'

Bitcoin ETFs Approved Following Official SEC X Account Compromise

Bitcoin ETFs Approved Following Official SEC X Account Compromise

For many years, the cryptocurrency industry has waited with bated breath for the U.S. Securities and Exchange Commission (SEC) to finally approve Bitcoin ETFs. Finally, on Wednesday the SEC granted this wish, announcing the approval for “a number of spot bitcoin exchange-traded product (ETP) shares.”   But this was not before a hacker had the first … Read more

Attackers deploy rootkits on misconfigured Apache Hadoop and Flink servers

Attackers deploy rootkits on misconfigured Apache Hadoop and Flink servers

Researchers have discovered a new malware attack campaign that exploits misconfigurations in Apache Hadoop and Flink, two technologies for processing big data sets and data streams. The attackers behind the campaign exploit these issues without authentication to deploy rootkits on the underlying systems and then install a Monero cryptocurrency mining program. “This attack is particularly … Read more

Critical Security Vulnerabilities Identified in ConnectWise ScreenConnect by Gotham Security Researchers

Critical Security Vulnerabilities Identified in ConnectWise ScreenConnect by Gotham Security Researchers

Gotham Security, an Abacus Group company providing high-quality boutique cybersecurity services, has announced that its research team recently discovered two vulnerabilities in ConnectWise ScreenConnect, saving tens of thousands of enterprises from the possible consequences of a significant cyber-attack. ConnectWise ScreenConnect is a remote-control software used by IT managed service providers (MSPs) globally. Had Gotham Security … Read more

FBot Hacking Tool Targets Cloud, Payment Platforms

FBot Hacking Tool Targets Cloud, Payment Platforms

Researchers have discovered a new Python-based hacking tool being leveraged by cybercriminals to target cloud and SaaS platforms, and payment services, like AWS, Office365, PayPal and Twilio. The tool, which is called FBot and has functionalities for harvesting credentials and hijacking accounts, shows the continued interest by cybercriminals in cloud platforms as an attack vector, … Read more

Categories duo

Ivanti Warns of Connect Secure, Policy Secure Zero Days

Ivanti Warns of Connect Secure, Policy Secure Zero Days

Ivanti is warning of two actively exploited vulnerabilities in its Connect Secure and Policy Secure gateways. Currently, the company said it is aware of “less than 10 customers impacted by the vulnerabilities.” Connect Secure and Policy Secure contain a command injection bug (CVE-2024-21887) and an authentication bypass flaw (CVE-2023-46805). If these vulnerabilities are chained together, … Read more

Categories duo

Chinese hackers exploit Ivanti VPN zero days for RCE attacks

Chinese hackers exploit Ivanti VPN zero days for RCE attacks

Two critically severe zero-day vulnerabilities in devices running Ivanti VPN services are being actively exploited by Chinese nation-state actors for unauthenticated remote code execution, according to Volexity research. Tracked as CVE-2023-46805 and CVE-2024-21887, the vulnerabilities, with CVSS scores 8.2 and 9.1 respectively, have been discovered in Ivanti Connect Secure (formerly known as Pulse Connect Secure), … Read more

5 ways to secure identity and access for 2024

5 ways to secure identity and access for 2024

The security landscape is changing fast. In 2023, we saw a record-high 30 billion attempted password attacks per month, a 35% increase in demand for cybersecurity experts, and a 23% annual rise in cases processed by the Microsoft Security Response Center and Security Operations Center teams.1 This increase is due in part to the rise … Read more