The Information Highway

The Information Highway

all things technology risk and cybersecurity

BlackCat ransomware hits Azure Storage with Sphynx encryptor

BlackCat_Sphynx

The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets' Azure cloud storage. 

Continue reading
  1117 Hits

CISA warns of critical Apache RocketMQ bug exploited in attacks

CISA

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities (KEV) a critical–severity issue tracked as CVE-2023-33246 that affects Apache's RocketMQ distributed messaging and streaming platform. 

Continue reading
  898 Hits

Apple zero-click iMessage exploit used to infect iPhones with spyware

apple-triangle

Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click exploit chain (dubbed BLASTPASS) to deploy NSO Group's Pegasus commercial spyware onto fully patched iPhones. 

Continue reading
  925 Hits

Microsoft Teams phishing attack pushes DarkGate malware

Microsoft_Teams

A new phishing campaign is abusing Microsoft Teams messages to send malicious attachments that install the DarkGate Loader malware. 

Continue reading
  1359 Hits

Cisco warns of VPN zero-day exploited by ransomware gangs

Cisco_headpic

Cisco is warning of a CVE-2023-20269 zero-day vulnerability in its Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) that is actively exploited by ransomware operations to gain initial access to corporate networks. 

Continue reading
  1077 Hits

Apple discloses 2 new zero-days exploited to attack iPhones, Macs

Apple

Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year. 

Continue reading
  896 Hits

Windows cryptomining attacks target graphic designer's high-powered GPUs

graphics-card

Cybercriminals are leveraging a legitimate Windows tool called 'Advanced Installer' to infect the computers of graphic designers with cryptocurrency miners. 

Continue reading
  857 Hits

Johnson & Johnson discloses IBM data breach impacting patients

server-rack

Johnson & Johnson Health Care Systems ("Janssen") has informed its CarePath customers that their sensitive information has been compromised in a third-party data breach involving IBM. 

Continue reading
  927 Hits

Obsessed with privacy? Keep Tails on a USB drive and secure most any computer

screenshot-2023-08-29-18532_20230909-192716_1

If you're looking for protection against surveillance and censorship, this Tor-based operating system is worth a try. Here's how you get started. 

Continue reading
  884 Hits

Chrome extensions can steal plaintext passwords from websites

Google___Chrome

A team of researchers from the University of Wisconsin-Madison has uploaded to the Chrome Web Store a proof-of-concept extension that can steal plaintext passwords from a website's source code 

Continue reading
  883 Hits

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

PQC_Algo_Pre-standardization-vid

Three new algorithms are expected to be ready for use in 2024. Others will follow.

Continue reading
  930 Hits

Major U.S. energy org targeted in QR code phishing attack

phishing-hook

A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious emails into inboxes and bypass security.

Continue reading
  1066 Hits

LinkedIn accounts hacked in widespread hijacking campaign

hacker-holding-linkedin

LinkedIn is being targeted in a wave of account hacks resulting in many accounts being locked out for security reasons or ultimately hijacked by attackers. 

Continue reading
  1134 Hits

Knight ransomware distributed in fake Tripadvisor complaint emails

knight-check-piece

The Knight ransomware is being distributed in an ongoing spam campaign that pretends to be TripAdvisor complaints. 

Continue reading
  1072 Hits

Ford says cars with WiFi vulnerability still safe to drive

ford

Ford is warning of a buffer overflow vulnerability in its SYNC3 infotainment system used in many Ford and Lincoln vehicles, which could allow remote code execution, but says that vehicle driving safety isn't impacted. 

Continue reading
  1022 Hits

Industrial PLCs worldwide impacted by CODESYS V3 RCE flaws

codesys

Millions of PLC (programmable logic controllers) used in industrial environments worldwide are at risk to 15 vulnerabilities in the CODESYS V3 software development kit, allowing remote code execution (RCE) and denial of service (DoS) attacks. 

Continue reading
  965 Hits

CISA: New Whirlpool backdoor used in Barracuda ESG hacks

Barracuda-Whirlpool

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has discovered that the backdoor malware named 'Whirlpool' used in attacks on compromised Barracuda Email Security Gateway (ESG) devices. 

Continue reading
  905 Hits

Dell Compellent hardcoded key exposes VMware vCenter admin creds

cyber-ke_20230814-034646_1

An unfixed hardcoded encryption key flaw in Dell's Compellent Integration Tools for VMware (CITV) allows attackers to decrypt stored vCenter admin credentials and retrieve the cleartext password. 

Continue reading
  1098 Hits

New BitForge cryptocurrency wallet flaws lets hackers steal crypto

bitcoin-blockchain

 Multiple zero-day vulnerabilities named 'BitForge' in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell 17 affected popular cryptocurrency wallet providers, including Coinbase, ZenGo, Binance, and many more.

Continue reading
  1294 Hits

AI Swipes Data By Listening to Keyboard Keystrokes with 95% Accuracy

GFz7Cb2gFsTPdcus5KvAaJ-1200-80.jpg

A team of researchers from Cornell, specifically Joshua Harrison, Ehsan Toreini and Maryam Mehrnezhad, have published a paper detailing their work in training AI to interpret keyboard input from audio alone. By recording keystrokes to train the model, they were able to predict what was typed on the keyboard with up to 95% accuracy. This accuracy only dropped to 93% when using Zoom to train the system. 

Continue reading
  990 Hits

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023