'

Stanford University Hack Exposes Over 27K People’s Data

Stanford University Hack Exposes Over 27K People’s Data

The Stanford University data breach involved a ransomware attack by the Akira ransomware gang. The breach occurred between May 12, 2023, and September 27, 2023, with the university discovering the attack on September 27, 2023. The compromised information varied but could include dates of birth, Social Security numbers, government IDs, passport numbers, driver’s licenses, and … Read more

Sharp Increase in Akira Ransomware Attack Following LockBit Takedown

Sharp Increase in Akira Ransomware Attack Following LockBit Takedown

In the wake of the LockBit ransomware group’s takedown, a shift has occurred within the cybercriminal underworld, leading to a sharp rise in activities by the Akira ransomware collective. This group, known for its sophisticated attacks, particularly against healthcare entities in the US, has seen an influx of talent from the remnants of the notorious … Read more

Andariel Hackers Attacking Asset Management Companies to Inject Malicious Code

Andariel Hackers Attacking Asset Management Companies to Inject Malicious Code

The Andariel threat group was observed conducting persistent attacks against domestic businesses, specifically installing MeshAgent for remote screen control while conducting the attack. MeshAgent collects basic system information for remote management and performs activities such as power and account management, chat or message pop-ups, file upload/download, and command execution.  It also has remote desktop support. … Read more

Google’s Gemini AI Vulnerability Lets Attackers Gain Control Over Users’ Queries

Google’s Gemini AI Vulnerability Lets Attackers Gain Control Over Users’ Queries

Researchers at HiddenLayer have unveiled a series of vulnerabilities within Google’s Gemini AI that could allow attackers to manipulate user queries and control the output of the Large Language Models (LLMs). This revelation has raised concerns over the security and integrity of AI-driven content generation and its implications for misinformation spread and data privacy. The … Read more

ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints

ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints

There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security risks. Research shows NextChat, a popular standalone chatbot with over 7500 exposed instances, is vulnerable to a critical SSRF vulnerability (CVE-2023-49785) that allows attackers to access internal systems and data potentially. User Interface of NextChat … Read more

Magnet-Goblin Hackers Attack Public Services Using 1-Day Exploits

Magnet-Goblin Hackers Attack Public Services Using 1-Day Exploits

A new threat actor, Magnet Goblin, emerged by rapidly exploiting recently disclosed vulnerabilities (CVE-2023-46805 & CVE-2023-21887) in Ivanti Connect Secure VPN, which allowed them to deploy custom Linux backdoors on vulnerable systems. Magnet Goblin has a history of targeting platforms like Magento, Qlik Sense, and potentially Apache ActiveMQ, using similar tactics to gain financial advantage. … Read more

Beware Of Disguised Adobe Reader Installer That Install Infostealer Malware

Beware Of Disguised Adobe Reader Installer That Install Infostealer Malware

An infostealer disguised as the Adobe Reader installation has been observed. The file is disseminated in PDF format and prompts users to download and run it. The fake PDF file, according to AhnLab Security Intelligence Center (ASEC), is written in Portuguese and instructs users to download and install Adobe Reader.  It urges users to download and install … Read more

Patch Tuesday, March 2024 Edition

Patch Tuesday, March 2024 Edition

Apple and Microsoft recently released software updates to fix dozens of security holes in their operating systems. Microsoft today patched at least 60 vulnerabilities in its Windows OS. Meanwhile, Apple’s new macOS Sonoma addresses at least 68 security weaknesses, and its latest updates for iOS fixes two zero-day flaws. Last week, Apple pushed out an … Read more

Microsoft Fixes Critical Windows Hyper-V Flaws

Microsoft Fixes Critical Windows Hyper-V Flaws

Microsoft has patched two critical-severity flaws as part of its regularly scheduled updates, which both exist in Windows Hyper-V. While Microsoft issued fixes for 60 vulnerabilities on Tuesday, there were no zero-day flaws in this month’s security updates. One of the critical flaws in Microsoft’s virtualization platform (CVE-2024-21407) has a CVSS severity score of 8.1 … Read more

Categories duo

ISACA Joins Forces with Erasmus+ for SHE@CYBER Project

ISACA Joins Forces with Erasmus+ for SHE@CYBER Project

ISACA has announced its participation in the Erasmus+ program’s SHE@CYBER project. This initiative, under the EC Cooperation partnerships in vocational education and training, is a concerted effort to address the cybersecurity skills gap in Europe, with a particular focus on empowering women and underrepresented groups in the field. The SHE@CYBER project, coordinated by Vernian RTI – Research, … Read more

CloudGrappler: Open Source Tool that Detects Hacking Activity

CloudGrappler: Open Source Tool that Detects Hacking Activity

CloudGrappler is an innovative open-source tool designed to detect the presence of notorious threat actors in cloud environments. This tool is a beacon of hope for security teams struggling to keep pace with the sophisticated tactics of groups like LUCR-3, also known as Scattered Spider. CloudGrappler leverages the power of CloudGrep, a tool developed by … Read more

Muddled Libra Hackers Using Pentesting Tools To Gain Admin Access

Muddled Libra Hackers Using Pentesting Tools To Gain Admin Access

Threat actors use pentesting tools to identify vulnerabilities and weaknesses in target systems or networks. These tools provide a simulated environment for testing potential attack vectors that allow threat actors to exploit security gaps and gain unauthorized access.  By using pentesting tools, threat actors can assess the effectiveness of their methods and refine their strategies … Read more