Security Bulletin
18 Sep 2024
Biztonsági szemle
Global targeting of Marko Polo cybercrime operation detailed
While most of the scams involved spearphishing attacks spreading the Atomic macOS Stealer via malicious Zoom meeting client builds, Marko Polo also impersonated productivity software, blockchain-based projects, and online games to facilitate...
18 Sep 2024
Biztonsági szemle
Unsecured Elasticsearch cluster exposes over 3M vehicle records
Aside from containing vehicle owners' names, birthdates, and phone numbers, such an Elasticsearch cluster also featured vehicle production dates, chassis and engine numbers, and other records with a "special needs" designation, according to Cybernews...
18 Sep 2024
Biztonsági szemle
Accounting software targeted to breach construction sector
Almost 35,000 brute-force attempts have been conducted by threat actors against a single host's Microsoft SQL Server leveraged by the accounting software for database operations, according to researchers from Huntress.
18 Sep 2024
Biztonsági szemle
Temu refutes claim of extensive data compromise
While information in the stolen database, which has been peddled on BreachForums, was purported to include customers' full names, birthdates, gender, usernames and IDs, hashed passwords, phone numbers, shipping addresses, and IP addresses, Temu...
18 Sep 2024
Biztonsági szemle
Microsoft Azure tools increasingly leveraged in ransomware attacks
After installing dependencies and upgrading .NET to version 8, ransomware gangs leveraged several Azure Storage Explorer instances to accelerate uploads of stolen files to Azure Blob storage before being transferred to their storage, according to a...
18 Sep 2024
Biztonsági szemle
Infostealers: An Early Warning for Ransomware Attacks
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks?
18 Sep 2024
Biztonsági szemle
As Geopolitical Tensions Mount, Iran's Cyber Operations Grow
Increasing attacks by the OilRig/APT34 group linked to Iran's Ministry of Intelligence and Security show that the nation's capabilities are growing, and targeting regional allies and enemies alike.
17 Sep 2024
Biztonsági szemle
'CloudImposer' attack targets Google Cloud services
Researchers uncovered a vulnerability that could have placed millions of Google Cloud instances at risk of remote hijack.
17 Sep 2024
Biztonsági szemle
CISA Urges Software Makers to Eliminate XSS Flaws
The latest Secure by Design alert from CISA outlines recommended actions security teams should implement to reduce the prevalence of cross-site scripting vulnerabilities in software.
17 Sep 2024
Biztonsági szemle
ServiceNow ‘knowledge base’ misconfiguration leaks sensitive data
Security pros say KBs can be easily misconfigured – data on more than 1,000 KBs exposed.
17 Sep 2024
Biztonsági szemle
Zero-Click RCE Bug in macOS Calendar Exposes iCloud Data
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.
17 Sep 2024
Biztonsági szemle
'Marko Polo' Creates Globe-Spanning Cybercrime Juggernaut
The Eastern European group is actively expanding its financial fraud activities, with its pipelines representing a veritable Silk Road for the transfer of cryptocurrency, and lucrative and exploitable data.
Pagination
- Previous page ‹‹
- Page 403
- Next page ››