Latest Cybersecurity News and Articles


PoC Exploit Releases for Windows Elevation of Privilege Vulnerability (CVE-2024-26230)

10 September 2024
A PoC exploit for an Elevation of Privilege vulnerability in Windows has been released by a security researcher. This exploit targets a flaw in the Windows Telephony service, allowing attackers to gain SYSTEM privileges on affected systems.

Musician Charged With $10M Streaming Royalties Fraud Using AI and Bots

10 September 2024
North Carolina musician Michael Smith has been indicted for allegedly scamming over $10 million in royalty payments from Spotify, Amazon Music, Apple Music, and YouTube Music through a massive streaming fraud scheme.

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

10 September 2024
CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade security measures and conduct stealthy attacks.

Lazarus Group Targets Blockchain Pros with Fake Video Conferencing, Job Scam

10 September 2024
The Lazarus Group, known for financially motivated cyber campaigns, is targeting blockchain professionals through fake job offers and fraudulent video conferencing applications.

North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams

10 September 2024
Once installed, COVERTCATCH downloads a second-stage payload to compromise macOS systems. This tactic is part of various activity clusters, including Operation Dream Job and Contagious Interview.

MindsDB Fixes Critical CVE-2024-24759: DNS Rebinding Attack Bypasses Security Protections

10 September 2024
MindsDB has fixed a critical security vulnerability, CVE-2024-24759, which could enable attackers to bypass security measures using DNS rebinding. This technique manipulates domain name resolution to bypass SSRF protection.

New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

09 September 2024
A novel side-channel attack has been found to leverage radio signals emanated by a device's random access memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks. The technique has been codenamed RAMBO by Dr. Mordechai Guri, the head of the Offensive Cyber Research Lab in the Department of Software and Information Systems Engineering at the Ben Gurion University of

Confidant Health database exposed 5.3 terabytes of patient information

09 September 2024
A cybersecurity researcher discovered an exposed Confidant Health database containing thousands of records. 

New RAMBO Attack Steals Data Using RAM in Air-Gapped Computers

09 September 2024
The attack involves malware manipulating the computer's RAM to emit controlled electromagnetic radiation that can transmit data to nearby recipients. The attack, created by Israeli researchers, leverages memory access patterns to modulate the RAM.

Avis Rent A Car announces data breach

09 September 2024
According to Avis, an unauthorized third party gained access to one of its business applications in August 2024 and obtained customer information.

Critical Kibana Flaws Expose Systems to Arbitrary Code Execution

09 September 2024
A couple of critical vulnerabilities in Kibana, tracked as CVE-2024-37288 and CVE-2024-37285, can lead to arbitrary code execution. Elastic urges an immediate update to version 8.15.1.

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

09 September 2024
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately protected. However, this approach not only fails to address the fundamental issue of the attack surface but also introduces dangerous

Sextortion Scam Now Use Your “Cheating” Spouse’s Name as a Lure

09 September 2024
A new sextortion scam variant is targeting spouses by claiming their partner is cheating on them and providing alleged proof in emails. These scams involve threatening to share compromising images or videos unless a payment is made.

Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT

09 September 2024
The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customized version of a known commodity remote access trojan (RAT) known as Quasar RAT since June 2024. "Attacks have originated with phishing emails impersonating the Colombian tax authority," Zscaler ThreatLabz researcher Gaetano Pellegrino said in a new analysis published

Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks

09 September 2024
The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio Code software as part of espionage operations targeting government entities in Southeast Asia. "This threat actor used Visual Studio Code's embedded reverse shell feature to gain a foothold in target networks," Palo Alto Networks Unit 42 researcher Tom Fakterman said in a

HAProxy Vulnerability CVE-2024-45506 Under Active Exploit: Urgent Patching Required

09 September 2024
This flaw in the HTTP/2 multiplexer can lead to an endless loop, system crashes, and remote denial-of-service attacks, with a CVSS score of 7. 5. The vulnerability impacts HAProxy Enterprise, ALOHA, and Kubernetes Ingress Controller products.

Planned Parenthood of Montana experienced a cyber attack

09 September 2024
Planned Parenthood of Montana experienced a cyber attack that allegedly exposed 93 gigabytes of data. 

Critical GeoServer Flaw Enabling Global Hack Campaigns

09 September 2024
The flaw in GeoServer, tracked as CVE-2024-36401 and with a CVSS score of 9.8, was swiftly capitalized on by hackers who launched campaigns using botnet families and cryptominers to spread malicious tools like Goreverse, a reverse proxy server.

Webinar: How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits

09 September 2024
GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. Developers use it to write code, finance teams use it to analyze reports, and sales teams create customer emails and assets. Yet, these capabilities are exactly the ones that introduce serious security risks. Register to our upcoming webinar to learn how to prevent GenAI data

LummaC2 Stealer and Malicious Chrome Extension Wreak Havoc

09 September 2024
This attack begins with victims unknowingly downloading a malicious ZIP archive containing an installer file that sideloads a malicious DLL. This DLL then downloads the LummaC2 Stealer and a PowerShell script from a command-and-control server.