Month: January 2024
From Dark Reading – Ransomware Groups Gain Clout With False Attack Claims
Technica? Europcar? Cybercriminals are increasingly bluffing about ransomware attacks, and the cybersecurity community is helping by spreading their lies. Read More
From Dark Reading – Fulton County Suffers Power Outages as Cyberattack Continues
County services have come to a halt and are not expected to resume until next week; no threat actor has yet been identified. Read More
From Dark Reading – ‘Leaky Vessels’ Cloud Bugs Allow Container Escapes Globally
The four security vulnerabilities are found in Docker and beyond, and one affecting runC affects essentially every cloud-native developer worldwide. Read More
From Dark Reading – Johnson Controls Ransomware Cleanup Costs Top $27M and Counting
JCI’s latest SEC filing notes that its smart-factory installations weren’t compromised, allaying physical security fears. Read More
From Dark Reading – More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll
Both China-backed APTs and ordinary cyberattackers have seized on a pair of Ivanti VPN bugs for global exploitation. Read More
From Security Week – US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon
[[{“value”:”The US government neutralizes a botnet full of end-of-life Cisco and Netgear routers being by a notorious Chinese APT group. The post US Gov Disrupts SOHO Router Botnet Used…
From The Hacker News – RunC Flaws Enable Container Escapes, Granting Attackers Host Access
Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage follow-on attacks.
The vulnerabilities, tracked as CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653, have been collectively dubbed Leaky Vessels by cybersecurity vendor Snyk.
“These container
From Dark Reading – Looted RIPE Credentials for Sale on the Dark Web
A monitoring exercise identified user details in 716 compromised RIPE NCC accounts, plus other valuable credentials belonging to those victims. Read More
From Security Week – Podcast: Palo Alto Networks Talks IT/OT Convergence
[[{“value”:”SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape. The post Podcast: Palo Alto…
From Cybercrime Magazine – The Spiraling SaaS Stack: Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure
[[{“value”:”SSPM is emerging as the industry’s mission-critical solution – Hananel Livneh, Head of Product Marketing, Adaptive Shield Tel Aviv, Israel – Jan. 31, 2024 The breakneck pace of SaaS…
From Security Week – GNU C Library Vulnerability Leads to Full Root Access
[[{“value”:”Researchers at Qualys call attention to a vulnerability in Linux’s GNU C Library (glibc) that allows full root access to a system. The post GNU C Library Vulnerability Leads…
From Security Week – After Delays, Ivanti Patches Zero-Days and Confirms New Exploit
[[{“value”:”Ivanti documents a brand-new zero-day and belatedly ships patches; Mandiant is reporting “broad exploitation activity.” The post After Delays, Ivanti Patches Zero-Days and Confirms New Exploit appeared first on…