industrial USB devices poses a significant threat to operational technology systems, emphasizing the need for strong safeguards against cyber-attacks via USBs.

– **New Android Malware Mimic As Social Media Apps**: Android malware imitates social media apps to steal sensitive user data, highlighting the importance of downloading apps from trusted sources.

– **Darkgate Malware**: The DarkGate malware, a Remote Access Trojan (RAT) developed using Borland Delphi, has seen a concerning increase in spread, evading detection by Microsoft Defender SmartScreen.

New Research

– **Pathfinder**: By exploiting the conditional branch predictor, Pathfinder steals sensitive data from modern chips, highlighting significant security consequences for Intel and AMD.

– **Safari Flaw**: A serious security flaw in Apple’s Safari browser could lead to unauthorized tracking of EU iPhone users, posing risks to privacy and security.

– **Empty S3 Bucket Led to a Massive AWS Bill**: An empty S3 bucket misconfiguration caused a substantial bill for an AWS customer, emphasizing the importance of proper tool configuration and S3 bucket naming conventions.

– **Gemini 1.5 Pro**: Google introduced Gemini 1.5 Pro, an advanced AI tool for automated malware analysis, revolutionizing malware detection and analysis capabilities.

Stay informed and protected by keeping up with the latest cybersecurity news and developments to safeguard your systems and assets against evolving threats and vulnerabilities.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button