<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security News Headlines</title>
    <description></description>
    
    <link>https://secnewsheadlines.com/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/VUWmI396RU.xml" rel="self"/>
    
    <lastBuildDate>Mon, 13 Apr 2026 04:44:41 +0000</lastBuildDate>
    <pubDate>Fri, 04 Oct 2024 14:00:00 +0000</pubDate>
    <atom:published>2024-10-04T14:00:00Z</atom:published>
    <atom:updated>2026-04-13T04:44:41Z</atom:updated>
    
      <category>News</category>
      <category>Cybersecurity</category>
      <category>Technology</category>
    <copyright>Copyright 2026, Security News Headlines</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/7eb04422-f950-47bf-bdec-09dbad2dc9b7/robot.png</url>
      <title>Security News Headlines</title>
      <link>https://secnewsheadlines.com/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>Security News Headlines #127</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-127</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-127</guid>
  <pubDate>Fri, 04 Oct 2024 14:00:00 +0000</pubDate>
  <atom:published>2024-10-04T14:00:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> bring critical updates from major cybersecurity agencies and organizations. Today&#39;s bulletin highlights new vulnerabilities, malware targeting Linux systems, the prevention of massive cyberattacks, and the exposure of sensitive data through popular platforms. Additionally, malicious activities in the app ecosystem and industrial control systems demand close attention. These stories reflect the growing sophistication and breadth of threats in the digital landscape.</p><h3 class="heading" style="text-align:start;" id="cisa-adds-one-known-exploited-vulne"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/10/03/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">CISA Adds One Known Exploited Vulnerability to Catalog</a></h3><p class="paragraph" style="text-align:start;">CISA has added a new vulnerability to its Known Exploited Vulnerabilities Catalog. This addition emphasizes the agency&#39;s ongoing effort to keep organizations informed of active threats. Security teams are advised to review and patch affected systems to reduce the risk of exploitation.</p><h3 class="heading" style="text-align:start;" id="cisa-releases-three-industrial-cont"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/10/03/cisa-releases-three-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Three Industrial Control Systems Advisories</a></h3><p class="paragraph" style="text-align:start;">CISA issued advisories for three industrial control systems (ICS), covering vulnerabilities in critical infrastructure. The advisories urge stakeholders to update their systems to prevent potential exploitation that could disrupt essential services. Immediate action is recommended for affected sectors.</p><h3 class="heading" style="text-align:start;" id="google-explores-kyber-implementatio"><a class="link" href="https://security.googleblog.com/2024/09/a-new-path-for-kyber-on-web.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Google Explores Kyber Implementation on the Web</a></h3><p class="paragraph" style="text-align:start;">Google is working on incorporating Kyber, a post-quantum cryptography algorithm, into web technologies. This step is part of its efforts to secure communications against future quantum computing threats. Kyber could play a pivotal role in ensuring long-term data security across the web.</p><h3 class="heading" style="text-align:start;" id="apple-i-os-1801-patches-password-ex"><a class="link" href="https://www.securityweek.com/apple-ios-18-0-1-patches-password-exposure-and-audio-snippet-bugs/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Apple iOS 18.0.1 Patches Password Exposure and Audio Snippet Bugs</a></h3><p class="paragraph" style="text-align:start;">Apple’s iOS 18.0.1 update fixes vulnerabilities that exposed passwords and allowed unauthorized access to audio snippets. These flaws could have compromised user privacy and security. Users are encouraged to update their devices to safeguard against these risks.</p><h3 class="heading" style="text-align:start;" id="perfctl-malware-targets-millions-of"><a class="link" href="https://www.aquasec.com/blog/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Perfctl Malware Targets Millions of Linux Servers</a></h3><p class="paragraph" style="text-align:start;">Perfctl, a stealthy malware, is infecting millions of Linux servers worldwide. This malware is designed to evade detection and compromise critical systems, representing a significant threat to enterprises. Administrators are urged to implement robust security measures to mitigate this risk.</p><h3 class="heading" style="text-align:start;" id="word-press-lite-speed-cache-plugin-"><a class="link" href="https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">WordPress LiteSpeed Cache Plugin Exploited</a></h3><p class="paragraph" style="text-align:start;">A vulnerability in the WordPress LiteSpeed Cache plugin has been exploited in the wild. Attackers can use this flaw to gain unauthorized access to websites and execute malicious code. Website administrators should update the plugin immediately to prevent exploitation.</p><h3 class="heading" style="text-align:start;" id="cloud-compromise-feeds-ai-powered-s"><a class="link" href="https://krebsonsecurity.com/2024/10/a-single-cloud-compromise-can-feed-an-army-of-ai-sex-bots/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Cloud Compromise Feeds AI-Powered Sex Bots</a></h3><p class="paragraph" style="text-align:start;">A cloud compromise has been found to fuel AI-driven sex bots, exploiting personal data to create convincing profiles for online scams. This incident underscores the need for stronger cloud security measures as AI-powered threats grow more complex and pervasive.</p><h3 class="heading" style="text-align:start;" id="cloudflare-thwarts-largest-ever-38-"><a class="link" href="https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Cloudflare Thwarts Largest-Ever 38 Tbps DDoS Attack</a></h3><p class="paragraph" style="text-align:start;">Cloudflare successfully mitigated the largest Distributed Denial of Service (DDoS) attack on record, peaking at 38 Tbps. The scale of this attack highlights the increasing capabilities of cybercriminals and the importance of robust DDoS defenses for protecting critical online services.</p><h3 class="heading" style="text-align:start;" id="pig-butchering-scam-apps-found-on-g"><a class="link" href="https://www.bleepingcomputer.com/news/security/pig-butchering-trading-apps-found-on-google-play-app-store/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">“Pig Butchering” Scam Apps Found on Google Play and App Store</a></h3><p class="paragraph" style="text-align:start;">Fraudulent trading apps associated with the &quot;Pig Butchering&quot; scam have been discovered on Google Play and the App Store. These apps trick users into fake investments, draining their funds. Users should be cautious when downloading financial apps and verify their legitimacy.</p><h3 class="heading" style="text-align:start;" id="viser-bank-malware-impacts-financia"><a class="link" href="https://www.silentpush.com/blog/viserbank/?utm_source=rss&utm_medium=rss&utm_campaign=viserbank" target="_blank" rel="noopener noreferrer nofollow">ViserBank Malware Impacts Financial Institutions</a></h3><p class="paragraph" style="text-align:start;">ViserBank malware has been detected targeting financial institutions, using advanced tactics to evade detection and steal sensitive data. The malware’s stealthy nature makes it a potent threat to banks and payment services. Security teams are advised to monitor and fortify defenses.</p><h3 class="heading" style="text-align:start;" id="cyberattack-disrupts-detroit-wayne-"><a class="link" href="https://therecord.media/detroit-wayne-county-services-impacted-cyberattack?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Cyberattack Disrupts Detroit Wayne County Services</a></h3><p class="paragraph" style="text-align:start;">A cyberattack has disrupted services in Detroit&#39;s Wayne County, affecting multiple government departments. This attack has resulted in delays and system outages, underscoring the vulnerabilities of public sector infrastructure to cyber threats.</p><h3 class="heading" style="text-align:start;" id="maldaptive-a-new-open-source-framew"><a class="link" href="https://www.helpnetsecurity.com/2024/10/04/maldaptive-open-source-framework-for-ldap-searchfilter-parsing-obfuscation/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Maldaptive: A New Open-Source Framework for LDAP Obfuscation</a></h3><p class="paragraph" style="text-align:start;">Maldaptive, a new open-source framework, helps obfuscate LDAP search filters to prevent injection attacks. This tool can be used to improve the security of LDAP directories by reducing the risk of exploitation through search filter vulnerabilities.</p><h3 class="heading" style="text-align:start;" id="cosmicsting-hack-affects-major-corp"><a class="link" href="https://www.theregister.com/2024/10/04/cisco_ray_ban_whirpool_cosmicsting_hack/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Cosmicsting Hack Affects Major Corporations</a></h3><p class="paragraph" style="text-align:start;">Several major corporations, including Cisco and Whirlpool, have fallen victim to the Cosmicsting hack, which exposed sensitive corporate data. The breach demonstrates how sophisticated cyberattacks continue to target high-profile organizations across different sectors.</p><h3 class="heading" style="text-align:start;" id="persistent-linux-malware-infects-th"><a class="link" href="https://arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Persistent Linux Malware Infects Thousands Since 2021</a></h3><p class="paragraph" style="text-align:start;">A newly discovered strain of persistent Linux malware has infected thousands of systems undetected since 2021. The malware’s ability to evade traditional security tools poses a significant challenge to Linux administrators. Affected organizations are advised to review their systems for potential compromises.</p><h3 class="heading" style="text-align:start;" id="thousands-of-dray-tek-routers-at-ri"><a class="link" href="https://www.darkreading.com/endpoint-security/thousands-draytek-routers-at-risk-14-new-vulnerabilities?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Thousands of DrayTek Routers at Risk from 14 New Vulnerabilities</a></h3><p class="paragraph" style="text-align:start;">14 vulnerabilities in DrayTek routers have put thousands of devices at risk of exploitation. These flaws could allow attackers to remotely control affected routers, jeopardizing network security. DrayTek users should apply patches immediately to protect against these threats.</p><h3 class="heading" style="text-align:start;" id="exposing-the-credential-stuffing-ec"><a class="link" href="https://www.kasada.io/exposing-the-credential-stuffing-ecosystem/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-127" target="_blank" rel="noopener noreferrer nofollow">Exposing the Credential Stuffing Ecosystem</a></h3><p class="paragraph" style="text-align:start;">A deep dive into the credential-stuffing ecosystem reveals how attackers exploit stolen credentials to automate login attempts across multiple sites. The study shows how these attacks fuel various online fraud schemes and emphasizes the need for stronger authentication methods.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=847e927a-dd7d-4a28-8bd7-d5ff2be79266&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #126</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-126</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-126</guid>
  <pubDate>Thu, 03 Oct 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-10-03T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Today’s cybersecurity news reveals a mixture of new vulnerabilities, sophisticated hacking campaigns, and innovative tools for defending systems. Critical updates include new zero-day exploits, advanced threat actor strategies, and growing concerns over vulnerabilities affecting open-source platforms and trusted software repositories. Here&#39;s a summary of today&#39;s top stories.</p><h3 class="heading" style="text-align:start;" id="cisa-adds-one-known-exploited-vulne"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/10/02/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">CISA Adds One Known Exploited Vulnerability to Catalog</a></h3><p class="paragraph" style="text-align:start;">CISA added a new vulnerability to its Known Exploited Vulnerabilities catalog. The flaw, impacting Zimbra Collaboration software, has been actively exploited in attacks. CISA urges affected users to apply the latest security patches to prevent potential compromises.</p><h3 class="heading" style="text-align:start;" id="cups-attack-zero-day-vulnerability-"><a class="link" href="https://jfrog.com/blog/cups-attack-zero-day-vulnerability-all-you-need-to-know/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">CUPS Attack: Zero-Day Vulnerability – All You Need to Know</a></h3><p class="paragraph" style="text-align:start;">A newly disclosed zero-day vulnerability in CUPS (Common UNIX Printing System) threatens millions of devices running macOS and Linux. Hackers can exploit this flaw to escalate privileges and gain unauthorized system control. The vulnerability impacts many devices, making it critical for users to apply patches once available.</p><h3 class="heading" style="text-align:start;" id="fin-7-malware-uses-deepfake-ai-in-h"><a class="link" href="https://www.silentpush.com/blog/fin7-malware-deepfake-ai-honeypot/?utm_source=rss&utm_medium=rss&utm_campaign=fin7-malware-deepfake-ai-honeypot" target="_blank" rel="noopener noreferrer nofollow">FIN7 Malware Uses Deepfake AI in Honeypot Attack</a></h3><p class="paragraph" style="text-align:start;">The notorious FIN7 hacking group has been deploying sophisticated malware, incorporating deepfake AI in honeypot attacks. These malicious tactics lure victims into interacting with fake entities, leading to data theft and further network compromise. FIN7&#39;s AI-based campaigns mark an evolution in social engineering techniques.</p><h3 class="heading" style="text-align:start;" id="machine-learning-in-threat-hunting"><a class="link" href="https://securelist.com/machine-learning-in-threat-hunting/114016/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Machine Learning in Threat Hunting</a></h3><p class="paragraph" style="text-align:start;">This article explores how machine learning is transforming threat hunting, enabling faster detection of malware and anomalous behaviors. By automating data analysis, machine learning models can sift through vast amounts of network activity, highlighting suspicious patterns and reducing the time it takes to neutralize threats.</p><h3 class="heading" style="text-align:start;" id="andariel-hacker-group-shifts-focus-"><a class="link" href="https://thehackernews.com/2024/10/andariel-hacker-group-shifts-focus-to.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Andariel Hacker Group Shifts Focus to Ransomware</a></h3><p class="paragraph" style="text-align:start;">The Andariel group, affiliated with North Korea, has pivoted from traditional cyber espionage to ransomware attacks targeting critical infrastructure. Recent campaigns show a preference for extortion and disruption, signaling a more aggressive stance in their operations.</p><h3 class="heading" style="text-align:start;" id="stonefly-extortion-operations-linke"><a class="link" href="https://symantec-enterprise-blogs.security.com/threat-intelligence/stonefly-north-korea-extortion?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Stonefly Extortion Operations Linked to North Korean Hackers</a></h3><p class="paragraph" style="text-align:start;">Stonefly, another North Korean threat actor, has been linked to ongoing extortion campaigns. Their latest tactics involve targeting organizations with high-value assets, demanding hefty ransoms. The group&#39;s strategies highlight the growing trend of state-backed ransomware attacks.</p><h3 class="heading" style="text-align:start;" id="zimbra-post-journal-flaw-cve-202445"><a class="link" href="https://securityaffairs.com/169239/hacking/zimbra-postjournal-flaw-cve-2024-45519-exploited.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Zimbra PostJournal Flaw (CVE-2024-45519) Exploited</a></h3><p class="paragraph" style="text-align:start;">A critical flaw in Zimbra&#39;s PostJournal feature (CVE-2024-45519) is under active exploitation. Attackers can use this vulnerability to compromise email servers, gaining unauthorized access to sensitive communications. Patching immediately is strongly recommended to mitigate this risk.</p><h3 class="heading" style="text-align:start;" id="bulbature-beneath-the-waves-of-go-b"><a class="link" href="https://blog.sekoia.io/bulbature-beneath-the-waves-of-gobrat/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Bulbature: Beneath the Waves of GoBrAT</a></h3><p class="paragraph" style="text-align:start;">Bulbature is a newly observed threat using GoBrAT (GoLang-based Remote Access Trojan) in highly targeted attacks. This malware leverages legitimate services for communication, making detection difficult. Its modular design allows attackers to extend its capabilities post-compromise.</p><h3 class="heading" style="text-align:start;" id="py-pi-repository-found-hosting-fake"><a class="link" href="https://thehackernews.com/2024/10/pypi-repository-found-hosting-fake.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">PyPI Repository Found Hosting Fake Packages</a></h3><p class="paragraph" style="text-align:start;">A new wave of malicious packages was discovered on the PyPI (Python Package Index) repository, disguising malware as legitimate tools. These packages can steal sensitive data or inject backdoors into applications. Developers are urged to verify package sources to avoid contamination.</p><h3 class="heading" style="text-align:start;" id="suricata-open-source-network-analys"><a class="link" href="https://www.helpnetsecurity.com/2024/10/02/suricata-open-source-network-analysis-threat-detection/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Suricata: Open-Source Network Analysis and Threat Detection</a></h3><p class="paragraph" style="text-align:start;">Suricata, an open-source network security tool, has become increasingly popular for its robust threat detection and analysis capabilities. Its latest release introduces enhanced support for emerging attack vectors, making it a vital tool for organizations aiming to bolster their defenses.</p><h3 class="heading" style="text-align:start;" id="halberd-the-open-source-tool-democr"><a class="link" href="https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Halberd: The Open-Source Tool Democratizing Multi-Cloud Security Testing</a></h3><p class="paragraph" style="text-align:start;">Halberd is a new open-source tool designed to enhance security testing in multi-cloud environments. Its ability to identify vulnerabilities across different cloud providers makes it valuable for businesses managing complex infrastructure. The tool’s accessibility ensures more organizations can proactively safeguard their cloud assets.</p><h3 class="heading" style="text-align:start;" id="fake-disney-activation-page-redirec"><a class="link" href="https://www.malwarebytes.com/blog/scams/2024/10/fake-disney-activation-page-redirects-to-pornographic-scam?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Fake Disney Activation Page Redirects to Pornographic Scam</a></h3><p class="paragraph" style="text-align:start;">A malicious scam posing as a Disney activation page has been circulating, tricking users into visiting pornographic sites. These scams aim to steal credentials and distribute malware. Users should be wary of unexpected activation requests and verify the authenticity of websites before proceeding.</p><h3 class="heading" style="text-align:start;" id="arc-browser-launches-bug-bounty-pro"><a class="link" href="https://www.bleepingcomputer.com/news/security/arc-browser-launches-bug-bounty-program-after-fixing-rce-bug/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-126" target="_blank" rel="noopener noreferrer nofollow">Arc Browser Launches Bug Bounty Program After Fixing RCE Bug</a></h3><p class="paragraph" style="text-align:start;">Arc Browser has launched a bug bounty program following the patching of a severe remote code execution (RCE) vulnerability. The program incentivizes researchers to report security flaws, ensuring continuous improvement in the browser’s defenses.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b54ba990-2f94-4d54-bcb6-8361065836a5&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #125</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-125</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-125</guid>
  <pubDate>Wed, 02 Oct 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-10-02T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> cover significant developments in safeguarding networks, critical infrastructure, and personal data. From the latest advisories on industrial control systems to tips for bug bounty beginners and the risks posed by unsecure Wi-Fi networks, these stories underscore the importance of maintaining robust security practices in both personal and industrial environments.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/10/01/cisa-releases-two-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Two Industrial Control Systems Advisories</a></b><br>CISA has issued two new advisories regarding vulnerabilities in industrial control systems (ICS). The flaws could allow attackers to disrupt critical infrastructure operations. Administrators are urged to apply mitigations and patch affected systems to prevent exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.intigriti.com/hacking-tools/7-tips-for-bug-bounty-beginners?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">7 Tips for Bug Bounty Beginners</a></b><br>Intigriti offers practical advice for newcomers to bug bounty programs. The tips include understanding scopes, learning from existing reports, and staying persistent. These strategies can help aspiring hackers succeed in identifying vulnerabilities while contributing to stronger cybersecurity.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://aws.amazon.com/blogs/security/keep-your-firewall-rules-up-to-date-with-network-firewall-features/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">Keep Your Firewall Rules Up to Date with AWS Network Firewall Features</a></b><br>AWS introduces new features to automate the management of firewall rules, ensuring continuous protection against threats. These updates simplify the process of keeping firewall configurations current, minimizing the risk of unauthorized network access.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/microsoft-defender-now-automatically-detects-unsecure-wi-fi-networks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">Microsoft Defender Now Automatically Detects Unsecure Wi-Fi Networks</a></b><br>Microsoft Defender has been upgraded to automatically detect unsecure Wi-Fi networks, helping users stay protected when connecting to public hotspots. This new feature alerts users to potential risks and recommends safer alternatives, enhancing personal and enterprise security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/169139/cyber-crime/patelco-credit-union-data-breach.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">Patelco Credit Union Data Breach Exposes Customer Data</a></b><br>A data breach at Patelco Credit Union has exposed sensitive customer information. Cybercriminals gained unauthorized access to systems, leading to the compromise of personal and financial data. Affected users are advised to monitor their accounts and report any suspicious activity.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://techcrunch.com/2024/09/30/how-to-make-your-own-encrypted-vpn-server-in-15-minutes/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">How to Make Your Own Encrypted VPN Server in 15 Minutes</a></b><br>TechCrunch offers a step-by-step guide to setting up a personal encrypted VPN server in under 15 minutes. This simple method provides enhanced privacy and security, allowing users to protect their internet traffic from surveillance and hackers.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.netskope.com/blog/netskope-threat-labs-uncovers-new-xworms-stealthy-techniques?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">Netskope Threat Labs Uncovers New Xworm&#39;s Stealthy Techniques</a></b><br>Netskope researchers have identified new stealth techniques used by the Xworm malware, allowing it to evade detection. The malware targets Windows systems with advanced evasion tactics, emphasizing the need for comprehensive endpoint security solutions.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bitdefender.com/blog/hotforsecurity/british-man-used-genealogy-websites-to-fuel-alleged-hacking-and-insider-trading-scheme/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">British Man Used Genealogy Websites for Insider Trading Scheme</a></b><br>A British man allegedly used genealogy websites to gain access to confidential data and conduct insider trading. This case highlights the unintended security risks posed by seemingly harmless online platforms and the importance of securing personal information.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://research.checkpoint.com/2024/breaking-boundaries-investigating-vulnerable-drivers-and-mitigating-risks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks</a></b><br>Checkpoint Research explores vulnerabilities in hardware drivers that could allow attackers to escalate privileges. The report stresses the importance of applying security patches and monitoring for driver vulnerabilities to safeguard systems from exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/cyber-risk/ferc-updates-supply-chain-security-power-plants?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">FERC Updates Supply Chain Security for Power Plants</a></b><br>The Federal Energy Regulatory Commission (FERC) has updated its guidelines to improve supply chain security for power plants. The updates aim to mitigate risks posed by third-party vendors and ensure the resilience of critical energy infrastructure.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://aws.amazon.com/blogs/security/how-to-implement-relationship-based-access-control-with-amazon-verified-permissions-and-amazon-neptune/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">How to Implement Relationship-Based Access Control with AWS</a></b><br>Amazon provides a guide to implementing relationship-based access control (ReBAC) using Amazon Verified Permissions and Amazon Neptune. This model allows more dynamic and context-aware access management, enhancing security for complex systems.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/jpcert-shares-windows-event-log-tips-to-detect-ransomware-attacks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-125" target="_blank" rel="noopener noreferrer nofollow">JPCERT Shares Windows Event Log Tips to Detect Ransomware Attacks</a></b><br>JPCERT has published guidance on using Windows Event Logs to detect ransomware attacks early. By analyzing specific log patterns, administrators can identify suspicious activity before encryption occurs, helping to mitigate ransomware impacts.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b244e60e-67d4-43d9-b11b-a734e1397a3e&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #124</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-124</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-124</guid>
  <pubDate>Tue, 01 Oct 2024 14:30:00 +0000</pubDate>
  <atom:published>2024-10-01T14:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> bring updates on nation-state botnet threats, vulnerabilities in widely used systems, and evolving ransomware and cryptojacking attacks. From enhanced cloud security measures to cryptojacking attacks on Docker, these stories highlight the critical nature of staying ahead of cyber threats with advanced security tactics.</p><p class="paragraph" style="text-align:start;">Collaboration between government and private entities continues to play a significant role in the fight against cybercrime.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://media.defense.gov/2024/Sep/18/2003547016/-1/-1/0/CSA-PRC-LINKED-ACTORS-BOTNET.PDF?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">PRC-Linked Actors Exploit Botnet to Target U.S. Systems</a></b><br>A report reveals that People’s Republic of China-linked cyber actors are leveraging botnets to conduct espionage and sabotage U.S. critical infrastructure. The document outlines their sophisticated techniques and highlights the increasing threat posed by state-sponsored hacking groups.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/30/cisas-vdp-platform-2023-annual-report-showcases-success?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">CISA’s VDP Platform 2023 Report Showcases Success</a></b><br>CISA&#39;s 2023 Vulnerability Disclosure Program (VDP) report highlights the discovery and remediation of over 3,000 vulnerabilities. The VDP continues to prove essential for finding security flaws in federal systems, bolstering the defense of critical infrastructure.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/30/cisa-adds-four-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Four Known Exploited Vulnerabilities to Catalog</a></b><br>CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog. These vulnerabilities, actively used by attackers, affect popular software like VMware, Google, and Cisco products. System administrators are urged to prioritize patching.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.greynoise.io/blog/what-are-hackers-searching-for-in-solarwinds-serv-u-cve-2024-28995?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Hackers Target SolarWinds Serv-U in CVE-2024-28995 Exploits</a></b><br>Hackers are actively scanning for unpatched instances of SolarWinds Serv-U to exploit CVE-2024-28995. This vulnerability allows remote code execution, making it a lucrative target for attackers seeking unauthorized system access. Timely patching is critical.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/10/new-cryptojacking-attack-targets-docker.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">New Cryptojacking Attack Targets Docker Environments</a></b><br>A cryptojacking campaign is targeting Docker containers to mine cryptocurrency. This attack hijacks Docker’s resources, leading to performance degradation and potential security risks. Organizations using Docker should implement stringent security configurations to mitigate this threat.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Storm-0501 Ransomware Attacks Expand to Hybrid Cloud Environments</a></b><br>The notorious Storm-0501 ransomware group has shifted its attacks to hybrid cloud environments, complicating traditional defenses. Microsoft warns that the group&#39;s techniques now combine on-premises and cloud-based attack vectors, urging organizations to improve their cloud security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Rackspace Zero-Day Attack Hits Cloud Servers</a></b><br>Rackspace cloud servers have been hit by a zero-day attack, exposing customer data to potential compromise. The attack has exploited an unpatched vulnerability, prompting urgent calls for enhanced cloud security measures and patching protocols.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://research.openanalysis.net/latrodectus/config/emulation/2024/09/30/latrodectus.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Latrodectus Malware Emulation Report Unveils Dangerous Configurations</a></b><br>New research into Latrodectus malware configurations uncovers tactics used for data exfiltration and remote control. The malware&#39;s sophisticated command-and-control (C2) structure allows it to evade detection, posing a severe threat to enterprise security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://intel471.com/blog/detecting-malware-abusing-google-for-c2?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Detecting Malware Abusing Google for Command-and-Control</a></b><br>Cybercriminals are abusing Google services for C2 (command-and-control) operations to evade detection. By leveraging legitimate platforms like Google Docs or Drive, attackers can maintain persistent communication with infected systems. Organizations must update their security filters to detect such misuse.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://krebsonsecurity.com/2024/09/crooked-cops-stolen-laptops-the-ghost-of-ugnazi/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Crooked Cops and Stolen Laptops: The Ghost of UGNazi</a></b><br>An investigation into the remnants of the UGNazi hacking group reveals their connections to corrupt law enforcement officials and involvement in selling stolen laptops. This exposé uncovers a deep web of criminal activity still tied to this defunct group.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-overhauls-security-for-publishing-edge-extensions/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Microsoft Overhauls Security for Publishing Edge Extensions</a></b><br>Microsoft has strengthened the security for publishing Edge browser extensions, aiming to prevent malicious add-ons. The new process includes stricter verification protocols to protect users from installing harmful extensions that could compromise their privacy or systems.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://arstechnica.com/security/2024/09/systems-used-by-courts-and-govs-across-the-us-riddled-with-vulnerabilities/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">U.S. Government Systems Riddled with Vulnerabilities, Report Finds</a></b><br>A report reveals that systems used by U.S. courts and government agencies are plagued with vulnerabilities, leaving them open to cyberattacks. The vulnerabilities range from outdated software to poor patch management, highlighting the urgent need for reform in public sector cybersecurity practices.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/10/free-sniper-dz-phishing-tools-fuel.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-124" target="_blank" rel="noopener noreferrer nofollow">Free Phishing Tools Fuel Rise in Attacks by Sniper-Dz Group</a></b><br>The Sniper-Dz group is using freely available phishing tools to conduct widespread attacks. These tools, accessible on dark web forums, enable even low-skilled hackers to launch effective phishing campaigns, resulting in a surge of credential theft and fraud.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=d23ed6b6-06e8-4c67-a03e-2871f008ca8d&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #123</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-123</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-123</guid>
  <pubDate>Mon, 30 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-30T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> bring a wide array of critical updates across the cybersecurity landscape, from simplifying digital estate defense to evolving vulnerabilities and advanced threats. Key developments span vulnerabilities in major systems, ransomware attacks, and notable efforts to enhance security infrastructure. These stories emphasize the growing complexity of securing digital ecosystems and the ongoing innovations to address modern threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/09/18/how-comprehensive-security-simplifies-the-defense-of-your-digital-estate/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">How Comprehensive Security Simplifies the Defense of Your Digital Estate</a></b><br>Microsoft discusses the importance of holistic security strategies in defending digital estates. By integrating identity, threat, information, and device protection, organizations can reduce complexity and improve security outcomes. This approach simplifies the management of multiple security solutions, leading to stronger, more streamlined defenses.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/endpoint-security/millions-kia-vehicles-remote-hacks-license-plate?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Millions of Kia Vehicles Exposed to Remote Hacks via License Plate</a></b><br>Hackers have found a way to remotely exploit vulnerabilities in Kia vehicles through their license plate recognition systems. This flaw allows attackers to unlock, start, and steal vehicles. Millions of cars are at risk, raising concerns about the broader security implications of smart vehicles and connected technology.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-recall-now-can-be-removed-is-more-secure/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Microsoft Windows ‘Recall’ Can Now Be Removed, Is More Secure</a></b><br>Microsoft has updated the Windows &quot;Recall&quot; feature, allowing users to remove it and benefit from improved security. The update addresses several vulnerabilities and makes it easier for enterprises to manage systems without compromising safety. This development marks another step in Microsoft’s ongoing efforts to enhance Windows security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.welivesecurity.com/en/cybersecurity/dont-panic-tips-staying-safe-scareware/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Don’t Panic! Tips for Staying Safe from Scareware</a></b><br>Scareware, fake pop-ups that trick users into downloading malicious software, remains a prevalent threat. This article offers practical advice to stay safe, such as avoiding unsolicited downloads, using reputable security software, and learning how to identify suspicious alerts. Education and vigilance are key to avoiding scareware traps.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.helpnetsecurity.com/2024/09/27/tosint-open-source-telegram-osint-tool/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">TOSINT: Open Source Telegram OSINT Tool Released</a></b><br>A new open-source tool, TOSINT, allows cybersecurity researchers to extract valuable OSINT data from Telegram, a platform often used for illicit activities. TOSINT enhances the ability to monitor and analyze threat actors&#39; behavior within this encrypted environment, providing a powerful resource for threat intelligence.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Google Aims to Eliminate Memory Safety Vulnerabilities in Android</a></b><br>Google is prioritizing memory safety in Android with new tools and strategies aimed at reducing vulnerabilities that lead to memory corruption. By enhancing system protections, they seek to cut down on exploitation opportunities, particularly those tied to common flaws like buffer overflows.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.oligo.security/blog/new-remote-code-execution-vulnerabilities-in-cups-for-linux-threats-and-mitigations?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">New Remote Code Execution Vulnerabilities Discovered in Linux CUPS</a></b><br>A serious remote code execution vulnerability has been found in CUPS, the Linux printing system. The flaw allows attackers to execute arbitrary code on affected systems. Experts recommend applying patches immediately and strengthening network security to mitigate potential risks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://arstechnica.com/ai/2024/09/ai-defeats-traffic-image-captcha-in-another-triumph-of-machine-over-man/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">AI Defeats Traffic Image CAPTCHA in Another Triumph of Machine Over Man</a></b><br>AI has once again bested CAPTCHA, specifically image-based tests involving traffic scenes. This breakthrough highlights the increasing ability of AI to overcome human-designed security mechanisms. As CAPTCHA’s effectiveness fades, there’s a growing need for new methods to distinguish humans from bots.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/vulnerabilities-threats/exploit-chain-windows-uac-bypass?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Exploit Chain Bypasses Windows UAC, Threatens System Security</a></b><br>A newly discovered exploit chain can bypass Windows UAC (User Account Control), allowing attackers to gain higher-level system privileges. This vulnerability highlights a critical flaw in Windows&#39; security model, making systems more susceptible to malicious attacks if left unpatched.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.theregister.com/2024/09/27/microsoft_storm_0501/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Microsoft Disrupts Storm-0501 Threat Group’s Network Infrastructure</a></b><br>Microsoft has successfully disrupted the network infrastructure of the Storm-0501 threat group, known for orchestrating large-scale cyberattacks. This action is part of ongoing efforts to dismantle sophisticated cybercriminal organizations targeting government and corporate networks worldwide.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/169056/security/progress-software-whatsup-gold-critical-bugs.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Progress Software&#39;s WhatsUp Gold Vulnerabilities Expose Systems to Critical Bugs</a></b><br>Critical vulnerabilities have been identified in Progress Software&#39;s WhatsUp Gold, an IT management tool. Exploiting these flaws could allow attackers to compromise network systems. Organizations are urged to apply available patches to prevent potential security breaches.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://security.googleblog.com/2024/09/google-arm-raising-bar-on-gpu-security.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Google and ARM Collaborate to Raise GPU Security Standards</a></b><br>Google and ARM are teaming up to improve the security of GPUs (Graphics Processing Units), a critical component in many modern computing environments. Their efforts focus on addressing weaknesses that could be exploited for cyberattacks, particularly in areas related to rendering and gaming applications.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darpa.mil/news-events/2024-09-23?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">DARPA Advances AI-Powered Cybersecurity Defense Initiatives</a></b><br>DARPA has announced new projects focused on leveraging AI to bolster cybersecurity defenses. These initiatives aim to automate threat detection and response, enhancing the ability to counter sophisticated cyberattacks in real time. The move represents a significant investment in AI-driven security solutions.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-123" target="_blank" rel="noopener noreferrer nofollow">Embargo Ransomware Expands Attacks to Cloud Environments</a></b><br>The Embargo ransomware group has shifted its focus to targeting cloud environments. This escalation poses a greater risk to businesses that rely on cloud services for critical operations. Security experts recommend enhanced cloud security measures and backups to mitigate the growing threat of ransomware attacks.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=ccdb4fca-801b-41d1-86bd-c5e9bb7d6bed&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #122</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-122</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-122</guid>
  <pubDate>Fri, 27 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-27T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Today&#39;s cybersecurity news covers a range of important updates, including newly released patches for critical vulnerabilities, fresh insights on malware tactics, and significant data leaks. We also examine threats targeting the human factor in election security and phishing, highlight a widespread vulnerability in a WordPress plugin, and discuss updates on AI vulnerability research and password management rules. Stay informed to safeguard your systems against evolving cyber risks.</p><h3 class="heading" style="text-align:start;" id="cisco-releases-security-updates-for"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/26/cisco-releases-security-updates-ios-and-ios-xe-software?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Cisco Releases Security Updates for IOS and IOS XE Software</a></h3><p class="paragraph" style="text-align:start;">Cisco has released updates to patch vulnerabilities in IOS and IOS XE software. These updates address flaws that could allow attackers to gain control of devices or cause service disruptions. Users are urged to apply these patches immediately to protect their networks from potential exploitation.</p><h3 class="heading" style="text-align:start;" id="us-and-international-partners-relea"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/26/asds-acsc-cisa-and-us-and-international-partners-release-guidance-detecting-and-mitigating-active?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">US and International Partners Release Guidance on Active Detection and Mitigation</a></h3><p class="paragraph" style="text-align:start;">CISA and its international partners have released a joint advisory providing guidance on detecting and mitigating active cyber threats. The document emphasizes the importance of implementing strong defensive measures, particularly against ongoing cyber campaigns that target critical infrastructure.</p><h3 class="heading" style="text-align:start;" id="cisa-issues-five-industrial-control"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/26/cisa-releases-five-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">CISA Issues Five Industrial Control Systems Advisories</a></h3><p class="paragraph" style="text-align:start;">CISA has published five security advisories for Industrial Control Systems (ICS). These advisories address vulnerabilities in commonly used ICS software and hardware, with potential risks including unauthorized access and disruption of industrial processes. Users should review and apply necessary mitigations.</p><h3 class="heading" style="text-align:start;" id="90000-word-press-sites-affected-by-"><a class="link" href="https://www.wordfence.com/blog/2024/09/90000-wordpress-sites-affected-by-arbitrary-file-upload-and-authentication-bypass-vulnerabilities-in-jupiter-x-core-wordpress-plugin/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">90,000 WordPress Sites Affected by Jupiter X Core Plugin Vulnerabilities</a></h3><p class="paragraph" style="text-align:start;">The Jupiter X Core plugin for WordPress has critical vulnerabilities impacting over 90,000 websites. These flaws allow arbitrary file uploads and authentication bypass, putting sites at risk of compromise. Site administrators are strongly advised to update the plugin to the latest version.</p><h3 class="heading" style="text-align:start;" id="black-berry-report-reveals-new-malw"><a class="link" href="https://blogs.blackberry.com/en/2024/09/threat-report-uncovers-malware-tactic-cyberattacks?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">BlackBerry Report Reveals New Malware Tactics in Cyberattacks</a></h3><p class="paragraph" style="text-align:start;">A new report from BlackBerry highlights emerging malware tactics used in cyberattacks. The report uncovers techniques such as stealthy fileless malware and advanced evasion strategies. Organizations are encouraged to enhance their detection capabilities to counter these sophisticated threats.</p><h3 class="heading" style="text-align:start;" id="aws-blog-migrating-3-des-keys-from-"><a class="link" href="https://aws.amazon.com/blogs/security/how-to-migrate-3des-keys-from-a-fips-to-a-non-fips-aws-cloudhsm-cluster/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">AWS Blog: Migrating 3DES Keys from FIPS to Non-FIPS CloudHSM Clusters</a></h3><p class="paragraph" style="text-align:start;">AWS provides detailed guidance on migrating 3DES encryption keys from FIPS-certified to non-FIPS CloudHSM clusters. This tutorial is designed to assist users in maintaining security while managing their cryptographic environments during the migration process.</p><h3 class="heading" style="text-align:start;" id="critical-nvidia-ai-vulnerability-un"><a class="link" href="https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Critical NVIDIA AI Vulnerability Uncovered by Wiz Researchers</a></h3><p class="paragraph" style="text-align:start;">Wiz researchers have discovered a critical vulnerability in NVIDIA’s AI infrastructure, potentially allowing attackers to exploit the system. The flaw affects AI models used in various industries, posing risks to data integrity and privacy. NVIDIA is expected to release patches soon.</p><h3 class="heading" style="text-align:start;" id="phishing-and-social-engineering-thr"><a class="link" href="https://www.greynoise.io/blog/phishing-and-social-engineering-the-human-factor-in-election-security?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Phishing and Social Engineering Threats in Election Security</a></h3><p class="paragraph" style="text-align:start;">An analysis by GreyNoise reveals that phishing and social engineering remain significant threats to election security. These tactics exploit human vulnerabilities, often leading to data breaches and system compromises. Increased awareness and training are crucial to mitigating these risks.</p><h3 class="heading" style="text-align:start;" id="data-of-3000-us-congressional-staff"><a class="link" href="https://securityaffairs.com/168912/deep-web/3000-congressional-staffers-data-leaked-dark-web.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Data of 3,000 U.S. Congressional Staffers Leaked on Dark Web</a></h3><p class="paragraph" style="text-align:start;">Sensitive personal data of over 3,000 U.S. Congressional staffers has been leaked on the dark web following a breach. The leaked information could be used for phishing or impersonation attacks, highlighting the importance of stronger cybersecurity protocols within government entities.</p><h3 class="heading" style="text-align:start;" id="chinese-hackers-infiltrate-us-inter"><a class="link" href="https://thehackernews.com/2024/09/chinese-hackers-infiltrate-us-internet.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Chinese Hackers Infiltrate U.S. Internet Backbone</a></h3><p class="paragraph" style="text-align:start;">Chinese state-sponsored hackers have successfully infiltrated the U.S. internet backbone, gaining access to sensitive communications. This breach raises concerns about national security and highlights the ongoing threat posed by nation-state actors targeting critical infrastructure.</p><h3 class="heading" style="text-align:start;" id="nist-proposes-barring-nonsensical-p"><a class="link" href="https://arstechnica.com/security/2024/09/nist-proposes-barring-some-of-the-most-nonsensical-password-rules/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">NIST Proposes Barring Nonsensical Password Rules</a></h3><p class="paragraph" style="text-align:start;">NIST has proposed eliminating outdated password rules, such as requiring frequent changes and overly complex characters, which can weaken security. The new guidelines focus on user-friendly practices that enhance password strength while reducing user fatigue and errors.</p><h3 class="heading" style="text-align:start;" id="chinas-salt-typhoon-cyber-espionage"><a class="link" href="https://www.theregister.com/2024/09/25/chinas_salt_typhoon_cyber_spies/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">China’s Salt Typhoon Cyber Espionage Campaign</a></h3><p class="paragraph" style="text-align:start;">A sophisticated Chinese cyber-espionage group, known as Salt Typhoon, has been linked to recent attacks targeting government and defense sectors. The group uses advanced techniques to exfiltrate sensitive data, continuing China&#39;s efforts to gather intelligence on global adversaries.</p><h3 class="heading" style="text-align:start;" id="nist-report-on-ai-vulnerability-dis"><a class="link" href="https://cyberscoop.com/nist-artificial-intelligence-vulnerability-reporting-congress/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">NIST Report on AI Vulnerability Disclosure</a></h3><p class="paragraph" style="text-align:start;">A new NIST report suggests a framework for reporting AI vulnerabilities, addressing growing concerns over AI systems being exploited by attackers. The report underscores the need for transparent reporting mechanisms to prevent AI misuse in critical sectors.</p><h3 class="heading" style="text-align:start;" id="necro-trojan-infects-11-million-dev"><a class="link" href="https://securityaffairs.com/168898/malware/new-necro-trojan-apps-11m-downloads.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Necro Trojan Infects 11 Million Devices via App Store</a></h3><p class="paragraph" style="text-align:start;">The Necro Trojan has been detected in apps downloaded over 11 million times from official app stores. This malware steals personal information and financial data from infected devices, posing serious threats to users globally. Users should uninstall affected apps immediately.</p><h3 class="heading" style="text-align:start;" id="mozilla-accused-of-tracking-firefox"><a class="link" href="https://www.bleepingcomputer.com/news/technology/mozilla-accused-of-tracking-users-in-firefox-without-consent/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Mozilla Accused of Tracking Firefox Users Without Consent</a></h3><p class="paragraph" style="text-align:start;">Mozilla is facing allegations of tracking Firefox users without proper consent. Privacy advocates are raising concerns about the company’s data collection practices, sparking debate over whether user privacy is adequately protected in one of the most popular web browsers.</p><h3 class="heading" style="text-align:start;" id="denialof-service-vulnerability-disc"><a class="link" href="https://blog.talosintelligence.com/talos-discovers-denial-of-service-vulnerability-in-microsoft-audio-bus-potential-remote-code-execution-in-popular-open-source-plc/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Denial-of-Service Vulnerability Discovered in Microsoft Audio Bus</a></h3><p class="paragraph" style="text-align:start;">Cisco Talos researchers have identified a denial-of-service (DoS) vulnerability in Microsoft&#39;s Audio Bus driver. This flaw could allow attackers to crash systems or execute remote code, necessitating immediate patches to prevent potential exploitation.</p><h3 class="heading" style="text-align:start;" id="lumma-stealer-campaign-targets-leag"><a class="link" href="https://www.bitdefender.com/blog/hotforsecurity/lumma-stealer-campaign-targets-league-of-legends-world-championship-fans-through-social-media-ads/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Lumma Stealer Campaign Targets League of Legends Fans</a></h3><p class="paragraph" style="text-align:start;">A new Lumma Stealer malware campaign is targeting fans of the League of Legends World Championship through social media ads. The malware steals sensitive information, including credentials and payment data. Fans are advised to avoid suspicious links and ads.</p><h3 class="heading" style="text-align:start;" id="managing-identity-source-transition"><a class="link" href="https://aws.amazon.com/blogs/security/managing-identity-source-transition-for-aws-iam-identity-center/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-122" target="_blank" rel="noopener noreferrer nofollow">Managing Identity Source Transition for AWS IAM Identity Center</a></h3><p class="paragraph" style="text-align:start;">AWS shares best practices for transitioning identity sources within AWS IAM Identity Center. The guide helps users ensure a smooth migration while maintaining security and access controls, crucial for managing identity in large, complex environments.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=4dd1e94b-4d35-46db-ab02-e04030bf50e3&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #121</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-121</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-121</guid>
  <pubDate>Thu, 26 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-26T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> focus on a variety of cybersecurity incidents and updates, ranging from vulnerabilities in healthcare and industrial systems to the latest hacking methods targeting cloud and water treatment infrastructure. This includes alerts from CISA, cryptocurrency mining threats in Docker, and security breaches affecting millions of individuals. Today’s headlines serve as a reminder of the ever-present risks to both private and public sectors.</p><h3 class="heading" style="text-align:start;" id="threat-actors-continue-to-exploit-o"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/25/threat-actors-continue-exploit-otics-through-unsophisticated-means?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Threat Actors Continue to Exploit OT/ICS Through Unsophisticated Means</a></h3><p class="paragraph" style="text-align:start;">CISA warns that threat actors are exploiting operational technology (OT) and industrial control systems (ICS) with simple techniques, often relying on unpatched systems or outdated configurations. Organizations managing critical infrastructure should reinforce basic cyber hygiene practices to mitigate these unsophisticated but effective attacks.</p><h3 class="heading" style="text-align:start;" id="citrix-releases-security-updates-fo"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/25/citrix-releases-security-updates-xenserver-and-citrix-hypervisor?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Citrix Releases Security Updates for XenServer and Citrix Hypervisor</a></h3><p class="paragraph" style="text-align:start;">Citrix has issued critical security patches for XenServer and Citrix Hypervisor to address vulnerabilities that could allow unauthorized access or denial of service. Users are strongly advised to update their systems to prevent exploitation of these flaws in virtualized environments.</p><h3 class="heading" style="text-align:start;" id="darpa-launches-new-cybersecurity-in"><a class="link" href="https://www.darpa.mil/news-events/2024-09-23?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">DARPA Launches New Cybersecurity Initiative to Combat Emerging Threats</a></h3><p class="paragraph" style="text-align:start;">DARPA has announced a new cybersecurity program aimed at countering advanced cyber threats targeting U.S. critical infrastructure. The initiative will focus on creating innovative technologies that can identify and neutralize cyberattacks more effectively, particularly those targeting defense and national security systems.</p><h3 class="heading" style="text-align:start;" id="threat-actors-leveraging-docker-swa"><a class="link" href="https://securitylabs.datadoghq.com/articles/threat-actors-leveraging-docker-swarm-kubernetes-mine-cryptocurrency/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Threat Actors Leveraging Docker Swarm & Kubernetes to Mine Cryptocurrency</a></h3><p class="paragraph" style="text-align:start;">Threat actors are using Docker Swarm and Kubernetes environments to covertly mine cryptocurrency. By exploiting misconfigured or unsecured clusters, attackers can install mining software and siphon off computing resources. Enterprises using these platforms should ensure robust security configurations and continuous monitoring.</p><h3 class="heading" style="text-align:start;" id="us-govt-agency-cms-data-breach-impa"><a class="link" href="https://www.bleepingcomputer.com/news/healthcare/us-govt-agency-cms-says-data-breach-impacted-31-million-people/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">US Govt Agency CMS Data Breach Impacts 31 Million People</a></h3><p class="paragraph" style="text-align:start;">A data breach at the U.S. Centers for Medicare & Medicaid Services (CMS) has exposed the personal information of 31 million individuals. The breach involved unauthorized access to a system used for processing claims and underscores the need for stricter security measures in healthcare systems.</p><h3 class="heading" style="text-align:start;" id="critical-vulnerabilities-in-automat"><a class="link" href="https://blog.knowbe4.com/wth-critical-vulnerabilities-in-automated-tank-gauges.-this-is-not-ok?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Critical Vulnerabilities in Automated Tank Gauges</a></h3><p class="paragraph" style="text-align:start;">Serious vulnerabilities have been discovered in automated tank gauges (ATGs) used to monitor fuel levels in industrial settings. Exploiting these flaws could allow attackers to manipulate fuel levels or cause environmental harm. Immediate patching and security updates are recommended to prevent exploitation.</p><h3 class="heading" style="text-align:start;" id="major-private-music-torrenting-site"><a class="link" href="https://www.404media.co/major-private-music-torrenting-site-suffers-massive-peer-scraping-attack/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Major Private Music Torrenting Site Suffers Massive Peer-Scraping Attack</a></h3><p class="paragraph" style="text-align:start;">A popular private music torrenting site has fallen victim to a large-scale peer-scraping attack, compromising user privacy and exposing IP addresses. This type of attack involves collecting data from torrent peers and poses a significant privacy risk for users of torrenting platforms.</p><h3 class="heading" style="text-align:start;" id="critical-idor-vulnerabilities-found"><a class="link" href="https://blog.huntr.com/spotlight-on-acciobugs-uncovering-critical-idor-vulnerabilities-in-lunary-ai/lunary?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Critical IDOR Vulnerabilities Found in Lunary AI</a></h3><p class="paragraph" style="text-align:start;">Researchers have uncovered critical Insecure Direct Object Reference (IDOR) vulnerabilities in Lunary AI. These flaws could allow attackers to gain unauthorized access to sensitive user data. Immediate fixes are recommended to prevent any potential exploitation.</p><h3 class="heading" style="text-align:start;" id="net-alert-x-open-source-wi-fi-intru"><a class="link" href="https://www.helpnetsecurity.com/2024/09/25/netalertx-open-source-wi-fi-intruder-detector/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">NetAlertX: Open-Source Wi-Fi Intruder Detector</a></h3><p class="paragraph" style="text-align:start;">NetAlertX, a new open-source tool, has been released to help detect unauthorized devices on Wi-Fi networks. It aims to provide businesses and individuals with a simple, cost-effective solution for identifying potential intruders on their wireless networks.</p><h3 class="heading" style="text-align:start;" id="chat-gpt-mac-os-flaw-couldve-enable"><a class="link" href="https://thehackernews.com/2024/09/chatgpt-macos-flaw-couldve-enabled-long.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">ChatGPT macOS Flaw Could’ve Enabled Long-Term User Monitoring</a></h3><p class="paragraph" style="text-align:start;">A vulnerability in the ChatGPT macOS app could have allowed attackers to monitor users&#39; activities over an extended period. The flaw, which has since been patched, highlights the need for vigilance when using AI applications that require broad system permissions.</p><h3 class="heading" style="text-align:start;" id="cyberattack-targets-arkansas-city-w"><a class="link" href="https://securityaffairs.com/168871/hacking/arkansas-city-water-treatment-facility-cyberattack.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Cyberattack Targets Arkansas City Water Treatment Facility</a></h3><p class="paragraph" style="text-align:start;">A cyberattack has targeted a water treatment facility in Arkansas, compromising its operational technology. The attack, which involved disabling key systems, underscores the vulnerability of critical infrastructure to cyberattacks and the importance of securing essential services.</p><h3 class="heading" style="text-align:start;" id="black-jack-hacktivists-linked-to-tw"><a class="link" href="https://securelist.com/blackjack-hacktivists-connection-with-twelve/113959/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">BlackJack Hacktivists Linked to &quot;Twelve&quot; Cyber Group</a></h3><p class="paragraph" style="text-align:start;">The BlackJack hacktivist group has been linked to the larger &quot;Twelve&quot; cyber collective. This group has been involved in politically motivated cyberattacks, often targeting government entities. The connection between these groups signals an increase in hacktivism-driven cyber incidents.</p><h3 class="heading" style="text-align:start;" id="sniper-dz-phishing-platform-uncover"><a class="link" href="https://unit42.paloaltonetworks.com/phishing-platform-sniper-dz-unique-tactics/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Sniper DZ Phishing Platform Uncovers Unique Tactics</a></h3><p class="paragraph" style="text-align:start;">A new phishing platform, Sniper DZ, is deploying sophisticated tactics to target individuals and organizations. The platform leverages unique evasion techniques to bypass traditional email security measures, making it difficult to detect. Cybersecurity teams should bolster anti-phishing defenses to counter these evolving threats.</p><h3 class="heading" style="text-align:start;" id="chat-gp-ts-false-memories-exploit-c"><a class="link" href="https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">ChatGPT’s False Memories Exploit Could Lead to Data Exfiltration</a></h3><p class="paragraph" style="text-align:start;">Hackers are exploiting a flaw in ChatGPT that allows them to implant &quot;false memories&quot; in the AI model, creating a channel for persistent data exfiltration. This technique manipulates ChatGPT’s memory function to steal sensitive information without detection, posing a new type of threat in AI-based systems.</p><h3 class="heading" style="text-align:start;" id="kansas-water-plant-goes-analog-afte"><a class="link" href="https://www.darkreading.com/ics-ot-security/kansas-water-plant-pivots-analog-cyber-event?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Kansas Water Plant Goes Analog After Cyber Incident</a></h3><p class="paragraph" style="text-align:start;">Following a cyberattack, a Kansas water treatment plant has shifted to manual operations to prevent further incidents. This event underscores the potential of reverting to analog systems as a failsafe in the face of growing cyber threats targeting critical infrastructure.</p><h3 class="heading" style="text-align:start;" id="infostealer-malware-bypasses-chrome"><a class="link" href="https://www.bleepingcomputer.com/news/security/infostealer-malware-bypasses-chromes-new-cookie-theft-defenses/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Infostealer Malware Bypasses Chrome&#39;s New Cookie Theft Defenses</a></h3><p class="paragraph" style="text-align:start;">A new strain of infostealer malware has been found bypassing Chrome&#39;s latest cookie-theft defenses. The malware focuses on stealing session cookies to hijack user accounts, even in cases where two-factor authentication is enabled. Users should adopt additional security measures, such as endpoint protection tools, to safeguard their data.</p><h3 class="heading" style="text-align:start;" id="aws-waf-threat-intelligence-protect"><a class="link" href="https://aws.amazon.com/blogs/security/how-aws-waf-threat-intelligence-features-help-protect-the-player-experience-for-betting-and-gaming-customers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">AWS WAF Threat Intelligence Protects Betting and Gaming Customers</a></h3><p class="paragraph" style="text-align:start;">AWS has introduced new Web Application Firewall (WAF) threat intelligence features to help protect online betting and gaming platforms. These enhancements provide real-time detection of threats and are designed to improve the security of customer data while maintaining a seamless user experience.</p><h3 class="heading" style="text-align:start;" id="crowd-strike-updates-procedures-aft"><a class="link" href="https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">CrowdStrike Updates Procedures After BSOD Crash Issues</a></h3><p class="paragraph" style="text-align:start;">CrowdStrike has overhauled its testing and deployment procedures following reports of Blue Screen of Death (BSOD) crashes caused by its security software. The update aims to improve the stability and reliability of its security solutions while ensuring robust protection against cyber threats.</p><h3 class="heading" style="text-align:start;" id="transportation-companies-hit-by-sop"><a class="link" href="https://thehackernews.com/2024/09/transportation-companies-hit-by.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-121" target="_blank" rel="noopener noreferrer nofollow">Transportation Companies Hit by Sophisticated Cyberattacks</a></h3><p class="paragraph" style="text-align:start;">Transportation companies have recently faced a wave of advanced cyberattacks. These attacks have targeted both IT and operational systems, causing disruptions in logistics and transportation services. Security experts urge organizations in this sector to strengthen their defenses against increasingly sophisticated threats.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=29eb813a-0ec7-4a32-b11c-e28348b85fad&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #120</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-120</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-120</guid>
  <pubDate>Wed, 25 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-25T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> focus on critical cybersecurity developments, including new vulnerabilities, scams, data breaches, and malware threats. Highlights include a major data leak affecting millions, new advisories from CISA, and the rise of Android malware variants. Also, be aware of evolving threats in cloud security and the latest in scams targeting cryptocurrency users. Stay informed and secure by reviewing today’s key stories.</p><h3 class="heading" style="text-align:start;" id="cisa-adds-one-known-exploited-vulne"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/24/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">CISA Adds One Known Exploited Vulnerability to Catalog</a></h3><p class="paragraph" style="text-align:start;">CISA has added a new vulnerability to its Known Exploited Vulnerability Catalog. This flaw is actively being used by attackers, emphasizing the need for immediate patching. Organizations are urged to update affected systems to reduce their risk of exploitation.</p><h3 class="heading" style="text-align:start;" id="cisa-releases-eight-industrial-cont"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/24/cisa-releases-eight-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Eight Industrial Control Systems Advisories</a></h3><p class="paragraph" style="text-align:start;">CISA has issued eight new advisories for Industrial Control Systems (ICS). These advisories cover vulnerabilities across multiple platforms that could be exploited to cause significant disruption to industrial operations. Immediate mitigation is recommended to avoid potential attacks on critical infrastructure.</p><h3 class="heading" style="text-align:start;" id="scammers-abuse-virtual-shopping-lis"><a class="link" href="https://blog.knowbe4.com/scammers-abuse-virtual-shopping-lists?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Scammers Abuse Virtual Shopping Lists</a></h3><p class="paragraph" style="text-align:start;">Cybercriminals are taking advantage of virtual shopping lists, using them as a phishing vector to steal credentials and financial information. This new scam targets online shoppers with fraudulent &quot;shared&quot; lists containing malicious links. Users are advised to be cautious and verify the legitimacy of such requests.</p><h3 class="heading" style="text-align:start;" id="six-tips-to-improve-the-security-of"><a class="link" href="https://aws.amazon.com/blogs/security/six-tips-to-improve-the-security-of-your-aws-transfer-family-server/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Six Tips to Improve the Security of Your AWS Transfer Family Server</a></h3><p class="paragraph" style="text-align:start;">Amazon offers six security tips to strengthen AWS Transfer Family servers, including enforcing encryption, using fine-grained access controls, and regularly monitoring logs. Implementing these practices can significantly reduce the risk of unauthorized access and data leaks in cloud environments.</p><h3 class="heading" style="text-align:start;" id="massive-mc-2-data-breach-exposes-10"><a class="link" href="https://www.itpro.com/security/data-breaches/100-million-americans-just-had-their-personal-information-leaked-in-the-massive-mc2-data-breach-and-human-error-could-be-the-cause?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Massive MC2 Data Breach Exposes 100 Million Americans&#39; Personal Information</a></h3><p class="paragraph" style="text-align:start;">Over 100 million Americans have had their personal data exposed in a significant breach at MC2, a consumer database platform. Early investigations suggest human error as the likely cause of this breach, raising concerns over data management and security practices in handling sensitive information.</p><h3 class="heading" style="text-align:start;" id="minimizing-permissions-for-cloud-fo"><a class="link" href="https://www.cadosecurity.com/blog/minimizing-permissions-for-cloud-forensics-a-practical-guide-to-tightening-access-in-the-cloud?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Minimizing Permissions for Cloud Forensics</a></h3><p class="paragraph" style="text-align:start;">This guide provides practical steps for limiting permissions in cloud environments to facilitate effective forensics without excessive access. It highlights the importance of a least-privilege model to reduce potential exposure during an investigation, ensuring secure data handling while identifying security incidents.</p><h3 class="heading" style="text-align:start;" id="new-octo-2-android-banking-trojan-t"><a class="link" href="https://thehackernews.com/2024/09/new-octo2-android-banking-trojan.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">New Octo2 Android Banking Trojan Threat Emerges</a></h3><p class="paragraph" style="text-align:start;">A new Android banking trojan, Octo2, is spreading rapidly, posing a serious threat to mobile banking users. The malware can perform on-device fraud and take control of devices remotely. Security experts recommend heightened vigilance and the use of trusted security apps to detect and block this Trojan.</p><h3 class="heading" style="text-align:start;" id="uefi-the-new-bios"><a class="link" href="https://www.leviathansecurity.com/blog/uefi-is-the-new-bios?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">UEFI: The New BIOS</a></h3><p class="paragraph" style="text-align:start;">UEFI has become the new standard for firmware in modern systems, replacing the legacy BIOS. While it brings advanced features, it also introduces new security risks. The article emphasizes the importance of securing UEFI configurations to prevent low-level attacks that could compromise entire systems.</p><h3 class="heading" style="text-align:start;" id="crypto-scammers-hack-open-a-is-pres"><a class="link" href="https://techcrunch.com/2024/09/23/crypto-scammers-hack-openais-press-account-on-x/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Crypto Scammers Hack OpenAI’s Press Account on X</a></h3><p class="paragraph" style="text-align:start;">Cybercriminals hacked OpenAI’s press account on X (formerly Twitter) to promote cryptocurrency scams. This incident highlights the continued risk of social media hijacking, especially for high-profile accounts, as hackers leverage these platforms for financial gain through fraudulent schemes.</p><h3 class="heading" style="text-align:start;" id="money-gram-faces-cybersecurity-issu"><a class="link" href="https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">MoneyGram Faces Cybersecurity Issue</a></h3><p class="paragraph" style="text-align:start;">Money transfer giant MoneyGram is grappling with an undisclosed cybersecurity incident. The company is investigating the breach, which may have compromised customer data or disrupted services. MoneyGram has yet to release full details but is working with cybersecurity experts to resolve the situation.</p><h3 class="heading" style="text-align:start;" id="microsoft-trims-cloud-cyberattack-s"><a class="link" href="https://www.darkreading.com/cloud-security/microsoft-trims-cloud-cyberattack-surface-security-push?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Microsoft Trims Cloud Cyberattack Surface in Security Push</a></h3><p class="paragraph" style="text-align:start;">Microsoft has implemented new measures to reduce the attack surface of its cloud services. This move is part of a broader effort to strengthen the security of its cloud offerings, particularly in response to rising threats targeting cloud infrastructure. Users should take note of these changes and adjust their security configurations accordingly.</p><h3 class="heading" style="text-align:start;" id="snipbot-new-rom-com-malware-variant"><a class="link" href="https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Snipbot: New RomCom Malware Variant Identified</a></h3><p class="paragraph" style="text-align:start;">A new variant of the RomCom malware, dubbed Snipbot, has been detected. This malware variant is designed to steal sensitive data from infected machines, with a focus on bypassing traditional detection methods. Organizations should update their defenses to counter this emerging threat.</p><h3 class="heading" style="text-align:start;" id="major-us-companies-unwittingly-hire"><a class="link" href="https://therecord.media/major-us-companies-unwittingly-hire-north-korean-remote-it-workers?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Major U.S. Companies Unwittingly Hire North Korean Remote IT Workers</a></h3><p class="paragraph" style="text-align:start;">Several major U.S. companies have unknowingly hired North Korean IT workers posing as freelancers. These individuals have been funneling their earnings back to the North Korean regime. The incident underscores the growing risk of supply chain vulnerabilities and the importance of thorough vetting processes for remote workers.</p><h3 class="heading" style="text-align:start;" id="11-million-devices-infected-with-bo"><a class="link" href="https://arstechnica.com/security/2024/09/11-million-devices-infected-with-botnet-malware-hosted-in-google-play/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">11 Million Devices Infected with Botnet Malware from Google Play</a></h3><p class="paragraph" style="text-align:start;">Over 11 million Android devices were infected by botnet malware distributed through Google Play. The malware was disguised as legitimate apps, evading Google’s security measures. Users are urged to review installed apps and use security tools to detect and remove any malicious software.</p><h3 class="heading" style="text-align:start;" id="necro-malware-exploits-android-devi"><a class="link" href="https://www.theregister.com/2024/09/23/necro_malware_android/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-120" target="_blank" rel="noopener noreferrer nofollow">Necro Malware Exploits Android Devices</a></h3><p class="paragraph" style="text-align:start;">The Necro malware, known for targeting Android devices, is exploiting new vulnerabilities to spread more aggressively. This malware can execute crypto-mining operations and compromise device performance. Android users should apply the latest updates and use security solutions to protect against this ongoing threat.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=e2408b1c-ed6a-488d-acd5-db5677fa6473&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #119</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-119</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-119</guid>
  <pubDate>Tue, 24 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-24T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> bring attention to insider threats, a newly discovered zero-click bug, and the rise of phishing attacks, among other critical topics in cybersecurity. From the discovery of new malware gateways to major data breach investigations, today’s stories highlight the evolving threat landscape and the innovative defenses being developed. Let’s dive into today’s top security developments.</p><h3 class="heading" style="text-align:start;" id="the-first-90-days-a-hidden-risk-for"><a class="link" href="https://www.proofpoint.com/us/blog/information-protection/first-90-days-hidden-risk-for-insider-threats?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">The First 90 Days: A Hidden Risk for Insider Threats</a></h3><p class="paragraph" style="text-align:start;">New hires are especially vulnerable to insider threats in the first 90 days of employment. A Proofpoint study reveals this period is critical as employees adjust to new roles and may unknowingly create risks through improper handling of sensitive data. This highlights the need for enhanced monitoring and education during onboarding.</p><h3 class="heading" style="text-align:start;" id="zero-click-media-tek-bug-wi-fi-take"><a class="link" href="https://www.darkreading.com/vulnerabilities-threats/zero-click-mediatek-bug-phones-wifi-takeover?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Zero-Click MediaTek Bug: Wi-Fi Takeover Risk</a></h3><p class="paragraph" style="text-align:start;">A critical vulnerability in MediaTek chips allows attackers to take over smartphones via Wi-Fi without user interaction. Discovered by researchers, the bug could let malicious actors access data and devices remotely. This zero-click exploit raises concerns about the security of millions of affected devices.</p><h3 class="heading" style="text-align:start;" id="behind-the-captcha-a-clever-gateway"><a class="link" href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Behind the CAPTCHA: A Clever Gateway for Malware</a></h3><p class="paragraph" style="text-align:start;">Attackers are using CAPTCHA challenges to deliver malware, deceiving users into believing the site is safe. McAfee Labs warns that these CAPTCHA-backed schemes are increasingly effective at bypassing security filters. This technique demonstrates how attackers are evolving their tactics to distribute malicious software more discreetly.</p><h3 class="heading" style="text-align:start;" id="automating-defacement-detection-wit"><a class="link" href="https://aws.amazon.com/blogs/security/automate-detection-and-response-to-website-defacement-with-amazon-cloudwatch-synthetics/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Automating Defacement Detection with Amazon CloudWatch Synthetics</a></h3><p class="paragraph" style="text-align:start;">Amazon has launched a new tool to automatically detect and respond to website defacements using CloudWatch Synthetics. This service simulates user interactions and flags changes that indicate potential defacement, helping organizations quickly react to visual or content tampering on their websites.</p><h3 class="heading" style="text-align:start;" id="dell-investigates-data-breach-claim"><a class="link" href="https://www.bleepingcomputer.com/news/security/dell-investigates-data-breach-claims-after-hacker-leaks-employee-info/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Dell Investigates Data Breach Claims After Hacker Leak</a></h3><p class="paragraph" style="text-align:start;">Dell is investigating claims of a data breach after a hacker leaked employee information online. Although Dell hasn’t confirmed the breach, the leaked data includes email addresses and other sensitive details. This incident could have significant consequences for the company&#39;s reputation and employee privacy.</p><h3 class="heading" style="text-align:start;" id="online-scams-shorten-cycles-and-boo"><a class="link" href="https://blog.knowbe4.com/online-scams-are-shortening-their-cycles-and-making-more-money?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Online Scams Shorten Cycles and Boost Profits</a></h3><p class="paragraph" style="text-align:start;">A new report finds that online scams are becoming more efficient, with shorter execution times and higher financial returns. Scammers are using automated tools to quickly launch and profit from fraudulent schemes before detection mechanisms can catch up, signaling a shift in the cybercrime landscape.</p><h3 class="heading" style="text-align:start;" id="google-syncs-passkeys-across-deskto"><a class="link" href="https://www.securityweek.com/google-now-syncing-passkeys-across-desktop-android-devices/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Google Syncs Passkeys Across Desktop and Android Devices</a></h3><p class="paragraph" style="text-align:start;">Google has introduced a feature that allows passkey synchronization across Android and desktop devices. This enhancement streamlines the use of passkeys, providing a more secure and convenient alternative to traditional passwords. It marks a step toward broader adoption of passwordless authentication.</p><h3 class="heading" style="text-align:start;" id="fbi-disrupts-botnet-targeting-unive"><a class="link" href="https://www.itpro.com/security/cyber-crime/fbi-disrupts-260000-strong-botnet-targeting-universities-and-government-agencies-in-us?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">FBI Disrupts Botnet Targeting Universities and Government Agencies</a></h3><p class="paragraph" style="text-align:start;">The FBI has successfully disrupted a botnet with over 260,000 infected devices, primarily targeting universities and government agencies in the U.S. The botnet was being used for distributed denial-of-service (DDoS) attacks and data theft, underscoring the importance of vigilance in protecting institutional networks.</p><h3 class="heading" style="text-align:start;" id="understanding-cyber-incident-disclo"><a class="link" href="https://www.welivesecurity.com/en/business-security/understanding-cyber-incident-disclosure/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Understanding Cyber Incident Disclosure</a></h3><p class="paragraph" style="text-align:start;">This article explores the complexities of cyber incident disclosure, including the timing, legal obligations, and risks of publicizing data breaches. Companies must balance transparency with security concerns to prevent further exploitation by attackers, while maintaining trust with stakeholders.</p><h3 class="heading" style="text-align:start;" id="twelve-unified-kill-chain-a-new-app"><a class="link" href="https://securelist.com/twelve-group-unified-kill-chain/113877/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Twelve Unified Kill Chain: A New Approach to Attack Analysis</a></h3><p class="paragraph" style="text-align:start;">Researchers introduce the “Unified Kill Chain,” a new model for analyzing cyberattacks by combining elements from existing frameworks. The kill chain provides a comprehensive method for understanding how attackers compromise systems, offering insights that can help strengthen defensive strategies.</p><h3 class="heading" style="text-align:start;" id="power-shell-phishing-attack-has-dan"><a class="link" href="https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">PowerShell Phishing Attack Has Dangerous Potential</a></h3><p class="paragraph" style="text-align:start;">A new phishing attack leverages Windows PowerShell to gain elevated system privileges, making it especially dangerous. This sophisticated method is harder to detect and could be used to bypass traditional security measures, putting both individuals and organizations at higher risk.</p><h3 class="heading" style="text-align:start;" id="cops-bust-criminals-unlocking-stole"><a class="link" href="https://arstechnica.com/security/2024/09/cops-bust-website-crooks-used-to-unlock-1-2-million-stolen-mobile-phones/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Cops Bust Criminals Unlocking Stolen Phones</a></h3><p class="paragraph" style="text-align:start;">Authorities have shut down a criminal operation that unlocked over 1.2 million stolen mobile phones. The hackers used a website to unlock the devices, which were then resold. This takedown highlights the ongoing issue of mobile phone theft and the demand for stolen devices on the black market.</p><h3 class="heading" style="text-align:start;" id="us-air-force-seeks-advanced-sensors"><a class="link" href="https://www.c4isrnet.com/air/2024/09/19/air-forces-information-warfare-hub-seeks-high-tech-sensors-ai-tools/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">US Air Force Seeks Advanced Sensors and AI Tools</a></h3><p class="paragraph" style="text-align:start;">The U.S. Air Force’s Information Warfare Hub is looking to integrate advanced sensors and AI-driven tools to enhance its cyber defense capabilities. These technologies will support more effective threat detection and response, crucial for modernizing the Air Force’s defense infrastructure.</p><h3 class="heading" style="text-align:start;" id="contractor-software-exploited-throu"><a class="link" href="https://www.darkreading.com/application-security/contractor-software-targeted-mssql-loophole?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Contractor Software Exploited Through MSSQL Vulnerability</a></h3><p class="paragraph" style="text-align:start;">Hackers are exploiting a vulnerability in Microsoft SQL Server to target contractor software, allowing them to gain unauthorized access to sensitive data. This loophole poses a significant threat to organizations that rely on contractors and third-party services for key operations.</p><h3 class="heading" style="text-align:start;" id="splinter-a-pentesting-tool-exposed"><a class="link" href="https://unit42.paloaltonetworks.com/analysis-pentest-tool-splinter/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-119" target="_blank" rel="noopener noreferrer nofollow">Splinter: A Pentesting Tool Exposed</a></h3><p class="paragraph" style="text-align:start;">Palo Alto Networks researchers have uncovered “Splinter,” a pentesting tool with both legitimate and malicious uses. While designed to help security teams identify weaknesses, it’s being used by cybercriminals for nefarious purposes, blurring the lines between ethical hacking and exploitation.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=712f2f9f-a7a9-4112-b179-ad6080c3977c&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #118</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-118</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-118</guid>
  <pubDate>Mon, 23 Sep 2024 14:02:29 +0000</pubDate>
  <atom:published>2024-09-23T14:02:29Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> cover a wide range of cyber threats, vulnerabilities, and defense strategies affecting both businesses and individuals. From new malware targeting popular platforms to critical software flaws, these developments highlight the need for ongoing vigilance and security upgrades. Organizations and users alike must be aware of the evolving landscape, particularly in cloud services, mobile apps, and industrial control systems.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/20/versa-networks-releases-advisory-vulnerability-versa-director-cve-2024-45229?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Versa Networks Releases Advisory for Vulnerability in Versa Director (CVE-2024-45229)</a><br>Versa Networks has disclosed a critical vulnerability (CVE-2024-45229) in Versa Director, which could allow remote code execution. The flaw affects specific software versions, and an immediate update is recommended to mitigate the risk of exploitation. Administrators should prioritize applying the necessary patches.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://securelist.com/necro-trojan-is-back-on-google-play/113881/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Necro Trojan Reappears on Google Play</a><br>The Necro Trojan has resurfaced on Google Play, using obfuscated code to bypass security checks. Targeting Android devices, the malware can steal sensitive data, install additional payloads, and spy on users. Google has since removed the infected apps, but users must remain cautious when downloading from the Play Store.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://thehackernews.com/2024/09/critical-flaw-in-microchip-asf-exposes.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Critical Flaw in Microchip ASF Exposes Devices to Code Execution</a><br>A critical vulnerability in Microchip&#39;s Advanced Software Framework (ASF) could enable remote attackers to execute arbitrary code on affected devices. Used in various embedded systems, the flaw poses a severe threat to industries relying on these microcontroller-based products. A patch has been released to address the issue.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.theregister.com/2024/09/23/security_in_brief/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Security Brief: Recent Cybersecurity Incidents and Discoveries</a><br>This roundup includes new security risks and attacks, such as the discovery of a vulnerability in popular cloud platforms and phishing campaigns targeting large organizations. The report highlights the growing trend of exploiting misconfigurations and vulnerabilities in cloud infrastructure to gain unauthorized access.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://blog.intigriti.com/hacking-tools/hacking-misconfigured-cloudflare-r2-buckets-a-complete-guide?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Exploiting Misconfigured Cloudflare R2 Buckets: A Complete Guide</a><br>A detailed guide demonstrates how attackers can exploit misconfigured Cloudflare R2 buckets, potentially exposing sensitive data. The post provides a step-by-step process for identifying and correcting these misconfigurations to safeguard cloud storage.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.bleepingcomputer.com/news/security/global-infostealer-malware-operation-targets-crypto-users-gamers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Global Infostealer Malware Operation Targets Crypto Users and Gamers</a><br>A global infostealer malware operation is now focusing on cryptocurrency users and gamers, with attackers aiming to steal login credentials, crypto wallets, and personal information. The malware spreads through phishing campaigns and compromised websites. Users are advised to employ multi-factor authentication and regularly update security software.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.greynoise.io/blog/challenging-assumptions-enhancing-the-understanding-of-securing-internet-exposed-industrial-control-systems?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Enhancing Security for Internet-Exposed Industrial Control Systems</a><br>This blog challenges common assumptions about securing internet-exposed industrial control systems (ICS). It emphasizes the importance of understanding real-world threats and improving visibility into exposed systems to strengthen defenses against targeted attacks.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://blog.knowbe4.com/educate-users-malicious-seo-poisoning-attacks?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Educating Users on Malicious SEO Poisoning Attacks</a><br>KnowBe4 warns of the increasing use of SEO poisoning to drive traffic to malicious websites. Cybercriminals manipulate search engine results to trick users into visiting sites that deliver malware or phishing attacks. Training users to recognize and avoid suspicious links is essential in mitigating this threat.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/09/18/how-comprehensive-security-simplifies-the-defense-of-your-digital-estate/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Comprehensive Security Simplifies Digital Defense</a><br>Microsoft outlines how adopting comprehensive security strategies can help simplify the defense of digital environments. The blog emphasizes the need for integrated security solutions to reduce complexity, improve threat detection, and streamline incident response.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://arstechnica.com/security/2024/09/google-calls-for-halting-use-of-whois-for-tls-domain-verifications/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Google Calls for Halting Use of WHOIS for TLS Domain Verifications</a><br>Google has urged domain registrars to stop using WHOIS for verifying TLS certificates, citing privacy and security concerns. WHOIS data is often inaccurate or incomplete, making it unreliable for this purpose. Google suggests alternative verification methods to enhance domain security.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.bleepingcomputer.com/news/security/disney-ditching-slack-after-massive-july-data-breach/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Disney Drops Slack After Major Data Breach</a><br>Disney has decided to stop using Slack following a major data breach in July 2024 that exposed sensitive company information. The incident raised concerns about Slack&#39;s security protocols, prompting the shift to more secure communication platforms.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://securityaffairs.com/168667/security/tor-project-commented-on-deanonymizing-technique.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Tor Project Comments on New Deanonymization Technique</a><br>The Tor Project has responded to recent research revealing a new deanonymization technique that could unmask Tor users. While the method poses a significant risk, the organization is working on updates to mitigate potential exploitation and reinforce user anonymity.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.darkreading.com/cyberattacks-data-breaches/ivanti-cloud-service-appliance-attacked-vuln?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">Ivanti Cloud Service Appliance Attacked Due to Critical Vulnerability</a><br>A critical flaw in Ivanti&#39;s Cloud Service Appliance has been actively exploited by attackers. The vulnerability, which enables unauthorized access and data theft, has already been patched, but users are urged to update their systems immediately to prevent further attacks.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://www.helpnetsecurity.com/2024/09/23/certainly-open-source-offensive-security-toolkit/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">CERTainly: A New Open-Source Offensive Security Toolkit</a><br>CERTainly, a new open-source toolkit, has been released for conducting offensive security operations. The toolkit offers penetration testing tools and resources for security professionals to identify and exploit vulnerabilities in networks and systems, assisting in proactive defense strategies.</p><p class="paragraph" style="text-align:start;"><a class="link" href="https://thehackernews.com/2024/09/new-pondrat-malware-hidden-in-python.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-118" target="_blank" rel="noopener noreferrer nofollow">PondRat Malware Hidden in Python Packages</a><br>A new malware variant, PondRat, has been found hidden within Python packages on repositories like PyPI. The malware targets developers by spreading through infected code libraries, allowing attackers to steal sensitive project data. Developers are advised to verify the integrity of third-party libraries before use.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=4a0e638e-470f-4b85-88d0-7d2248bcbf92&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #117</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-117</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-117</guid>
  <pubDate>Fri, 20 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-20T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> cover important updates on newly released security patches, cyber vulnerabilities, and threats, affecting both enterprises and individual users. Companies like VMware, Ivanti, and GitLab have issued patches for critical flaws, while new cyber threats, such as ransomware and malware, continue to target organizations. As the cybersecurity landscape evolves, staying informed about these developments is crucial to defending against emerging risks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/19/vmware-releases-security-advisory-vmware-cloud-foundation-and-vcenter-server?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">VMware Releases Security Advisory for Cloud Foundation and vCenter Server</a></b><br>VMware has issued a security advisory addressing vulnerabilities in VMware Cloud Foundation and vCenter Server. These vulnerabilities could lead to remote code execution and privilege escalation. Administrators are urged to update their systems immediately to prevent exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/19/ivanti-releases-admin-bypass-security-update-cloud-services-appliance?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Ivanti Releases Admin Bypass Security Update for Cloud Services Appliance</a></b><br>Ivanti has released a patch for a critical flaw in its Cloud Services Appliance, which allows attackers to bypass administrative controls. The vulnerability poses a significant risk if left unpatched, and organizations using Ivanti products should update their systems promptly.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/19/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">CISA Adds One Known Exploited Vulnerability to Catalog</a></b><br>CISA has added another exploited vulnerability to its Known Exploited Vulnerabilities Catalog. The flaw, currently being exploited in the wild, highlights the importance of keeping systems up to date to mitigate potential attacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/19/cisa-releases-six-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Six Industrial Control Systems Advisories</a></b><br>CISA has issued six advisories related to vulnerabilities in Industrial Control Systems (ICS), covering several vendors. These vulnerabilities could allow unauthorized access, disrupt operations, or enable remote code execution, and users of these systems should apply patches as soon as possible.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.ic3.gov/Media/News/2024/240918.pdf?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">IC3 Reports Surge in Fake Job Scams</a></b><br>The FBI’s IC3 has warned of an increase in fake job scams, where fraudsters create phony job postings to steal personal information and money from applicants. Victims are often asked to provide sensitive data or pay upfront fees. Job seekers are advised to research opportunities carefully before providing any information.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blogs.blackberry.com/en/2024/09/apple-intelligence-data-privacy-security?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Apple’s Intelligence on Data Privacy and Security</a></b><br>Apple&#39;s latest report focuses on its advancements in data privacy and security. It highlights new features that prioritize user privacy and security, including enhanced encryption and stricter app data-sharing policies. Apple continues to set a high standard in protecting user information.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.greynoise.io/blog/greynoise-reveals-new-internet-noise-storm-secret-messages-and-the-china-connection?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">GreyNoise Reveals Internet Noise Storm and China Connection</a></b><br>GreyNoise has uncovered a mysterious surge in internet &quot;noise,&quot; linked to China. This activity includes scans and probes of internet services, which may contain hidden messages and indicate state-sponsored cyber espionage. Organizations are urged to monitor unusual traffic patterns.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/unc2970-backdoor-trojanized-pdf-reader/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">UNC2970 Uses Backdoor in Trojanized PDF Reader</a></b><br>A new threat actor, UNC2970, has been using a trojanized PDF reader to deploy backdoors in targeted systems. This tactic allows attackers to steal sensitive data and maintain persistence. Security teams are advised to scrutinize PDF readers for signs of tampering.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/gitlab-patches-critical-saml.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">GitLab Patches Critical SAML Vulnerability</a></b><br>GitLab has patched a critical vulnerability in its Security Assertion Markup Language (SAML) integration, which could have allowed attackers to bypass authentication. Users are urged to update their GitLab installations immediately to protect against potential exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.sekoia.io/webdav-as-a-service-uncovering-the-infrastructure-behind-emmenhtal-loader-distribution/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Uncovering the Infrastructure Behind the Emmental Loader</a></b><br>Researchers have discovered the infrastructure used to distribute the Emmental Loader, a tool used in sophisticated malware campaigns. The loader exploits WebDAV services for command and control, emphasizing the need for organizations to secure these services against abuse.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168577/hacking/antivirus-firm-dr-web-suffers-cyberattack.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Antivirus Firm Dr.Web Suffers Cyberattack</a></b><br>Russian antivirus company Dr.Web has confirmed a cyberattack on its internal systems. The extent of the breach is still under investigation, but the attack has raised concerns about the security of security software providers themselves.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/09/19/black-basta-ransomware-what-you-need-to-know?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Black Basta Ransomware: What You Need to Know</a></b><br>Black Basta ransomware continues to evolve, using advanced encryption and obfuscation techniques to lock down systems and demand ransom. The ransomware has targeted various industries worldwide, and organizations are encouraged to strengthen their defenses and prepare for potential attacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.oligo.security/blog/shining-a-light-on-shadow-vulnerabilities?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Shining a Light on Shadow Vulnerabilities</a></b><br>Shadow vulnerabilities—unnoticed or unpatched flaws in software—pose a growing threat to organizations. A new report highlights the need to identify and address these hidden risks, as they can be easily exploited by cybercriminals. Continuous monitoring and patching are crucial for reducing exposure.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://redcanary.com/blog/threat-detection/midyear-2024/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Red Canary&#39;s Midyear Threat Detection Report</a></b><br>Red Canary&#39;s midyear report reveals an increase in cyber threats targeting organizations, particularly through phishing and ransomware. The report emphasizes the importance of proactive threat detection and response strategies to stay ahead of cybercriminals.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.itpro.com/security/phishing/how-hackers-are-using-legitimate-tools-to-distribute-phishing-links?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">How Hackers Use Legitimate Tools to Distribute Phishing Links</a></b><br>Cybercriminals are increasingly using legitimate services, such as Google Docs or Dropbox, to distribute phishing links. This method helps evade detection by security tools, making it harder to identify and block malicious content. Users are advised to be cautious when clicking on links, even from trusted platforms.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/microsoft-warns-of-new-inc-ransomware.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-117" target="_blank" rel="noopener noreferrer nofollow">Microsoft Warns of New INC Ransomware</a></b><br>Microsoft has issued an alert about a new ransomware strain, INC, that targets corporate networks. The malware uses sophisticated encryption techniques to lock systems and demands high ransoms for decryption. Organizations are urged to implement strong backup and recovery plans to mitigate ransomware risks.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=006bb94b-f341-499b-aa9f-324773c42997&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #116</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-116</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-116</guid>
  <pubDate>Thu, 19 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-19T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> cover significant updates from the cybersecurity world, ranging from newly disclosed vulnerabilities to scam tactics and innovations in security tools. Major tech companies like Apple and Google are making waves with critical updates, while threat actors continue to evolve, targeting both individuals and organizations. As usual, we focus on protecting systems, understanding new threats, and mitigating risks in a fast-paced digital landscape. Here are the top stories you need to know.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/18/cisa-adds-five-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Five Known Exploited Vulnerabilities to Catalog</a></b><br>CISA has added five new vulnerabilities to its catalog, urging organizations to patch affected systems. These vulnerabilities, actively exploited in the wild, impact multiple software products and pose serious risks if left unaddressed. Admins are encouraged to review and apply necessary security updates immediately.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/18/apple-releases-security-updates-multiple-products?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Apple Releases Security Updates for Multiple Products</a></b><br>Apple has rolled out security updates across several products, including iOS, macOS, and watchOS, addressing critical flaws. These patches fix vulnerabilities that could allow attackers to exploit systems remotely. Users are strongly advised to update their devices to the latest versions.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://krebsonsecurity.com/2024/09/scam-funeral-streaming-groups-thrive-on-facebook/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Scam Funeral Streaming Groups Thrive on Facebook</a></b><br>Facebook is seeing a rise in fraudulent funeral streaming services that prey on grieving families. These scams promise to stream funerals but steal money and sensitive information instead. Users are urged to be cautious when using such services, particularly from unknown providers on social media.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://aws.amazon.com/blogs/security/using-amazon-detective-for-iam-investigations/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Using Amazon Detective for IAM Investigations</a></b><br>Amazon has introduced new features in Amazon Detective to streamline investigations into Identity and Access Management (IAM) activities. These enhancements provide deeper insights into suspicious actions involving IAM policies and permissions, helping organizations better monitor and respond to potential security incidents.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">0-0-0-0 Day: Exploiting </a></b><b><a class="link" href="https://Localhost?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Localhost</a></b><b><a class="link" href="https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow"> APIs from the Browser</a></b><br>A new vulnerability has been discovered allowing <a class="link" href="https://localhost?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">localhost</a> API exploitation from browsers. This issue stems from misconfigured web services, exposing systems to remote attackers. Security teams are encouraged to secure their API configurations to avoid such attacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/chrome-introduces-one-time-permissions.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Chrome Introduces One-Time Permissions</a></b><br>Google Chrome has launched one-time permissions, allowing users to grant temporary access to sensitive data, like location or camera, for a single session. This feature enhances privacy and limits the risk of unauthorized access by apps or sites after the session ends.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://sec.okta.com/articles/2024/09/unveiling-essence-security-customer-trust?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Okta&#39;s Essence of Security: Customer Trust</a></b><br>Okta emphasizes the importance of security in building customer trust. Their latest report highlights new strategies for reinforcing identity and access management (IAM) security. The focus remains on transparent security practices that foster long-term relationships with clients.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.ic3.gov/Media/News/2024/240917.pdf?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">IC3 Issues Alert on Rising Business Email Compromise Scams</a></b><br>The FBI&#39;s Internet Crime Complaint Center (IC3) warns of increasing Business Email Compromise (BEC) scams. Cybercriminals target organizations by impersonating trusted entities to steal large sums of money. IC3 urges businesses to improve email security and employee awareness.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168536/security/vmware-vcenter-server-cve-2024-38812.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">VMware vCenter Server Vulnerability CVE-2024-38812</a></b><br>A new critical vulnerability, CVE-2024-38812, has been discovered in VMware vCenter Server, potentially allowing remote code execution. Administrators are strongly advised to apply available patches immediately to mitigate this high-risk threat.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.helpnetsecurity.com/2024/09/18/crowdsec-open-source-crowdsourced-protection/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">CrowdSec Expands Open-Source, Crowdsourced Protection</a></b><br>CrowdSec, a collaborative cybersecurity platform, has enhanced its open-source solution, enabling users to share threat intelligence and defend against attacks. The platform allows real-time exchange of suspicious activity, helping communities build stronger defenses against cyber threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.elastic.co/security-labs/dprk-code-of-conduct?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">DPRK&#39;s Code of Conduct for Cyber Attacks</a></b><br>Researchers have uncovered guidelines used by North Korean hackers, revealing strict &quot;codes of conduct&quot; for cyberattacks. These insights help cybersecurity professionals better understand how DPRK-affiliated groups operate and improve defenses against their tactics.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/vulnerabilities-threats/zero-click-rce-bug-macos-calendar-exposes-icloud-data?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Zero-Click RCE Bug in macOS Calendar Exposes iCloud Data</a></b><br>A zero-click vulnerability in macOS Calendar allows attackers to remotely execute code and access iCloud data without user interaction. Apple has issued a patch, and users are urged to update their systems to prevent potential exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/temu-denies-breach-after-hacker-claims-theft-of-87-million-data-records/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Temu Denies Breach After Hacker Claims Theft of 87 Million Data Records</a></b><br>Temu, an online marketplace, denies claims of a massive data breach after a hacker alleged stealing 87 million records. The company insists there is no evidence of unauthorized access, but users are advised to monitor their accounts for suspicious activity.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.theregister.com/2024/09/17/google_cloud_document_ai_flaw/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">Google Cloud&#39;s Document AI Flaw Exposes Sensitive Information</a></b><br>A flaw in Google Cloud&#39;s Document AI service has been discovered, potentially exposing sensitive information processed by the platform. Google has acknowledged the issue and is working on a fix, urging users to follow best practices for data security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/north-korean-hackers-target-energy-and.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">North Korean Hackers Target Energy and Telecom Sectors</a></b><br>North Korean hackers have been linked to targeted attacks on energy and telecom industries. These advanced persistent threats (APTs) aim to disrupt infrastructure and steal sensitive data. Organizations in these sectors are urged to strengthen cybersecurity measures against such threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.malwarebytes.com/blog/news/2024/09/ios-18-is-out-here-are-the-new-privacy-and-security-features?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-116" target="_blank" rel="noopener noreferrer nofollow">iOS 18 Introduces New Privacy and Security Features</a></b><br>Apple&#39;s iOS 18 brings enhanced privacy and security features, including better app tracking transparency and more granular control over data sharing. These updates aim to give users greater control over their personal information and protect against malicious apps.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=aa1a3590-7dfd-485a-bf39-18e94a4c5d46&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #115</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-115</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-115</guid>
  <pubDate>Wed, 18 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-18T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Today’s news highlights newly exploited vulnerabilities added to CISA’s catalog, major patches from Apple, and advisory alerts to secure industrial control systems. We also explore a variety of cyber threats, from transitive access abuse in cloud environments to rising clipper malware targeting cryptocurrency exchanges. This collection emphasizes the need for prompt patching, secure design, and robust logging practices to stay ahead of the latest cybersecurity challenges.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-adds-four-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Four Known Exploited Vulnerabilities to Catalog</a></b><br>CISA has updated its Known Exploited Vulnerabilities Catalog with four new vulnerabilities that are actively targeted by attackers. Organizations are urged to prioritize patching these issues to minimize the risk of exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-releases-three-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Three Industrial Control Systems Advisories</a></b><br>CISA has issued advisories for three vulnerabilities affecting industrial control systems (ICS). These advisories highlight the critical importance of securing operational technologies in industries handling essential services and infrastructure.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/17/cisa-and-fbi-release-secure-design-alert-eliminating-cross-site-scripting-vulnerabilities?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">CISA and FBI Issue Alert on Eliminating Cross-Site Scripting Vulnerabilities</a></b><br>CISA and the FBI have released a joint alert focused on eliminating cross-site scripting (XSS) vulnerabilities. The advisory provides secure design recommendations for developers to help prevent XSS attacks that compromise web applications.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.securityweek.com/apple-patches-major-security-flaws-with-ios-18-refresh/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Apple Patches Major Security Flaws with iOS 18 Refresh</a></b><br>Apple has rolled out a significant iOS 18 update, addressing multiple security vulnerabilities that could be exploited for remote code execution. Users are strongly advised to update their devices to ensure protection from these critical flaws.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.wiz.io/blog/cloud-logging-tips-and-tricks?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Cloud Logging Tips and Tricks for Enhanced Security</a></b><br>Wiz provides a comprehensive guide on best practices for cloud logging, offering tips to help organizations improve visibility and detect potential security incidents in cloud environments. Effective logging is critical for robust cloud security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.vectra.ai/blog/transitive-access-abuse-data-exfiltration-via-document-ai?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Transitive Access Abuse and Data Exfiltration via Document AI</a></b><br>Vectra AI highlights how attackers can exploit transitive access in cloud environments, particularly through document AI services, to exfiltrate sensitive data. This emerging threat underscores the need for securing cloud-based AI solutions.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securitylabs.datadoghq.com/articles/abusing-entra-id-administrative-units/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Abusing Entra ID Administrative Units</a></b><br>Datadog researchers reveal how attackers can abuse Entra ID (formerly Azure AD) administrative units to elevate privileges and gain unauthorized access. The blog stresses the importance of monitoring administrative roles and permissions.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://bughunters.google.com/blog/6302522760626176/non-actionable-findings-in-3rd-party-security-scanners-and-how-to-identify-them?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Google Warns Against Non-Actionable Findings in 3rd-Party Security Scanners</a></b><br>Google&#39;s Bug Hunters discuss the limitations of third-party security scanners, warning against false positives and non-actionable findings. Security teams are advised to focus on vulnerabilities that pose real threats to their environments.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/binance-warns-of-rising-clipper-malware.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Binance Warns of Rising Clipper Malware Threats</a></b><br>Binance has issued a warning about the increasing prevalence of clipper malware, which hijacks cryptocurrency transactions by altering clipboard data. Users and crypto exchanges are urged to implement strong anti-malware protections.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://intel471.com/blog/a-look-at-the-residential-proxy-market?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">The Growing Residential Proxy Market and Its Implications</a></b><br>Intel471 explores the booming residential proxy market, which cybercriminals use to obfuscate malicious activities. This trend is complicating efforts to trace online attacks and poses new challenges for cybersecurity professionals.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.theregister.com/2024/09/17/microsoft_zero_day_spoofing_flaw/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Microsoft Zero-Day Spoofing Vulnerability Exposed</a></b><br>Microsoft has disclosed a zero-day vulnerability that allows attackers to spoof identities, bypassing security mechanisms. The flaw is actively exploited in the wild, and a patch is expected soon.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://arstechnica.com/security/2024/09/secure-boot-neutering-pkfail-debacle-is-more-prevalent-than-anyone-knew/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Secure Boot Vulnerability (PKFail) More Prevalent Than Expected</a></b><br>A widespread Secure Boot vulnerability, known as PKFail, is affecting more devices than initially believed. The flaw allows attackers to disable Secure Boot protections, leaving systems exposed to unauthorized modifications.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/application-security/void-banshee-exploits-second-microsoft-zero-day?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Void Banshee Exploits Second Microsoft Zero-Day</a></b><br>The Void Banshee group has exploited a second zero-day vulnerability in Microsoft software, demonstrating their sophisticated methods to compromise systems. This underscores the urgency for organizations to apply security updates promptly.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://research.openanalysis.net/emmenhtal/polygot/loader/2024/09/16/emmenhtal.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Emmenhtal Loader Facilitates Polygot Malware Delivery</a></b><br>OpenAnalysis reports on the Emmenhtal loader, a new malware tool designed to deliver multiple payloads using polygot techniques. This loader&#39;s versatility makes it a powerful tool for cybercriminals targeting a variety of platforms.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168480/data-breach/qilin-attack-on-synnovis-impacted-900000-patients.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Qilin Ransomware Attack on Synnovis Impacts 900,000 Patients</a></b><br>A ransomware attack by the Qilin group on Synnovis, a healthcare services provider, has compromised the personal and medical data of 900,000 patients. The breach highlights the vulnerabilities in healthcare systems to cyber threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.horizon3.ai/attack-research/attack-blogs/cve-2023-28324-deep-dive/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-115" target="_blank" rel="noopener noreferrer nofollow">Deep Dive into CVE-2023-28324: A Critical Vulnerability</a></b><br>Horizon3.ai provides an in-depth analysis of CVE-2023-28324, a critical vulnerability that could allow attackers to execute arbitrary code on affected systems. The blog emphasizes the importance of patching to prevent exploitation.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=4b37f7c7-c1dc-4dc3-a29a-0be5e1c21c90&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #114</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-114</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-114</guid>
  <pubDate>Tue, 17 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-17T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Today&#39;s cybersecurity roundup covers the latest exploited vulnerabilities added to CISA&#39;s catalog, new defense plans for federal agencies, and multiple cyberattacks targeting software and cloud services. Key updates include hybrid ransomware threats, vulnerabilities in Microsoft VS Code, and Google’s latest threat analysis report. From socially-engineered attacks to malicious trojans on Android, these stories highlight the diverse and evolving nature of cyber threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/16/cisa-adds-two-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Two Known Exploited Vulnerabilities to Catalog</a></b><br>CISA has added two newly exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. Organizations are encouraged to prioritize patching these flaws to protect against potential cyberattacks, as both are actively targeted by threat actors.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/16/new-cisa-plan-aligns-federal-agencies-cyber-defense?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">CISA Unveils New Cyber Defense Plan for Federal Agencies</a></b><br>CISA has released a new plan to align federal agencies&#39; cybersecurity strategies, focusing on unified defense measures and improving resilience against cyberattacks. This initiative aims to streamline cyber defenses across the federal landscape.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/application-security/microsoft-vs-code-undermined-in-asian-spy-attack?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Microsoft VS Code Targeted in Asian Spy Attack</a></b><br>A recent cyber espionage campaign targeting developers exploited vulnerabilities in Microsoft VS Code. The attackers, believed to be state-sponsored actors from Asia, aimed to steal sensitive data, underlining the need for stronger software supply chain security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.elastic.co/security-labs/kernel-etw-best-etw?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Best Practices for Using Kernel ETW in Threat Detection</a></b><br>Elastic Security Labs explores the use of Kernel Event Tracing for Windows (ETW) in threat detection. This blog discusses the benefits of ETW for monitoring kernel-level activity and enhancing defensive capabilities against advanced threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.google/threat-analysis-group/tag-bulletin-q3-2024/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Google TAG Bulletin for Q3 2024: New Threat Trends</a></b><br>Google’s Threat Analysis Group (TAG) releases its Q3 2024 bulletin, detailing emerging cyber threats, including state-sponsored attacks and vulnerabilities in widely used software. The report highlights ongoing efforts to combat global cyber threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/cloud-security/socially-savvy-scattered-spider-traps-cloud-admins-in-web?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Scattered Spider Uses Social Engineering to Trap Cloud Admins</a></b><br>Scattered Spider, a notorious threat group, is using sophisticated social engineering techniques to compromise cloud administrators. The group’s tactics highlight the growing need for cloud providers to reinforce security awareness and controls.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://outpost24.com/blog/crystal-ransom-hybrid-ransomware/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">CrystalRansom: A New Hybrid Ransomware Threat</a></b><br>Outpost24 reports on a new hybrid ransomware variant, CrystalRansom, which combines encryption and extortion tactics. This ransomware targets both local systems and cloud environments, demanding ransoms while threatening data leaks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.securityweek.com/new-chrome-features-protect-users-against-threats-provide-more-control-over-personal-data/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">New Chrome Features Boost Security and Privacy</a></b><br>Google Chrome has introduced new features designed to protect users from online threats while giving them more control over personal data. These updates aim to enhance browser security and improve user privacy management.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.zerodayinitiative.com/blog/2024/9/11/exploiting-exchange-powershell-after-proxynotshell-part-2-approvedapplicationcollection?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Exploiting Exchange PowerShell Vulnerabilities Post-ProxyNotShell</a></b><br>Researchers from the Zero Day Initiative detail how attackers can exploit Exchange PowerShell vulnerabilities even after the ProxyNotShell patches. The blog highlights the risks associated with misconfigured PowerShell settings.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.malwarebytes.com/blog/scams/2024/09/scammers-advertise-fake-applecare-service-via-github-repos?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Fake AppleCare Service Scams Hosted on GitHub</a></b><br>Scammers are using GitHub repositories to host fake AppleCare services, tricking users into paying for nonexistent tech support. Users are warned to be cautious of unsolicited offers for technical assistance on public platforms.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://aws.amazon.com/blogs/security/create-security-observability-using-generative-ai-with-security-lake-and-amazon-q-in-quicksight/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Using Generative AI for Security Observability with Amazon Security Lake</a></b><br>Amazon introduces the use of generative AI for enhanced security observability through its Security Lake and Amazon Q services. These tools allow for faster detection and analysis of security threats using AI-driven insights.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.itpro.com/security/cyber-attacks/t-mobiles-vm-logs-allegedly-leaked-in-20-gb-capgemini-data-breach?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">T-Mobile VM Logs Leaked in Capgemini Data Breach</a></b><br>T-Mobile customer virtual machine logs have allegedly been exposed in a Capgemini data breach. The 20GB data leak raises concerns about third-party security practices and the protection of sensitive corporate information.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168456/security/solarwinds-fixed-rce-cve-2024-28991.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">SolarWinds Patches Critical RCE Vulnerability (CVE-2024-28991)</a></b><br>SolarWinds has issued a patch for a critical remote code execution vulnerability (CVE-2024-28991) that could allow attackers to fully compromise affected systems. Administrators are urged to apply the patch immediately to mitigate risk.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.helpnetsecurity.com/2024/09/16/echostrike-reverse-shells-process-injection/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">EchoStrike Malware Uses Reverse Shells for Process Injection</a></b><br>A new malware strain called EchoStrike has been identified, using reverse shells and process injection techniques to take over victim machines. This sophisticated malware targets high-value systems, requiring enhanced endpoint protection.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/windows-vulnerability-abused-braille-spaces-in-zero-day-attacks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">Windows Vulnerability Exploited with Braille Spaces in Zero-Day Attacks</a></b><br>A zero-day vulnerability in Windows, exploiting Braille spaces, has been used in attacks to bypass security filters. This obscure technique demonstrates the creativity of attackers in finding new ways to evade detection and infiltrate systems.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/trickmo-android-trojan-exploits.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-114" target="_blank" rel="noopener noreferrer nofollow">TrickMo Android Trojan Exploits Banking Apps</a></b><br>The TrickMo Android trojan, targeting banking apps, is being used to intercept two-factor authentication codes and gain unauthorized access to user accounts. Android users are advised to update their apps and enable additional security measures.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=657edbeb-6c46-4e30-a5db-bd72fe009b85&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #113</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-113</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-113</guid>
  <pubDate>Mon, 16 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-16T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:start;">In today&#39;s cybersecurity news, we highlight the latest known exploited vulnerabilities added to CISA’s catalog, new patches from Ivanti, and a comprehensive analysis of FY23 risk assessments. We also explore cloud security breaches, critical vulnerabilities affecting popular platforms like GitLab, and emerging malware tactics. These stories emphasize the persistent threats organizations face and the need for continuous vigilance.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/13/cisa-adds-one-known-exploited-vulnerability-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">CISA Adds One Known Exploited Vulnerability to Catalog</a></b><br>CISA has added a new vulnerability to its Known Exploited Vulnerabilities Catalog. Organizations are urged to prioritize patching this flaw to mitigate potential attacks, as it is actively being exploited in the wild.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/13/ivanti-releases-security-update-cloud-services-appliance?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Ivanti Releases Security Update for Cloud Services Appliance</a></b><br>Ivanti has issued an important security update for its Cloud Services Appliance, addressing vulnerabilities that could lead to unauthorized access or system compromise. Users are encouraged to apply the update as soon as possible.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/13/cisa-releases-analysis-fy23-risk-and-vulnerability-assessments?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Analysis of FY23 Risk and Vulnerability Assessments</a></b><br>CISA has published its analysis of risk and vulnerability assessments (RVAs) for fiscal year 2023, revealing critical insights into the most common security weaknesses in federal agencies. The report provides recommendations for strengthening defenses.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://security.googleblog.com/2024/09/a-new-path-for-kyber-on-web.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Google Introduces Kyber on Web for Enhanced Post-Quantum Security</a></b><br>Google has introduced Kyber, a post-quantum cryptography algorithm, for secure web applications. This marks a significant step in preparing for future quantum threats, ensuring web communications remain secure in the coming years.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168375/security/gitlab-ce-ee-critical-issue.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">GitLab CE/EE Critical Security Flaw Exposed</a></b><br>A critical vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) has been identified, potentially allowing attackers to execute arbitrary code. GitLab administrators are advised to apply the latest patches immediately.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://arstechnica.com/security/2024/09/researchers-still-dont-know-how-1-3-million-android-streaming-boxes-were-backdoored/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Researchers Investigate Backdoors in 1.3 Million Android Streaming Boxes</a></b><br>Security researchers are investigating how over 1.3 million Android streaming boxes were infected with backdoors. The devices are being exploited for various malicious activities, though the initial infection vector remains unclear.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/cloud-security/fortinet-customer-data-breach-third-party?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Fortinet Customer Data Breach via Third-Party Vendor</a></b><br>Fortinet has disclosed a data breach affecting customer information, which occurred through a third-party vendor. The breach underscores the importance of vetting third-party service providers to avoid data exposure risks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.c4isrnet.com/news/your-army/2024/09/13/this-army-division-just-ran-cybersecurity-for-a-far-away-brigade/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Army Division Runs Cybersecurity Operations for Remote Brigade</a></b><br>In a first, a U.S. Army division provided remote cybersecurity support for a brigade stationed far away. The exercise demonstrates how military units can now protect their networks across large geographical distances through advanced cybersecurity measures.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29847-deep-dive-ivanti-endpoint-manager-agentportal-deserialization-of-untrusted-data-remote-code-execution-vulnerability/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Deep Dive into Ivanti Endpoint Manager RCE Vulnerability (CVE-2024-29847)</a></b><br><a class="link" href="https://Horizon3.ai?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Horizon3.ai</a> explores the Ivanti Endpoint Manager deserialization vulnerability (CVE-2024-29847) that could allow remote code execution (RCE). Attackers exploiting this flaw could gain complete control over affected systems, making patching critical.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/apple-vision-pro-vulnerability-exposed.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Apple Vision Pro Vulnerability Discovered</a></b><br>Researchers have uncovered a security vulnerability in Apple’s Vision Pro headset, potentially allowing attackers to hijack the device. Apple is investigating and working on a patch to secure this next-generation technology.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://aws.amazon.com/blogs/security/reduce-risks-of-user-sign-up-fraud-and-sms-pumping-with-amazon-cognito-user-pools/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Reducing Fraud Risk in User Sign-Ups with Amazon Cognito</a></b><br>Amazon is rolling out new features in Cognito User Pools to reduce the risks of user sign-up fraud and SMS pumping. These tools help improve the security of user registrations and prevent abuse by bad actors.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Cryptographic Vulnerability: Don’t Reuse Nonces</a></b><br>Trail of Bits explores the dangers of nonce reuse in cryptographic operations, which can lead to serious vulnerabilities. The blog stresses the importance of proper nonce generation and management in secure systems.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168364/malware/hadooken-targets-oracle-weblogic-servers.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Hadooken Malware Targets Oracle WebLogic Servers</a></b><br>Hadooken malware is exploiting Oracle WebLogic servers to deploy ransomware and other malicious activities. Administrators of WebLogic environments are urged to apply recent patches and strengthen their security configurations.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/malware-locks-browser-in-kiosk-mode-to-steal-google-credentials/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">Malware Locks Browsers in Kiosk Mode to Steal Google Credentials</a></b><br>A new form of malware locks victims&#39; browsers in kiosk mode to trick them into entering their Google credentials. This technique highlights the growing sophistication of phishing attacks aimed at stealing account information.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://krebsonsecurity.com/2024/09/the-dark-nexus-between-harm-groups-and-the-com/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-113" target="_blank" rel="noopener noreferrer nofollow">The Dark Nexus Between Harm Groups and the .COM</a></b><br>Brian Krebs explores the connection between harmful online groups and the use of .COM domains for illegal activities. This investigation sheds light on how cybercriminals leverage these domains for malicious purposes.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b252c1a9-deb6-473e-aae5-17e6b3a98802&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #112</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-112</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-112</guid>
  <pubDate>Fri, 13 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-13T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b></p><p class="paragraph" style="text-align:start;">Today&#39;s news delves into critical security updates from Adobe and Cisco, new cybersecurity advisories for industrial systems, and the rise of cybercrime methods like proxyjacking and cryptomining. We also cover emerging threats like fake password managers targeting developers and growing ransomware defenses such as Google&#39;s air-gapped backup vault.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/08/14/adobe-releases-security-updates-multiple-products?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Adobe Releases Security Updates for Multiple Products</a></b><br>Adobe has issued security updates addressing critical vulnerabilities across its product suite, including Photoshop and Acrobat. These patches are essential to prevent potential exploitation through remote code execution vulnerabilities.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/cisco-releases-security-updates-cisco-smart-licensing-utility?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Cisco Smart Licensing Utility Receives Security Updates</a></b><br>Cisco has rolled out patches for its Smart Licensing Utility to fix vulnerabilities that could enable attackers to bypass security controls. Users are strongly encouraged to update their systems to avoid exploitation risks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/12/cisa-releases-twenty-five-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">CISA Releases 25 Industrial Control Systems Advisories</a></b><br>CISA issued advisories for 25 industrial control systems (ICS) vulnerabilities, affecting critical infrastructure sectors. Organizations should review and apply necessary updates to safeguard against potential cyberattacks on operational technologies.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://research.openanalysis.net/credflusher/kiosk/stealer/stealc/amadey/autoit/2024/09/11/cred-flusher.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Cred Flusher and Stealers Exposed in Latest Threat Research</a></b><br>Researchers uncovered &quot;Cred Flusher,&quot; a tool designed to exfiltrate credentials using popular stealers like Amadey and StealC. These findings show how attackers leverage legitimate tools for credential theft, highlighting the need for strong endpoint security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.welivesecurity.com/en/scams/6-common-geek-squad-scams-how-defend/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">How to Defend Against Common Geek Squad Scams</a></b><br>WeLiveSecurity outlines six common scams impersonating Geek Squad services, often used to trick victims into providing sensitive information or paying fake fees. Consumers are urged to verify communications and be cautious of unsolicited offers.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cadosecurity.com/blog/from-automation-to-exploitation-the-growing-misuse-of-selenium-grid-for-cryptomining-and-proxyjacking?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Selenium Grid Misused for Cryptomining and Proxyjacking</a></b><br>Selenium Grid, a popular automation tool, is being exploited by cybercriminals for cryptomining and proxyjacking activities. Organizations using Selenium Grid should ensure proper security controls are in place to prevent misuse.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168313/security/adobe-patch-tuesday-sept-2024.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Adobe Patch Tuesday Fixes Critical Vulnerabilities (September 2024)</a></b><br>Adobe’s September 2024 Patch Tuesday addressed several critical vulnerabilities across key products. These patches fix remote code execution flaws and other security issues, and users are urged to apply updates immediately.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">WordPress Mandates Two-Factor Authentication (2FA)</a></b><br>WordPress has made two-factor authentication mandatory for all accounts, a move aimed at bolstering security and reducing account compromises. The platform&#39;s decision is part of broader efforts to protect users from phishing and brute-force attacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/08/28/the-art-and-science-behind-microsoft-threat-hunting-part-3/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">The Art and Science of Microsoft Threat Hunting (Part 3)</a></b><br>In the latest part of Microsoft’s series on threat hunting, the company discusses how a combination of advanced analytics and human expertise helps identify and neutralize sophisticated cyber threats before they escalate.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.theregister.com/2024/09/12/lvhn_lawsuit_ransom/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">LVHN Faces Lawsuit After Ransomware Attack</a></b><br>Lehigh Valley Health Network (LVHN) is facing a lawsuit following a ransomware attack that exposed sensitive patient information. The case highlights the legal and reputational risks organizations face in the wake of data breaches.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/fake-password-manager-coding-test-used-to-hack-python-developers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Fake Password Manager Targets Python Developers</a></b><br>A fake coding test disguised as a password manager has been used to hack Python developers, stealing credentials and sensitive information. Developers are advised to verify the legitimacy of any third-party tools before use.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.securityweek.com/google-introduces-air-gapped-backup-vault-to-thwart-ransomware/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-112" target="_blank" rel="noopener noreferrer nofollow">Google Introduces Air-Gapped Backup Vault to Defend Against Ransomware</a></b><br>Google has launched an air-gapped backup vault designed to protect data from ransomware attacks. This new feature isolates backups from network threats, offering an additional layer of defense against data loss.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=93ea2abf-72a6-474f-8374-da6cefb76f2b&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #111</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-111</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-111</guid>
  <pubDate>Thu, 12 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-12T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;">Today&#39;s roundup highlights significant vulnerabilities across multiple platforms and industries, from Adobe product flaws to brute-force attack tactics and newly discovered cloud ransomware threats. You&#39;ll also find a focus on securing software supply chains, advanced phishing techniques, and several critical zero-day vulnerabilities. These stories underscore the importance of proactive security measures in the ever-evolving threat landscape.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.sonarsource.com/blog/top-security-flaws-hiding-in-your-code-right-now-and-how-to-fix-them/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Top Security Flaws Hiding in Your Code and How to Fix Them</a></b><br>SonarSource examines common security vulnerabilities found in modern code, such as SQL injection and cross-site scripting (XSS). The blog provides best practices for detecting and mitigating these issues to enhance code security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.securityweek.com/adobe-patches-critical-code-execution-flaws-in-multiple-products/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Adobe Patches Critical Code Execution Flaws in Multiple Products</a></b><br>Adobe has released updates for several products to fix critical vulnerabilities that could allow remote code execution. Affected software includes Adobe Acrobat, Reader, and Photoshop. Users are advised to patch immediately.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://redcanary.com/blog/threat-detection/brute-force-attacks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Brute-Force Attacks and Their Increasing Threat</a></b><br>Brute-force attacks continue to rise, targeting weak or reused passwords. Red Canary outlines how attackers use automated tools to compromise accounts and offers guidance on strengthening authentication mechanisms to prevent these attacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.zscaler.com/blogs/security-research/phishing-typosquatting-and-brand-impersonation-trends-and-tactics?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Phishing, Typosquatting, and Brand Impersonation Trends</a></b><br>Zscaler details the latest phishing trends, including typosquatting and brand impersonation, which trick users into visiting malicious sites. The report urges businesses to educate employees and deploy advanced security solutions to combat these tactics.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.eclecticiq.com/ransomware-in-the-cloud-scattered-spider-targeting-insurance-and-financial-industries?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Ransomware in the Cloud: Scattered Spider Targeting Finance</a></b><br>The Scattered Spider group is using ransomware to target cloud environments in the insurance and financial sectors. The blog highlights the tactics, techniques, and procedures (TTPs) used and stresses the need for robust cloud security practices.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://bughunters.google.com/blog/6220757425586176/cvr-the-mines-of-kakad-m?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Google Bug Hunters Reveal CVR Vulnerabilities</a></b><br>Google’s bug hunting team uncovers serious vulnerabilities in critical systems under their Continuous Vulnerability Research (CVR) program. These flaws could lead to remote code execution, with fixes already underway for affected products.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.tenable.com/blog/cve-2021-20123-cve-2021-20124-draytek-vulnerabilities-discovered-by-tenable-research-added-to?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">DrayTek Router Vulnerabilities Added to Exploit List</a></b><br>Tenable Research has added vulnerabilities CVE-2021-20123 and CVE-2021-20124 in DrayTek routers to their known exploit list. Attackers could exploit these flaws to gain unauthorized control of devices, making patching critical.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://blog.sekoia.io/securing-gold-hunting-typosquatted-domains-during-the-olympics/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Typosquatted Domains Targeted During the Olympics</a></b><br>SEKOIA.IO uncovered a campaign targeting typosquatted domains during the Olympics to distribute malware and phishing attacks. The findings highlight the importance of monitoring brand-related domains, especially during high-profile events.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://krebsonsecurity.com/2024/09/bug-left-some-windows-pcs-dangerously-unpatched/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Windows Update Bug Left Some PCs Dangerously Unpatched</a></b><br>A Windows Update bug left certain machines unpatched, exposing them to potential vulnerabilities. The issue has since been fixed, but users are advised to manually verify that all necessary updates have been applied.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.darkreading.com/application-security/microsoft-discloses-4-zero-days-in-september-update?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Microsoft Discloses Four Zero-Days in September Update</a></b><br>Microsoft&#39;s September Patch Tuesday release includes fixes for four zero-day vulnerabilities. These flaws are already being exploited in the wild, making it essential for organizations to apply these patches as soon as possible.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">New Pixhell Attack Extracts Data from LCD Screen Noise</a></b><br>Researchers have developed an acoustic attack called Pixhell, which can extract data from LCD screens based on sound emissions. This new side-channel attack highlights the increasing sophistication of hardware-based cyber threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168286/security/ivanti-epm-critical-flaws.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Ivanti Endpoint Manager Critical Flaws Disclosed</a></b><br>Critical vulnerabilities in Ivanti&#39;s Endpoint Manager (EPM) have been disclosed, potentially allowing attackers to take control of systems. Security experts recommend immediate patching to avoid exploitation in enterprise environments.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securitycafe.ro/2024/09/11/red-team-finds-a-way-insecure-by-design/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">Red Team Finds Critical “Insecure by Design” Flaw</a></b><br>A red team operation discovered an “insecure by design” flaw in a widely used system, allowing attackers to bypass security controls easily. The report urges organizations to reassess their system designs to avoid such critical vulnerabilities.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-111" target="_blank" rel="noopener noreferrer nofollow">$20 Bug Leads to Admin Access in Mobi Platform</a></b><br>Researchers at WatchTowr exploited a $20 vulnerability that granted them remote code execution (RCE) and, inadvertently, admin privileges on the Mobi platform. This highlights how seemingly small flaws can have significant consequences.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=d4aff96f-4df4-426d-970b-9b056ed4c48b&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #110</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-110</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-110</guid>
  <pubDate>Wed, 11 Sep 2024 14:30:00 +0000</pubDate>
  <atom:published>2024-09-11T14:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b></p><p class="paragraph" style="text-align:start;">Today&#39;s cybersecurity news covers a range of updates and alerts from major vendors like Cisco, Citrix, and Ivanti, as well as significant data breach disclosures and new exploits targeting widely-used platforms. From critical security patches to sophisticated threat actor discoveries, these stories highlight the ongoing challenges in securing networks and devices. We’ll also touch on advancements in open-source tools and techniques to combat these threats.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/cisco-releases-security-updates-cisco-smart-licensing-utility?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Cisco Releases Security Updates for Smart Licensing Utility</a></b><br>Cisco has issued patches for its Smart Licensing Utility, addressing vulnerabilities that could allow attackers to bypass security mechanisms. Users are urged to apply updates to protect systems from exploitation of these flaws.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/cisa-adds-four-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Four Known Exploited Vulnerabilities to Catalog</a></b><br>CISA added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog. Agencies are advised to prioritize patching to prevent potential attacks, as these flaws are actively being targeted by threat actors.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/ivanti-releases-security-updates-endpoint-manager-cloud-service-application-and-workspace-control?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Ivanti Releases Security Updates for Endpoint Manager and Workspace Control</a></b><br>Ivanti has rolled out updates to address vulnerabilities in its Endpoint Manager Cloud and Workspace Control. These updates are critical for preventing unauthorized access and potential exploitation.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/citrix-releases-security-updates-citrix-workspace-app-windows?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Citrix Releases Security Updates for Workspace App on Windows</a></b><br>Citrix has released patches for the Citrix Workspace app on Windows, fixing security flaws that could be exploited by attackers to compromise user devices. Prompt updates are recommended for users to stay protected.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/10/cisa-releases-four-industrial-control-systems-advisories?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">CISA Releases Four Industrial Control Systems Advisories</a></b><br>CISA has issued advisories for multiple industrial control systems (ICS) vulnerabilities. Operators of critical infrastructure are advised to review and address these flaws to safeguard against potential cyberattacks.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-249-01?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Security Advisory on Medtronic&#39;s Micra Pacemaker Models</a></b><br>CISA has released a medical advisory regarding vulnerabilities in Medtronic&#39;s Micra pacemakers. Exploitation could disrupt the functionality of these devices, posing a risk to patients, and updates are recommended.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://krebsonsecurity.com/2024/09/bug-left-some-windows-pcs-dangerously-unpatched/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Bug Left Some Windows PCs Dangerously Unpatched</a></b><br>A bug in Windows Update left several Windows PCs vulnerable by failing to apply critical patches. The issue has now been fixed, but users are encouraged to double-check their systems to ensure patches have been applied.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168229/data-breach/slim-cd-disclosed-a-data-breach.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">SLIM CD Discloses Data Breach</a></b><br>SLIM CD, a payment processing provider, disclosed a data breach affecting customer information. The incident raises concerns about the security of financial transactions, and customers are advised to monitor their accounts closely.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://intel471.com/blog/threat-hunting-case-study-uncovering-fin7?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">FIN7 Threat Group Case Study Uncovered</a></b><br>Intel471 reveals insights into the notorious FIN7 group, detailing its sophisticated methods to breach networks. This case study underscores the need for advanced threat hunting techniques to identify and neutralize such actors.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://intezer.com/blog/research/cryptbot-yet-another-silly-stealer-yass/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">CryptBot: Yet Another Silly Stealer (YASS)</a></b><br>Intezer Labs uncovers CryptBot, a data-stealing malware targeting personal and financial information. Despite being a low-tier stealer, its wide distribution makes it a significant threat to unsuspecting users.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.helpnetsecurity.com/2024/09/10/open-source-cybersec-tools/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Top Open Source Cybersecurity Tools of 2024</a></b><br>Help Net Security reviews top open-source cybersecurity tools, offering alternatives for organizations looking to bolster their defenses without high costs. These tools cover areas from vulnerability scanning to incident response.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://securityaffairs.com/168242/hacking/whatsapp-view-once-privacy-feature.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">WhatsApp’s “View Once” Privacy Feature Hacked</a></b><br>Security researchers discovered a flaw in WhatsApp&#39;s &quot;View Once&quot; feature, allowing attackers to bypass restrictions and permanently save the content. This raises concerns about the app&#39;s privacy protections.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.bleepingcomputer.com/news/security/quad7-botnet-targets-more-soho-and-vpn-routers-media-servers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Quad7 Botnet Targets SOHO Routers and Media Servers</a></b><br>The Quad7 botnet is now actively targeting small office/home office (SOHO) routers and media servers, exploiting unpatched devices to spread malware. Users are urged to update firmware and strengthen network security.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.securityweek.com/google-pushes-rust-in-legacy-firmware-to-tackle-memory-safety-flaws/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Google Pushes Rust in Legacy Firmware to Address Memory Safety Issues</a></b><br>Google is introducing the Rust programming language in its legacy firmware as a way to tackle memory safety vulnerabilities. This move could reduce the number of exploitable bugs in devices using older firmware.</p><p class="paragraph" style="text-align:start;"><b><a class="link" href="https://www.legitsecurity.com/blog/how-to-mitigate-the-risk-of-github-actions?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-110" target="_blank" rel="noopener noreferrer nofollow">Mitigating GitHub Actions Risks</a></b><br>GitHub Actions, widely used for automating software workflows, poses security risks if not properly configured. Legit Security outlines mitigation strategies to prevent unauthorized access and code execution.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b78344ac-015f-4f20-96e7-b3c64eb42f04&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #109</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-109</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-109</guid>
  <pubDate>Tue, 10 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-10T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:start;"><b>Security News Headlines for today</b> bring critical updates on newly discovered vulnerabilities, state-sponsored cyber threats, and emerging malware tactics. These developments highlight the growing sophistication of cyberattacks across various industries, from critical infrastructure to e-commerce. Here’s what you need to know:</p><h3 class="heading" style="text-align:start;" id="cisa-adds-three-vulnerabilities-to-"><a class="link" href="https://www.cisa.gov/news-events/alerts/2024/09/09/cisa-adds-three-known-exploited-vulnerabilities-catalog?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">CISA Adds Three Vulnerabilities to Known Exploited Catalog</a></h3><p class="paragraph" style="text-align:start;">CISA has added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. These include critical flaws that threat actors are actively targeting in the wild. Organizations are urged to prioritize patching these vulnerabilities to avoid exploitation.</p><h3 class="heading" style="text-align:start;" id="unauthorized-starlink-device-found-"><a class="link" href="https://arstechnica.com/security/2024/09/sailors-hid-an-unauthorized-starlink-on-the-deck-of-a-us-warship-and-lied-about-it/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Unauthorized Starlink Device Found on US Warship</a></h3><p class="paragraph" style="text-align:start;">Sailors on a US warship installed an unauthorized Starlink device, potentially compromising security protocols. The crew lied about the installation, raising concerns about unauthorized equipment use in sensitive military operations. The incident underscores the need for stricter control over communication systems in the military.</p><h3 class="heading" style="text-align:start;" id="unpatched-vulnerability-in-ti-woo-c"><a class="link" href="https://wpscan.com/blog/unpatched-vulnerability-in-ti-woocommerce-wishlist-plugin/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Unpatched Vulnerability in TI WooCommerce Wishlist Plugin</a></h3><p class="paragraph" style="text-align:start;">A critical unpatched vulnerability in the TI WooCommerce Wishlist plugin has been discovered. This flaw affects over 70,000 WordPress websites and could allow attackers to exploit weaknesses in e-commerce platforms. WordPress site owners using this plugin should monitor for updates and apply security measures.</p><h3 class="heading" style="text-align:start;" id="emergency-fix-for-progress-software"><a class="link" href="https://securityaffairs.com/168192/security/progress-software-emergency-loadmaster-flaw.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Emergency Fix for Progress Software LoadMaster Flaw</a></h3><p class="paragraph" style="text-align:start;">Progress Software has issued an emergency patch for a critical vulnerability in its LoadMaster product. If exploited, this flaw could allow remote attackers to compromise systems. All users are advised to update their systems immediately to mitigate this risk.</p><h3 class="heading" style="text-align:start;" id="loki-new-agent-for-mythic-malware-f"><a class="link" href="https://securelist.com/loki-agent-for-mythic/113596/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Loki: New Agent for Mythic Malware Framework</a></h3><p class="paragraph" style="text-align:start;">The Loki agent, a new addition to the Mythic malware framework, is gaining attention for its advanced capabilities in espionage and cyber-attack campaigns. This highly customizable tool targets a wide range of systems, making it a significant threat in the hands of cybercriminals.</p><h3 class="heading" style="text-align:start;" id="peach-sandstorm-deploys-new-tickler"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/08/28/peach-sandstorm-deploys-new-custom-tickler-malware-in-long-running-intelligence-gathering-operations/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Peach Sandstorm Deploys New ‘Tickler’ Malware</a></h3><p class="paragraph" style="text-align:start;">The Peach Sandstorm threat group, linked to Iran, has been deploying custom-built ‘Tickler’ malware in its intelligence-gathering operations. This malware targets both government and private organizations, with sophisticated techniques designed to evade detection.</p><h3 class="heading" style="text-align:start;" id="new-rambo-attack-steals-data-from-a"><a class="link" href="https://www.bleepingcomputer.com/news/security/new-rambo-attack-steals-data-using-ram-in-air-gapped-computers/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">New RAMBO Attack Steals Data from Air-Gapped Systems</a></h3><p class="paragraph" style="text-align:start;">Researchers have uncovered a novel attack dubbed &quot;RAMBO,&quot; which steals data from air-gapped computers using RAM to exfiltrate sensitive information. This technique bypasses traditional security measures by leveraging subtle electromagnetic signals, posing a new challenge for highly secure environments.</p><h3 class="heading" style="text-align:start;" id="open-ziti-secure-open-source-networ"><a class="link" href="https://www.helpnetsecurity.com/2024/09/09/openziti-secure-open-source-networking/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">OpenZiti: Secure Open-Source Networking Platform Released</a></h3><p class="paragraph" style="text-align:start;">OpenZiti has launched a secure open-source networking platform designed to enhance security for distributed systems. The platform focuses on providing encrypted, zero-trust networking solutions for developers and enterprises looking to secure their applications without relying on traditional VPNs.</p><h3 class="heading" style="text-align:start;" id="kubernetes-security-fundamentals-pa"><a class="link" href="https://securitylabs.datadoghq.com/articles/kubernetes-security-fundamentals-part-5/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Kubernetes Security Fundamentals: Part 5 Released</a></h3><p class="paragraph" style="text-align:start;">Datadog has released the fifth part of its Kubernetes security series, offering insights into the secure management of Kubernetes environments. This edition emphasizes best practices for container orchestration and securing workloads in cloud-native infrastructure.</p><h3 class="heading" style="text-align:start;" id="elastic-releases-deb-mm-for-malware"><a class="link" href="https://www.elastic.co/security-labs/elastic-releases-debmm?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Elastic Releases DebMM for Malware Mitigation</a></h3><p class="paragraph" style="text-align:start;">Elastic has introduced DebMM, a new tool designed to help mitigate malware by analyzing and identifying potentially malicious Debian packages. This tool enhances the ability to detect and block threats in Linux-based systems, further strengthening the security landscape for open-source users.</p><h3 class="heading" style="text-align:start;" id="cisco-patches-smart-licensing-utili"><a class="link" href="https://www.theregister.com/2024/09/05/cisco_smart_licensing_utility_flaws/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Cisco Patches Smart Licensing Utility Flaws</a></h3><p class="paragraph" style="text-align:start;">Cisco has issued patches for critical vulnerabilities in its Smart Licensing Utility, which could have allowed attackers to bypass licensing checks and potentially take control of systems. Users of Cisco products are encouraged to apply the updates to avoid security breaches.</p><h3 class="heading" style="text-align:start;" id="north-korean-threat-actor-citrine-s"><a class="link" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">North Korean Threat Actor Citrine Sleet Exploiting Chromium Zero-Day</a></h3><p class="paragraph" style="text-align:start;">A North Korean-linked threat actor, dubbed Citrine Sleet, has been exploiting a zero-day vulnerability in Chromium-based browsers. The zero-day allows for remote code execution, giving attackers control over affected systems. Chromium users are urged to update their browsers.</p><h3 class="heading" style="text-align:start;" id="exploiting-exchange-power-shell-pos"><a class="link" href="https://www.zerodayinitiative.com/blog/2024/9/4/exploiting-exchange-powershell-after-proxynotshell-part-1-multivaluedproperty?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Exploiting Exchange PowerShell Post-ProxyNotShell</a></h3><p class="paragraph" style="text-align:start;">Researchers have demonstrated how to exploit Exchange PowerShell vulnerabilities post-ProxyNotShell. This technique involves abusing multi-valued properties to gain unauthorized access. Exchange administrators are advised to review and strengthen their configurations.</p><h3 class="heading" style="text-align:start;" id="lowes-employees-phished-via-google-"><a class="link" href="https://www.malwarebytes.com/blog/news/2024/09/lowes-employees-phished-via-google-ads?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-109" target="_blank" rel="noopener noreferrer nofollow">Lowe’s Employees Phished via Google Ads</a></h3><p class="paragraph" style="text-align:start;">Lowe’s employees were targeted in a phishing campaign using malicious Google Ads to trick them into providing login credentials. This attack highlights the growing trend of using legitimate platforms to distribute phishing links. Employees are urged to verify URLs before clicking.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=cda7b52f-d491-417b-9b2b-e8f26b04f60e&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Security News Headlines #108</title>
  <description></description>
  <link>https://secnewsheadlines.com/p/security-news-headlines-108</link>
  <guid isPermaLink="true">https://secnewsheadlines.com/p/security-news-headlines-108</guid>
  <pubDate>Mon, 09 Sep 2024 12:30:00 +0000</pubDate>
  <atom:published>2024-09-09T12:30:00Z</atom:published>
    <dc:creator>Ian Bishop</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Helvetica',Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Trebuchet MS','Lucida Grande',Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><b>Security News Headlines for today</b> highlight critical updates on vulnerabilities, data breaches, and government initiatives. Recent cyber incidents target industries ranging from healthcare to cloud services, emphasizing the growing complexity of the threat landscape. Organizations must stay informed to prevent costly breaches and downtime. Here are the top stories you need to know:</p><h3 class="heading" style="text-align:start;" id="us-government-drops-four-year-degre"><a class="link" href="https://www.securityweek.com/us-gov-removing-four-year-degree-requirements-for-cyber-jobs/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">US Government Drops Four-Year Degree Requirement for Cyber Jobs</a></h3><p class="paragraph" style="text-align:start;">The U.S. government has announced plans to remove the four-year degree requirement for many cybersecurity roles. This move aims to fill crucial talent gaps in the cybersecurity workforce by focusing on practical skills and experience rather than formal education.</p><h3 class="heading" style="text-align:start;" id="critical-file-deletion-vulnerabilit"><a class="link" href="https://www.wordfence.com/blog/2024/09/critical-arbitrary-file-deletion-vulnerability-in-mp3-audio-player-wordpress-plugin-affects-over-20000-sites/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Critical File Deletion Vulnerability in MP3 Audio Player Plugin</a></h3><p class="paragraph" style="text-align:start;">A critical vulnerability in the MP3 Audio Player WordPress plugin allows attackers to delete arbitrary files, potentially compromising over 20,000 websites. WordPress administrators using this plugin are urged to update to the latest version to protect their sites.</p><h3 class="heading" style="text-align:start;" id="lite-speed-cache-plugin-vulnerabili"><a class="link" href="https://securityaffairs.com/168145/security/litespeed-cache-plugin-wordpress-flaw.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">LiteSpeed Cache Plugin Vulnerability Affects WordPress Sites</a></h3><p class="paragraph" style="text-align:start;">A vulnerability in the LiteSpeed Cache plugin for WordPress could allow attackers to exploit server resources, impacting website performance and security. Users of this popular plugin should update immediately to mitigate risks.</p><h3 class="heading" style="text-align:start;" id="cisco-merch-adobe-magento-attack-in"><a class="link" href="https://www.theregister.com/2024/09/06/cisco_merch_adobe_magento_attack/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Cisco Merch, Adobe Magento Attack in the Wild</a></h3><p class="paragraph" style="text-align:start;">Attackers have been exploiting vulnerabilities in Cisco merchandise systems and Adobe Magento e-commerce platforms, enabling them to steal data and manipulate transactions. Patches have been issued, and affected businesses are urged to secure their systems.</p><h3 class="heading" style="text-align:start;" id="guide-to-hacking-misconfigured-aws-"><a class="link" href="https://blog.intigriti.com/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Guide to Hacking Misconfigured AWS S3 Buckets</a></h3><p class="paragraph" style="text-align:start;">This guide provides insights into hacking misconfigured AWS S3 buckets, exposing the risks of poorly secured cloud storage. It outlines how attackers access sensitive data and emphasizes the importance of correct configuration to prevent leaks.</p><h3 class="heading" style="text-align:start;" id="wisconsin-medicare-data-leak-expose"><a class="link" href="https://therecord.media/wisconsin-million-medicare-information-leaked?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Wisconsin Medicare Data Leak Exposes Millions</a></h3><p class="paragraph" style="text-align:start;">A data leak in Wisconsin exposed sensitive Medicare information of over a million individuals. The breach includes personal and health-related data, highlighting the ongoing vulnerabilities in healthcare information systems.</p><h3 class="heading" style="text-align:start;" id="cisa-adds-dray-tek-wps-office-bugs-"><a class="link" href="https://securityaffairs.com/168153/security/cisa-draytek-vigorconnect-kingsoft-wps-office-bugs-known-exploited-vulnerabilities-catalog.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">CISA Adds DrayTek, WPS Office Bugs to Known Exploited Vulnerabilities</a></h3><p class="paragraph" style="text-align:start;">CISA has added vulnerabilities in DrayTek VigorConnect and Kingsoft WPS Office to its Known Exploited Vulnerabilities Catalog. These flaws are being actively targeted, and organizations using these products should prioritize patching to avoid exploitation.</p><h3 class="heading" style="text-align:start;" id="us-water-systems-face-increased-cyb"><a class="link" href="https://www.theregister.com/2024/09/07/us_water_cyberattacks/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">US Water Systems Face Increased Cyberattacks</a></h3><p class="paragraph" style="text-align:start;">Critical water infrastructure in the U.S. has seen an uptick in cyberattacks, with some incidents resulting in operational disruptions. These attacks highlight the vulnerabilities in essential services, and experts urge for stronger cybersecurity measures in the sector.</p><h3 class="heading" style="text-align:start;" id="oktas-guide-on-security-storytellin"><a class="link" href="https://sec.okta.com/articles/security-education-storytelling?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Okta&#39;s Guide on Security Storytelling for Education</a></h3><p class="paragraph" style="text-align:start;">Okta provides an insightful guide on how storytelling can enhance security education and awareness programs. By making security topics more engaging, organizations can better train employees and reduce human error in cybersecurity practices.</p><h3 class="heading" style="text-align:start;" id="git-hub-actions-vulnerable-to-attac"><a class="link" href="https://thehackernews.com/2024/09/github-actions-vulnerable-to.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">GitHub Actions Vulnerable to Attack</a></h3><p class="paragraph" style="text-align:start;">Security flaws in GitHub Actions workflows have been found to allow attackers to inject malicious code into software development pipelines. Developers are urged to review and secure their CI/CD workflows to avoid supply chain attacks.</p><h3 class="heading" style="text-align:start;" id="cisa-flags-ics-bugs-in-baxter-and-m"><a class="link" href="https://www.darkreading.com/ics-ot-security/cisa-flags-ics-bugs-in-baxter-mitsubishi-products?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">CISA Flags ICS Bugs in Baxter and Mitsubishi Products</a></h3><p class="paragraph" style="text-align:start;">CISA has flagged multiple vulnerabilities in industrial control systems (ICS) from Baxter and Mitsubishi. These bugs could allow attackers to disrupt operations in critical infrastructure environments. Organizations using these products should apply available patches.</p><h3 class="heading" style="text-align:start;" id="280-android-apps-steal-cryptocurren"><a class="link" href="https://arstechnica.com/security/2024/09/found-280-android-apps-that-use-ocr-to-steal-cryptocurrency-credentials/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">280 Android Apps Steal Cryptocurrency Credentials via OCR</a></h3><p class="paragraph" style="text-align:start;">Researchers have identified 280 malicious Android apps using OCR technology to steal cryptocurrency credentials. These apps target users by reading recovery phrases and private keys from screenshots. Users should be cautious about what they store on their devices.</p><h3 class="heading" style="text-align:start;" id="apache-of-biz-fixes-remote-code-exe"><a class="link" href="https://duo.com/decipher/apache-fixes-ofbiz-remote-code-execution-flaw?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Apache OFBiz Fixes Remote Code Execution Flaw</a></h3><p class="paragraph" style="text-align:start;">Apache has issued a patch for a remote code execution vulnerability in its OFBiz platform. If exploited, the flaw could allow attackers to execute arbitrary code, compromising business operations. Users of the platform should update their software immediately.</p><h3 class="heading" style="text-align:start;" id="restoring-debugging-information-in-"><a class="link" href="https://blog.trailofbits.com/2024/09/06/unstripping-binaries-restoring-debugging-information-in-gdb-with-pwndbg/?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Restoring Debugging Information in Binaries with Pwndbg</a></h3><p class="paragraph" style="text-align:start;">Trail of Bits has published a guide on using Pwndbg to restore debugging information in stripped binaries, which helps reverse engineers analyze and debug compiled software. This tool is invaluable for security researchers and developers dealing with obfuscated code.</p><h3 class="heading" style="text-align:start;" id="phishing-attack-uses-two-step-appro"><a class="link" href="https://blog.knowbe4.com/phishing-attack-takes-a-two-step-approach-to-leverage-legitimate-sites-and-evade-detection?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Phishing Attack Uses Two-Step Approach to Evade Detection</a></h3><p class="paragraph" style="text-align:start;">A new phishing attack strategy uses a two-step method to evade detection by leveraging legitimate sites. Attackers first direct victims to trusted sites before redirecting them to malicious pages, complicating detection by security tools.</p><h3 class="heading" style="text-align:start;" id="avis-car-rental-giant-discloses-dat"><a class="link" href="https://securityaffairs.com/168119/data-breach/car-rental-giant-avis-discloses-data-breach.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">Avis Car Rental Giant Discloses Data Breach</a></h3><p class="paragraph" style="text-align:start;">Avis has disclosed a data breach that exposed sensitive customer information. The breach potentially impacts millions of customers, with details such as payment information and personal data being compromised. Avis is working to mitigate the damage and secure its systems.</p><h3 class="heading" style="text-align:start;" id="north-korean-threat-actors-deploy-n"><a class="link" href="https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">North Korean Threat Actors Deploy New Malware</a></h3><p class="paragraph" style="text-align:start;">North Korean hackers are deploying new malware strains in their latest espionage campaigns. The malware is designed to infiltrate high-value targets and extract sensitive information. Organizations in critical sectors are advised to enhance their defenses against state-sponsored threats.</p><h3 class="heading" style="text-align:start;" id="sonic-wall-bug-exploited-in-ongoing"><a class="link" href="https://securityaffairs.com/168112/hacking/sonicwall-sonicos-bug-exploited.html?utm_source=secnewsheadlines.com&utm_medium=newsletter&utm_campaign=security-news-headlines-108" target="_blank" rel="noopener noreferrer nofollow">SonicWall Bug Exploited in Ongoing Attacks</a></h3><p class="paragraph" style="text-align:start;">A recently discovered SonicWall SonicOS vulnerability is being actively exploited in the wild. The bug allows attackers to bypass authentication and gain access to network devices. SonicWall users are strongly advised to apply the latest security patches.</p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=da910204-b59a-4ee5-895f-3d779bf93e70&utm_medium=post_rss&utm_source=security_news_headlines">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
