"Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability"

"Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability"

The recently disclosed Palo Alto Networks firewall vulnerability tracked as CVE-2024-3400, which has been exploited in attacks for at least one month, has recently been found to impact one of Siemens’ industrial products. In a recent advisory, Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400.

Submitted by Adam Ekwall on

"Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites"

"Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites"

According to Ukraine's Community Emergency Response Team (CERT-UA), Russia's APT44, also known as "Sandworm," launched an attack on Ukrainian critical infrastructure in March. The group targeted 20 sites in an attempt to strengthen the impact of missile strikes on the country. The attack impacted energy, heating, and water facilities in 10 regions of the country.

Submitted by Gregory Rigby on

"Google Mandiant Report Finds Surprising Fall in Time to Detect Cyber Intrusions"

"Google Mandiant Report Finds Surprising Fall in Time to Detect Cyber Intrusions"

According to Mandiant's 15th annual M-Trends 2024 report, global median dwell time, or the average amount of time attackers remain undetected on a target's network after gaining unauthorized access, has reached the lowest point in over a decade. The shorter median dwell time is one of several findings suggesting that organizations have significantly improved their defensive capabilities for detecting malicious activity. Shorter dwell times were found to be driven by a higher proportion of ransomware incidents in 2023, indicating that ransomware is more detectable.

Submitted by Gregory Rigby on

"Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor"

"Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor"

The LockBit ransomware gang has recently leaked 1Gb of data allegedly stolen from the District of Columbia’s Department of Insurance, Securities and Banking (DISB). LockBit claims to be in possession of 800 GB of data pertaining to DISB, the US Securities and Exchange Commission (SEC), Delaware banking institutions, and other financial entities and threatens to release it unless DISB pays a ransom.

Submitted by Adam Ekwall on

"DeFake Tool Protects Voice Recordings From Cybercriminals"

"DeFake Tool Protects Voice Recordings From Cybercriminals"

Ning Zhang, an assistant professor of computer science and engineering at Washington University in St. Louis, was among three winners of the US Federal Trade Commission's (FTC) Voice Cloning Challenge. "DeFake," Zhang's winning project, uses watermarking for voice recordings. The tool adds carefully crafted distortions that are imperceptible to the human ear to recordings, which makes cloning more difficult by removing usable voice samples. DeFake involves applying adversarial Artificial Intelligence (AI).

Submitted by Gregory Rigby on

"Microsoft: APT28 Hackers Exploit Windows Flaw Reported by NSA"

"Microsoft: APT28 Hackers Exploit Windows Flaw Reported by NSA"

Microsoft warns that the Russian threat group "APT28" uses "GooseEgg," a previously unknown hacking tool, to exploit a Windows Print Spooler vulnerability. Through this exploitation, they escalate privileges as well as steal credentials and data. APT28 created this tool to target the vulnerability, tracked as CVE-2022-38028 and reported by the US National Security Agency (NSA.) Redmond fixed the flaw during the Microsoft October 2022 Patch Tuesday.

Submitted by Gregory Rigby on

"Dependency Confusion Vulnerability Found in Apache Project"

"Dependency Confusion Vulnerability Found in Apache Project"

Researchers at Legit Security discovered a dependency confusion vulnerability in an archived Apache project. The finding emphasizes the importance of analyzing third-party projects and dependencies, especially those that have been archived or possibly neglected when it comes to security updates. Dependency confusion, also known as "dependency hijacking" or "substitution attack," allows attackers to launch software supply chain attacks by exploiting vulnerable dependencies in open source software.

Submitted by Gregory Rigby on

"Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers"

"Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers"

According to new research, threat actors can use the DOS-to-NT path conversion process to achieve rootkit-like capabilities and conduct malicious activities such as concealing and impersonating files, directories, and processes. According to SafeBreach security researcher Or Yair, the DOS path at which the file or folder exists is converted to an NT path when a user executes a function with a path argument in Windows. During the conversion process, a known issue occurs: the function removes trailing dots from any path element and trailing spaces from the last path element.

Submitted by Gregory Rigby on

"Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability"

"Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability"

According to the Shadowserver Foundation, a recently addressed vulnerability could affect about 6,000 Internet-accessible Palo Alto Networks firewalls. Palo Alto Networks disclosed the flaw on April 12 and began rolling out patches a few days later. State-sponsored threat actors had exploited the vulnerability, and this activity recently increased after Proof-of-Concept (PoC) code was released.

Submitted by Gregory Rigby on

"Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow"

"Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow"

A hack that caused a small Texas town’s water system to overflow in January has recently been linked to a shadowy Russian hacktivist group. The attack was one of three on small towns in the rural Texas Panhandle. Local officials said the public was not in danger, and the attempts were reported to federal authorities. Mike Cypert, the city manager of Hale Center, said there were 37,000 attempts in four days to log into their firewall. He added that the attempted hack failed as the city “unplugged” the system and operated it manually.

Submitted by Adam Ekwall on
Subscribe to