“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw [email protected] (The Hacker News)
Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE-2024-48887, carries a CVSS score of 9.3 out of a maximum of 10.0. “An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker…
-
Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal [email protected] (The Hacker News)
Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,Read…
-
Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings [email protected] (The Hacker News)
Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. “One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from aRead More
-
AI agents raise stakes in identity and access management
IT vendors roll out fresh tools to take on identity and access management for AI agents as enterprises deploy them internally and battle malicious ones externally.Read More
-
Agentic AI in the SOC – Dawn of Autonomous Alert Triage [email protected] (The Hacker News)
Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. ManyRead…
-
UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine [email protected] (The Hacker News)
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity is aimed at military formations, law enforcement agencies, and local self-government bodies, particularly those located near Ukraine’s eastern border, the agency said. The attacks involve distributing phishing emailsRead More
-
Ransomware payments: Considerations before paying
To pay or not to pay — that’s the question after a ransomware attack. Law enforcement recommends against it, but that doesn’t stop some companies from paying up.Read More
-
What is a key risk indicator (KRI) and why is it important?
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequences will exceed the organization’s risk appetite.Read More
-
CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation [email protected] (The Hacker News)
A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances.…
-
Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities [email protected] (The Hacker News)
Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two high-severity vulnerabilities are listed below – CVE-2024-53150 (CVSS score: 7.8) – An out-of-bounds flaw in the USB sub-component of Kernel that could result in information disclosure CVE-2024-53197 (CVSS score: 7.8) – A privilege escalation flaw…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova