Intellawatch

GenAI makes phishing attacks more believable and cost-effective cyber

from

Help Net Security

Ivanti’s research revealed that when asked which threats are increasing in severity due to GenAI, phishing was the top response (45%) among survey participants. This threat vector will become even more powerful as attackers further personalize their phishing messages based on data found in the public domain. To bring employees along, companies must invest in upskilling their cybersecurity teams, using strategies such as interactive learning opportunities and attack simulations.....

New infosec products of the week: December 6, 2024 cyber

from

Help Net Security

With FortiAppSec Cloud, customers have deep visibility and control over web applications within their complex, multi-cloud environments. This approach delivers detection and response capabilities, unifying insights from every layer of the cloud stack. Veza Access Requests works on the power of Veza’s Role Engineering capabilities to ensure that users requesting access are provisioned according to the principle of least privilege from day one.....

Windows NTLM Zero-Day Vulnerability Exposes User Credentials cyber

from

GBHackers On Security

0patch’s micropatches have already been applied to affected systems using their agent, ensuring immediate protection for users who adopt this solution. Organizations relying on NTLM protocols are particularly at risk and should consider alternative authentication mechanisms or deploy third-party patches like those from 0patch. Until Microsoft releases an official fix, users are urged to implement available micropatches and exercise caution with files from untrusted sources.....

CISOs still cautious about adopting autonomous patch management solutions cyber

from

CSO Online

Now you’re relying on a single point of failure that can be catastrophic to your organization. And Jean-Louis of Info-Tech Research noted that many infosec leaders would in any case have trusted an update coming from CrowdStrike. Automated patch management is not essential, said Frank Dickson, group vice-president of IDC’s, security and trust research unit.....

Critical Zero-Day Vulnerability in Windows Exposes User Credentials cyber

from

Penetration Testing Online

This comprehensive vulnerability necessitates immediate mitigation strategies to protect sensitive information and prevent unauthorized access. In response to this critical vulnerability, 0patch has released free micropatches for a wide range of Windows versions, including legacy systems no longer receiving official Microsoft support. These micropatches provide a crucial stopgap measure while Microsoft develops an official patch.....

Django Releases Patches for CVE-2024-53907 and CVE-2024-53908 to Mitigate DoS and SQLi Threats cyber

from

Penetration Testing Online

According to the advisory, “certain inputs containing large sequences of nested incomplete HTML entities” could trigger this vulnerability. This issue has been classified as having “moderate” severity. The advisory warns that “direct usage of the django.db.models.fields.json.HasKey lookup on Oracle is subject to SQL injection if untrusted data is used as a lhs value.” However, the team clarifies that “applications that use the jsonfield.has_key lookup through the__ syntax are unaffected.” This ....

CVE-2024-43222 (CVSS 9.8): Critical Flaw in Sweet Date WordPress Theme Exposes Thousands of Sites to Potential Takeovers cyber

from

Penetration Testing Online

This vulnerability carries a CVSS score of 9.8, indicating its high severity and potential for significant impact. Execute Arbitrary Code: With administrative access, attackers can execute malicious code on the server, potentially leading to data breaches, website defacement, or the installation of backdoors for persistent access. Distribute Malware: Compromised websites can be leveraged to host and distribute malware, further amplifying the impact of the vulnerability.....

Phishing, Fraud, and Stolen Data: Europol Takes Down Cybercrime Network cyber

from

Penetration Testing Online

“ This customisation enabled criminals to carry out targeted fraud with greater efficiency,” Europol stated in their press release. The criminal network operated a marketplace where thousands of users could buy stolen data, including addresses, security answers, and even account balances, all conveniently sorted by region. This information, obtained through fraudulent phone calls impersonating bank employees, fueled a wave of targeted attacks against unsuspecting victims.....

Browser Isolation Bypassed: QR Codes Used in Novel C2 Attacks cyber

from

Penetration Testing Online

A recent report from Thibault Van Geluwe de Berlaere at Mandiant unveils an innovative method for attackers to bypass browser isolation and execute command-and-control (C2) operations using QR codes. During testing, Mandiant found a practical limit of 2,189 bytes per code due to pixel quality constraints in the rendered stream. Latency: Each C2 operation introduces a delay of approximately 5 seconds, resulting in slow data transfer rates unsuitable for high-bandwidth operations like SOCKS proxy....

DroidBot: A New Android Threat Exposes Global Financial Institutions cyber

from

Penetration Testing Online

First detected in June 2024, DroidBot combines advanced features, including hidden VNC, overlay attacks, and spyware-like keylogging, making it a powerful tool for on-device fraud. Notably, DroidBot leverages MQTT for its command-and-control (C2) infrastructure, a protocol typically used in IoT systems. Cleafy’s analysis reveals that DroidBot is still under active development, with placeholder functions and varying levels of obfuscation across samples.....

CVE-2024-53990 (CVSS 9.2): AsyncHttpClient Vulnerability Puts Java Applications at Risk cyber

from

Penetration Testing Online

In simpler terms, when an application using AHC makes an HTTP request with a specific cookie, the CookieStore might swap that cookie with a different one from its own store, even if the cookies have the same name. This vulnerability poses a significant risk to applications that rely on AHC for handling user authentication and authorization, especially those that interact with third-party services. Security researcher Chris Earle has been credited with discovering and reporting this vulnerabilit....

Russian Hacker Secret Blizzard Hijack C2 Infrastructure in New Espionage Campaign cyber

from

Penetration Testing Online

Lumen’s Black Lotus Labs has uncovered an elaborate campaign by the Russian threat actor Secret Blizzard (also known as Turla). Using Storm-0156’s infrastructure as a springboard, Secret Blizzard not only deployed their malware, including TwoDash and Statuezy, but also exploited this access to collect intelligence from networks compromised by Storm-0156. In April 2023, they escalated their operations by infiltrating the workstations of Storm-0156’s operators, gaining unprecedented access to too....

Multiple Vulnerabilities in SonicWall SMA 100 Could Lead to Remote Code Execution cyber

from

Penetration Testing Online

SonicWall has issued a security advisory regarding several vulnerabilities impacting its SMA 100 series SSL-VPN products. SonicWall warns that this “can be predicted by an attacker, potentially exposing the generated secret.” It’s crucial to note that the SMA 1000 series remains unaffected by these vulnerabilities.....

Fake DocuSign Emails: Don’t Get Hooked by Phishing Scams cyber

from

Penetration Testing Online

These campaigns exploit the trust and convenience associated with electronic signature platforms to deceive individuals into divulging sensitive credentials. One email, with the subject line “BIYH-QPVSW-3617 is ready for your review,” appeared to originate from a Japanese domain, @anabuki-enter.co.jp. The credentials stolen in these attacks can be used for Business Email Compromise (BEC) scams or sold on underground marketplaces.....

Black Basta Resurgence: Social Engineering Campaign Delivers Zbot, DarkGate, and Custom Malware cyber

from

Penetration Testing Online

The notorious Black Basta ransomware group is back, employing sophisticated social engineering tactics and deploying advanced malware payloads in their latest campaign. The campaign begins with an email bombing of targeted users, signing them up for multiple mailing lists to overwhelm their inboxes. Operators use a variety of methods to deliver their malware, including compromised SharePoint instances, file-sharing websites, and even direct uploads via remote management tools.....

News alert: One Identity wins 2024 Cyber Defense Award: Hot Company – PAM category cyber

from

The Last Watchdog

“We are deeply honored to be recognized amongst the winners of the 12th annual Cyber Defense Awards at CyberDefenseCon 2024,” said Mark Logan, CEO of One Identity. “Being recognized for our advancements in Privileged Access Management (PAM) is a powerful affirmation of the commitment One Identity has to safeguarding critical data and systems while empowering our customers to take charge of enhancing their security. “One Identity embodies three major features we judges look for with the potentia....

Hundred of CISCO switches impacted by bootloader flaw cyber

from

Security Affairs

....

Enhancing Security with Anomaly Detection | Uptycs cyber

from

Uptycs Blog

Traditional signature-based detection methods, which rely on pre-defined behavioral patterns or known (IoCs), often fail to keep pace with novel threats targeting modern systems. These examples highlight the need for adaptive defenses like anomaly detection that monitor deviations in behavior across systems, providing visibility into containerized workloads, host activity, and Kubernetes orchestration layers. What it means: The container might be communicating with a command-and-control (C2) se....

Blast Radius Mitigation Framework: Uptycs' Policy Enforcement cyber

from

Uptycs Blog

We’ll detail how Uptycs’ Blast Radius Mitigation Framework provides robust, immediate protection during such active threat incidents​​ in your cloud workloads. Uptycs integrates signature-based detection(e.g., Yara rules) with behavioral analysis to identify malicious toolkits and prevent their execution within cloud workloads. After containing threats, the Uptycs Blast Radius Mitigation Framework moves into Root Cause Analysis for deep insights—keep reading to see how each step drives resilien....

Securing Workloads with Software Pipeline Detection & Response cyber

from

Uptycs Blog

However, they are proving insufficient to catch more new waves of attacks that focus on injecting malicious code rather than exploiting known vulnerabilities. SolarWinds Attack: Attackers inserted malicious code into the Orion software updates, compromising thousands of organizations, including U.S. government agencies. This resulted in unauthorized access and data theft, highlighting the dangers of relying on public dependencies without stringent validation.....

TA: 66729 TP: 3337 CP: 7