Intellawatch

Thousands of API Secrets Exposed on Postman – Are Your Credentials At Risk? cyber

from

Penetration Testing Online

They identified 1,689 unique credentials linked to 183 different service providers, including major names like AWS, GCP, OpenAI, and GitHub. The most common type of exposed data was sensitive URIs, which include URLs containing confidential access credentials. Every developer needs to be aware of the potential for leaks and approach public sharing platforms with extreme caution.....

Hackers Employ Advanced Fileless Attack to Implant AgentTesla Malware cyber

from

Penetration Testing Online

This shellcode dynamically resolves critical API functions necessary for further execution, such as VirtualAlloc and VirtualFree, through a hashing technique. This attack demonstrates how hackers are constantly innovating and combining techniques to stay ahead of defenders. Organizations must not only keep their tools up-to-date but also invest in continuous security awareness training and a proactive approach to threat detection.....

Iranian Hacker Group MuddyWater Abuses Legitimate Atera Software to Target Global Organizations cyber

from

Penetration Testing Online

MuddyWater has been active in cyber espionage since at least 2015, focusing on entities across the Middle East and beyond. Notably, the quality of these phishing attempts has improved, with emails now featuring more convincing content and professional formatting to enhance their deceit. This method suggests a high degree of customization in targeting, which spans several sectors including telecommunications, pharmaceuticals, and government entities among others.....

Beware of Search Results: Hackers Using Fake Websites to Spread Malware cyber

from

Penetration Testing Online

By mimicking legitimate websites and using fraudulent search engine optimization (SEO) tactics, these attackers are tricking users into downloading malware disguised as free software, cracked games, or even enticing deals. Once a user lands on one of these sites, the malware delivery process begins, cleverly disguised and often involving multiple stages to evade detection. In an example of payload delivery, users searching for cracked software might be directed to a fake MediaFire page that loo....

AI Powers a Phishing Frenzy – Zscaler Report Warns of Unprecedented Threat Wave cyber

from

Penetration Testing Online

Tools like generative AI have lowered the entry barrier for conducting intricate phishing campaigns, allowing cybercriminals to create highly convincing, personalized scams with unprecedented ease. Security solutions must adapt, analyzing a wide range of communication for subtle anomalies, unusual voice patterns, and behavioral deviations to detect attacks. Rigorous authentication, strict access controls, and network segmentation are critical to limiting the spread of attacks even if an employe....

PoC Exploit Releases for Critical Progress Flowmon Bug – CVE-2024-2389 (CVSS 10) cyber

from

Penetration Testing Online

The vulnerability stems from how “ ConfluencePresenter.php ” handles user input parameters such as `pluginPath`, `locale`, and `file`. This allows them to escape the intended command constraints and execute arbitrary system commands. In response to the discovery, Progress has released patched versions of Flowmon—versions 12.3.5 and 11.1.14—that address this critical vulnerability.....

Health conglomerate Kaiser notifies millions of a data breach - Reuters breach

from

Reuters via Google

....

Issues Resolving Symbols on Windows 11 on ARM64 cyber

from

Tyranid's Lair

Microsoft provides private symbols for COMBASE so its pretty easy to check if the structures were different between x64 and ARM64 versions of Windows 11. This is a clever (or terrible) trick to avoid needing separate ARM64 and x64 binaries on the system. In this case it doesn't seem like there should be two separate global data values as a pointer is a pointer, but I suppose there might be edge cases where that isn't true and it's simpler to just duplicate the values to avoid conflicts.....

NodeZero: Testing for Exploitability of Palo Alto Networks CVE-2024-3400 cyber

from

Horizon3.ai

According to Shadowserver, there are several thousand internet-accessible Palo Alto Networks firewalls potentially affected by the vulnerability. Proof #: PAN-OS application was exploited to create an empty file on the target and confirm a 403 server response NVD Analysts, who use publicly available information to associate vector strings and CVSS scores, assigned this vulnerability the Base Score of 10.0 Critical.....

5 Attack Trends Organizations of All Sizes Should Be Monitoring cyber

from

Dark Reading:

Some adversaries will even use programs to locate vulnerable endpoints around the world and identify jumping-off points for their next attack. Microsoft has increasingly observed certain nation-state subgroups adopting publicly disclosed proof-of-concept (POC) code shortly after it is released to exploit vulnerabilities in Internet-facing applications. Rather than carry out an end-to-end ransomware operation, threat actors are choosing to focus on a small range of capabilities and services.....

M&A action is gaining momentum, are your cloud security leaders prepared? cyber

from

CIO

Many organizations will find an uphill battle here; the previous few years have taken a significant toll. All-encompassing visibility is critical in mergers or acquisitions and cloud-native application protection platforms (CNAPP) are ideal to provide this capability. Ultimately, in the face of increasing M&A activity, cybersecurity teams must prioritize thorough reviews, adopt comprehensive security platforms, and implement robust mitigation strategies to effectively manage cloud security and ....

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog cyber

from

Security Affairs

Cisco Talos this week warned that the nation-state actor UAT4356 (aka STORM-1849) has been exploiting two zero-day vulnerabilities in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls since November 2023 to breach government networks worldwide. CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog Read more DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions Read more....

What is a Zero-Day Vulnerability? cyber

from

Sucuri Blog

Some vulnerabilities require a certain amount of privileges in order to be exploited – but then again, this depends on the vulnerability. Post clean-up, we’ll also provide you with detailed recommendations to help improve your site’s security and prevent future attacks. When Gerson isn’t writing code, you might find him playing with his two beautiful dogs Spock and Dinki.....

Looking outside: How to protect against non-Windows network vulnerabilities cyber

from

CSO Online

A Linux vulnerability that almost (but not quite) made it into the distributions of nearly every Linux distro was caught by a savvy Microsoft engineer who realized that it was taking longer to log in with SSH with the machine making more CPU and throwing off valgrind errors. Be prepared to immediately patch and or disable any of these software tools at a moment’s notice should the need arise. Many of us have put in place geo-blocking for potential attackers from overseas but do not have the sam....

LA County Health Services: Patients' data exposed in phishing attack breach

from

BleepingComputer

As revealed in data breach notifications sent to an undisclosed number of potentially affected individuals, 23 employees had their credentials stolen in a February attack. Affected individuals may have been impacted differently, and the data stored in the breached e-mail inboxes did not include Social Security Numbers (SSNs) or financial information. BleepingComputer reached out to an L.A. County Health Services spokesperson with more questions about the incident, but a response was not immedia....

Health insurance giant Kaiser notifies millions of a data breach breach

from

TechCrunch

In a legally required notice filed with the U.S. government on April 12 but made public on Thursday, the Kaiser Foundation Health Plan confirmed that 13.4 million residents had information taken in a data breach. Kaiser also notified California’s attorney general of the data breach, but did not provide any further details. To contact this reporter, get in touch on Signal and WhatsApp at +1 646-755-8849, or by email.....

Cloud security teams: What to know as M&A activity rebounds in 2024 cyber

from

CSO Online

Many organizations will find an uphill battle here; the previous few years have taken a significant toll. All-encompassing visibility is critical in mergers or acquisitions and cloud-native application protection platforms (CNAPP) are ideal to provide this capability. Ultimately, in the face of increasing M&A activity, cybersecurity teams must prioritize thorough reviews, adopt comprehensive security platforms, and implement robust mitigation strategies to effectively manage cloud security and ....

Researchers sinkhole PlugX malware server with 2.5 million unique IPs cyber

from

BleepingComputer

This action enabled the security firm to analyze traffic, map infections, prevent malicious exploitation of clients, and devise effective disinfection plans. One method is to send the self-delete command supported by PlugX, which should remove it from computers without additional actions. PlugX has been used since at least 2008 mainly in espionage and remote access operations from groups linked to the Chinese Ministry of State Security.....

Nemesis 1.0.0 cyber

from

SpecterOPS

This post will detail several of the major changes we’re excited about, from host modeling, to a streamlined installation process, dashboard improvements, and more! In response to this feedback, we’ve now adopted k3s, which can be installed with one command and doesn’t depend on Docker. Our updated quickstart guide outlines the full installation process in just five steps, making it quicker to get up and running.....

Beware of Fake PoC Repositories & Malicious Code on GitHub cyber

from

Uptycs Blog

Figure 6 - Exploit files of different CVEs for sale that have the same name and size Platforms like GitHub have mechanisms to handle fraudulent activity, and reporting them helps protect the entire community. The attacker(s) invested significant effort creating multiple fake GitHub profiles to distribute suspicious exploit files.....

TA: 33226 TP: 1662 CP: 0