from
Penetration Testing OnlineOn May 20, the Indian Computer Emergency Response Team ( CERT-In) reported a possible intrusion and data leak at BSNL. The user “kiberphant0m” claimed that the hacked data included IMSI (International Mobile Subscriber Identity), SIM card numbers, HLR (a registry of all active mobile network users, including number portability history and call routing data), and other details. HT contacted two subscribers using numbers presented in the sample data, both of which belonged to BSNL.....
from
The Cyber ExpressSamiksha Jain is a seasoned journalist with 9 years of experience, passionately unraveling the intricate world of cybersecurity for The Cyber Express. When she's not writing, you can find Samiksha exploring new destinations or enjoying playful moments with her 2-year-old. Balancing the demands of journalism and motherhood, she embodies a dynamic blend of curiosity and care.....
from
The Cyber Express“Our engineering team identified the cause and worked diligently to deploy a fix for all users.” In the meantime, users experiencing ongoing issues are encouraged to contact Google Workspace Support. As of July 25, 2024, at 16:27 (UTC), Google confirmed that the issue had been mitigated for all affected users.....
from
The Cyber ExpressBy simulating potential attack vectors and generating scenarios that traditional methods might overlook, it helps organizations fortify their defenses against emerging threats. This proactive approach is a dream come true for CISOs striving to stay ahead of cyber adversaries. The same technology that helps defend can also be used to create sophisticated, hard-to-detect phishing schemes, deepfakes, and other forms of cyber deception.....
from
The Cyber ExpressThe bank engaged outside forensic experts to conduct a thorough investigation, which is still ongoing. Gemini recommends that customers remain vigilant by regularly reviewing account statements and credit reports. Any fraudulent activity or suspected identity theft should also be reported to law enforcement authorities, including your state attorney general and the Federal Trade Commission (FTC),” inform Gemini.....
from
The Cyber ExpressTheir responsibilities span strategic, operational, and compliance aspects of information security, which are critical in today’s complex digital landscape. This involves understanding the company’s objectives and designing security frameworks that support these goals without hindering operational efficiency. They must keep abreast of relevant laws and regulations, ensuring that the company’s security practices comply with legal requirements.....
from
The Cyber ExpressThese talks provide compelling arguments for viewing ethical hacking positively, showcasing how it has played a crucial role in societal advancement and organizational self-awareness. Hackers can cause harm, as seen in billions of dollars lost to fraud and identity theft, but they also expose vulnerabilities, prompting necessary fixes. By fostering a network of civic hackers, Bracy explains how this organization aims to create tools that address deep-rooted problems, support local governance, a....
from
Penetration Testing OnlineThis vulnerability is of particular concern for developers and CI environments using the Orc compiler (orcc). Threat actors can exploit the flaw by crafting malicious Orc source files that, when compiled, trigger a buffer overflow, leading to potential code execution. Security: Fix error message printing buffer overflow leading to possible code execution in orcc with specific input files (CVE-2024-40897).....
from
Dark Reading:The threat actors are targeting iPhone users with text messages falsely claiming that a package is awaiting collection at an India Post warehouse. Another recent smishing attack aimed at US citizens informed them they had unpaid road tolls, with the aim of coercing targets into giving up their bank information. "They are now leveraging trusted communication channels like iMessage to deceive victims, underscoring the need for comprehensive mobile Web threat protection that can detect and block m....
from
Penetration Testing OnlineAmong the manufacturers affected are industry giants such as Acer, Aopen, Dell, Formelife, Fujitsu, Gigabyte, HP, Intel, Lenovo, and Supermicro. Binarly’s platform identified 22 unique untrustworthy keys among nearly 900 affected devices, as detailed in the vulnerability description BRLY-2024-005, which carries a CVSS score of 8.2. To assist users in identifying and addressing this vulnerability, Binarly has launched a dedicated website, pk.fail.....
from
Penetration Testing OnlineEscape From Tarkov is a hardcore military simulator that attracts the attention of both honest players and cheaters. Piecing the facts together, they concluded that Mythical had embedded malicious software in his product to steal data. Upon launching, EvolvedAim requested a license key, but user information immediately began transmitted to the perpetrators.....
from
Penetration Testing OnlineThe platform’s administration urges users not to add liquidity or participate in farming pools until further notice. Moreover, users with open positions on the platform should immediately withdraw their funds to avoid potential losses. The scammers installed a botnet on his office computer, which had access to all wallets and contracts associated with MonoSwap.....
from
Penetration Testing OnlineThis resilience can be attributed to the sector’s reliance on traditional on-premises systems, which proved more resilient than cloud-based infrastructure. Parametrix’s report, based on extensive data analysis and real-time monitoring, provides valuable insights into the financial consequences of technology disruptions. As businesses increasingly rely on cloud-based systems, the need for comprehensive risk mitigation strategies has never been more critical.....
from
CSO OnlineHowever, almost 900 models produced over the past 12 years are using keys that were likely generated for testing purposes and should have never been used in production, according to a report from security firm Binarly, which dubbed this issue PKfail. To find out how common the practice still is, Binarly’s researchers scanned their database of tens of thousands of firmware binaries collected over the years and identified 22 different AMI test PKs with warnings “DO NOT TRUST” or “DO NOT SHIP.” Th....
from
Security Affairs....
from
The Cyber ExpressThe Binarly REsearch Team analysis of firmware images from major device vendors revealed alarming statistics. To mitigate these risks, device vendors must implement stronger cryptographic practices, including secure key generation and management. The researchers have provided a free website API to check if devices are affected by PKfail.....
from
The Cyber ExpressPeter Wasylyk, Hellested’s attorney, stated that the long delay in notification prevented victims from taking timely action to protect themselves. A letter sent to victims in July revealed that the actual number of affected individuals was significantly higher than initial estimates. They expressed regret for any inconvenience caused and stated that eligible individuals are entitled to receive free credit monitoring at the facility’s expense.....
from
SysdigCustomers have discovered that traditional tools focusing exclusively on static risks (such as misconfigurations, policy/control failures, and network exposure) are not enough to address today’s dynamic cloud threats. This provides a lens into what’s actually happening in deployments, allowing security and development teams to focus on current, exploitable risks. As organizations increasingly navigate cloud security complexities, runtime insights provide a decisive advantage by offering compreh....
from
Dark Reading:It turns out that the malware is highly targeted, only looking to infect a predetermined list of 64 specific machines. For instance, "the malicious npm packages that we have seen associated with North Korean activity appear to be highly targeted," he says. For its part, Checkmarx stressed that critical thinking is an invaluable asset when it comes to defending against this kind of attack.....
from
Dark Reading:Parametrix researchers have found that roughly 25% of Fortune 500 companies experienced disruptions due to the incident, the most heavily impacted industries financially being healthcare ($1.94 billion in estimated losses), and banking ($1.15 billion). To prevent future losses, the new report encourages cyber insurers and risk-assessors to concentrate on mapping, managing, and assessing cloud-based service provider exposure; and stressed that it's important to take a broad view, and not rely so....