"Old-School Attacks Are Still a Danger, Despite Newer Techniques"

"Old-School Attacks Are Still a Danger, Despite Newer Techniques"

Despite all the talk about new technologies such as ChatGPT and the growing complexity of attacks, cybercriminals continue to use numerous basic attacks because they are effective. These attacks, such as phishing attacks and credential harvesting, are designed to exploit human behavior. For example, a recent Cybersecurity and Infrastructure Security Agency (CISA) report discovered that valid account credentials are behind most successful threat actor intrusions into critical infrastructure networks and state and local agencies.

Submitted by Gregory Rigby on

"New Magecart Campaign Alters 404 Error Pages to Steal Shoppers' Credit Cards"

"New Magecart Campaign Alters 404 Error Pages to Steal Shoppers' Credit Cards"

A Magecart campaign has been manipulating websites' default 404 error page to hide malicious code. According to Akamai, the activity targets Magento and WooCommerce websites, with some victims belonging to major food and retail companies. The malicious code snippet was injected into one of the victim websites' first-party resources. This involves directly inserting the code into the HTML pages or in one of the website's first-party scripts.

Submitted by Gregory Rigby on

"D-Link Wi-Fi Range Extender Vulnerable to Command Injection Attacks"

"D-Link Wi-Fi Range Extender Vulnerable to Command Injection Attacks"

The popular D-Link DAP-X1860 Wi-Fi 6 range extender is vulnerable to Denial-of-Service (DoS) and remote command injection. The product is listed as available on D-Link's website and has thousands of reviews on Amazon, indicating that it is a popular option among consumers. A group of German researchers known as RedTeam who discovered the vulnerability, tracked as CVE-2023-45208, report that despite repeated attempts to alert D-Link, the vendor has remained quiet, and no patches have been issued. The issue resides within D-Link DAP-X1860's network scanning functionality.

Submitted by Gregory Rigby on

"Dangerous Vulnerability Can Be Exploited to Carry Out Massive DDoS Attacks"

"Dangerous Vulnerability Can Be Exploited to Carry Out Massive DDoS Attacks"

Cloudflare, Google, and Amazon AWS have disclosed that a zero-day vulnerability called HTTP/2 Rapid Reset in the HTTP/2 protocol has been exploited to launch massive, high-volume Distributed Denial-of-Service (DDoS) attacks. Cloudflare discovered the zero-day vulnerability developed by an unknown threat actor in August 2023. The vulnerability exploits the standard HTTP/2 protocol, a crucial component of the Internet and most websites. This new attack works by making hundreds of thousands of "requests" that are then promptly canceled.

Submitted by Gregory Rigby on

"Cable Giant Volex Targeted in Cyberattack"

"Cable Giant Volex Targeted in Cyberattack"

UK-based cable manufacturing giant Volex was recently targeted in a cyberattack involving unauthorized access to some of the company’s IT systems and data.  The company stated that all its sites remain operational, and it does not expect any financial impact caused by the incident to be material.  However, it did admit that there has been some “minimal disruption to global production levels.”  Specialist third-party consultants have been engaged to investigate the nature and extent of the incident and to implement the incident response plan.

Submitted by Adam Ekwall on

"DNA Tester 23andMe Hit By Credential Stuffing Campaign"

"DNA Tester 23andMe Hit By Credential Stuffing Campaign"

A leading genetics testing firm recently confirmed that threat actors accessed customers’ profile information following a credential stuffing campaign.  San Francisco-headquartered 23andMe offers DNA testing, ancestry information, and personalized health insights for millions of customers.  A threat actor known as “Golem” posted an ad to BreachForums last week, offering “raw data profiles,” “tailored ethnic groupings,” “individualized data sets,” and much more to online buyers.  Prices start at $1,000 for 100 profiles and max out at $100,000 for 100,000 profiles.

Submitted by Adam Ekwall on

"Google Expands Bug Bounty Program With Chrome, Cloud CTF Events"

"Google Expands Bug Bounty Program With Chrome, Cloud CTF Events"

Google has recently announced the expansion of its vulnerability rewards program with two events focused on Chrome’s V8 JavaScript rendering engine and on Kernel-based Virtual Machine (KVM).  The v8CTF, which has already started, allows security researchers to earn monetary rewards for successfully exploiting a V8 version running on Google’s infrastructure.  According to the program’s rules, security researchers submitting valid exploits are eligible for a reward of $10,000.  The kvmCTF is set to be launched later this year.

Submitted by Adam Ekwall on

"DC Board of Elections Discloses Data Breach"

"DC Board of Elections Discloses Data Breach"

The District of Columbia Board of Elections (DCBOE) recently confirmed that voter records were compromised in a data breach at a third-party services provider.  An independent agency of the District of Columbia Government, the DCBOE is responsible for the administration of ballot access, elections, and voter registration.  The agency stated that on 10/5, it became aware of a cybersecurity incident involving DC voter records.  While the incident remains under investigation, DCBOE’s internal databases and servers were not compromised.

Submitted by Adam Ekwall on

"Researchers Exploring a More Secure, Reliable Power Grid With UNC System Support"

"Researchers Exploring a More Secure, Reliable Power Grid With UNC System Support"

A team of researchers led by the University of North Carolina at Charlotte is working to develop a more secure and reliable power grid. The team will build advanced cybersecurity research capacity in order to better understand how to protect and optimize the energy grid as clean energy sources and production continue to evolve globally.

Submitted by Gregory Rigby on

"Red Cross Issues Rules of Engagement for Civilian Hackers"

"Red Cross Issues Rules of Engagement for Civilian Hackers"

The invasion of Ukraine by Russia prompted an unprecedented number of individuals to join patriotic cyber gangs. Therefore, to protect civilians, the International Committee of the Red Cross (ICRC) has published rules of engagement for civilian hackers involved in conflicts. According to the ICRC, this is not the first time civilian hackers have operated in an armed conflict, nor will it be the last.

Submitted by Gregory Rigby on
Subscribe to