Intellawatch

BSNL Data Breach: State Telecom Giant Exposed on Hacker Forum breach

from

Penetration Testing Online

On May 20, the Indian Computer Emergency Response Team ( CERT-In) reported a possible intrusion and data leak at BSNL. The user “kiberphant0m” claimed that the hacked data included IMSI (International Mobile Subscriber Identity), SIM card numbers, HLR (a registry of all active mobile network users, including number portability history and call routing data), and other details. HT contacted two subscribers using numbers presented in the sample data, both of which belonged to BSNL.....

FBCS Data Breach: Number of Affected Individuals Surges to 4.2 Million breach

from

The Cyber Express

Samiksha Jain is a seasoned journalist with 9 years of experience, passionately unraveling the intricate world of cybersecurity for The Cyber Express. When she's not writing, you can find Samiksha exploring new destinations or enjoying playful moments with her 2-year-old. Balancing the demands of journalism and motherhood, she embodies a dynamic blend of curiosity and care.....

Google Fixes Chrome Browser Password Manager Issue After 17-Hour Outage cyber

from

The Cyber Express

“Our engineering team identified the cause and worked diligently to deploy a fix for all users.” In the meantime, users experiencing ongoing issues are encouraged to contact Google Workspace Support. As of July 25, 2024, at 16:27 (UTC), Google confirmed that the issue had been mitigated for all affected users.....

Generative AI: CISO’s Worst Nightmare or a Dream Come True? cyber

from

The Cyber Express

By simulating potential attack vectors and generating scenarios that traditional methods might overlook, it helps organizations fortify their defenses against emerging threats. This proactive approach is a dream come true for CISOs striving to stay ahead of cyber adversaries. The same technology that helps defend can also be used to create sophisticated, hard-to-detect phishing schemes, deepfakes, and other forms of cyber deception.....

Crypto Exchange Gemini Suffers Data Breach Through Third-Party Vendor breach

from

The Cyber Express

The bank engaged outside forensic experts to conduct a thorough investigation, which is still ongoing. Gemini recommends that customers remain vigilant by regularly reviewing account statements and credit reports. Any fraudulent activity or suspected identity theft should also be reported to law enforcement authorities, including your state attorney general and the Federal Trade Commission (FTC),” inform Gemini.....

Role of the CISO in Private Equity Portfolio Companies cyber

from

The Cyber Express

Their responsibilities span strategic, operational, and compliance aspects of information security, which are critical in today’s complex digital landscape. This involves understanding the company’s objectives and designing security frameworks that support these goals without hindering operational efficiency. They must keep abreast of relevant laws and regulations, ensuring that the company’s security practices comply with legal requirements.....

5 TED Talks by Ethical Hackers that Will Change How You See Cybersecurity cyber

from

The Cyber Express

These talks provide compelling arguments for viewing ethical hacking positively, showcasing how it has played a crucial role in societal advancement and organizational self-awareness. Hackers can cause harm, as seen in billions of dollars lost to fraud and identity theft, but they also expose vulnerabilities, prompting necessary fixes. By fostering a network of civic hackers, Bracy explains how this organization aims to create tools that address deep-rooted problems, support local governance, a....

CVE-2024-40897: Vulnerability in Orc Compiler Opens Door to Code Execution Attacks cyber

from

Penetration Testing Online

This vulnerability is of particular concern for developers and CI environments using the Orc compiler (orcc). Threat actors can exploit the flaw by crafting malicious Orc source files that, when compiled, trigger a buffer overflow, leading to potential code execution. Security: Fix error message printing buffer overflow leading to possible code execution in orcc with specific input files (CVE-2024-40897).....

China-Backed Phishing Attack Targets India Postal System Users cyber

from

Dark Reading:

The threat actors are targeting iPhone users with text messages falsely claiming that a package is awaiting collection at an India Post warehouse. Another recent smishing attack aimed at US citizens informed them they had unpaid road tolls, with the aim of coercing targets into giving up their bank information. "They are now leveraging trusted communication channels like iMessage to deceive victims, underscoring the need for comprehensive mobile Web threat protection that can detect and block m....

PKfail Vulnerability: A New Threat to UEFI Security Unveiled by Binarly Research Team cyber

from

Penetration Testing Online

Among the manufacturers affected are industry giants such as Acer, Aopen, Dell, Formelife, Fujitsu, Gigabyte, HP, Intel, Lenovo, and Supermicro. Binarly’s platform identified 22 unique untrustworthy keys among nearly 900 affected devices, as detailed in the vulnerability description BRLY-2024-005, which carries a CVSS score of 8.2. To assist users in identifying and addressing this vulnerability, Binarly has launched a dedicated website, pk.fail.....

From Cheating to Thievery: EvolvedAim’s Creator Exposed as Malware Distributor cyber

from

Penetration Testing Online

Escape From Tarkov is a hardcore military simulator that attracts the attention of both honest players and cheaters. Piecing the facts together, they concluded that Mythical had embedded malicious software in his product to steal data. Upon launching, EvolvedAim requested a license key, but user information immediately began transmitted to the perpetrators.....

MonoSwap Hacked: Urgent Withdrawal Alert cyber

from

Penetration Testing Online

The platform’s administration urges users not to add liquidity or participate in farming pools until further notice. Moreover, users with open positions on the platform should immediately withdraw their funds to avoid potential losses. The scammers installed a botnet on his office computer, which had access to all wallets and contracts associated with MonoSwap.....

Financial Fallout: CrowdStrike Downtime Leaves $5.4 Billion Hole in Fortune 500 cyber

from

Penetration Testing Online

This resilience can be attributed to the sector’s reliance on traditional on-premises systems, which proved more resilient than cloud-based infrastructure. Parametrix’s report, based on extensive data analysis and real-time monitoring, provides valuable insights into the financial consequences of technology disruptions. As businesses increasingly rely on cloud-based systems, the need for comprehensive risk mitigation strategies has never been more critical.....

Secure Boot no more? Leaked key, faulty practices put 900 PC/server models in jeopardy cyber

from

CSO Online

However, almost 900 models produced over the past 12 years are using keys that were likely generated for testing purposes and should have never been used in production, according to a report from security firm Binarly, which dubbed this issue PKfail. To find out how common the practice still is, Binarly’s researchers scanned their database of tens of thousands of firmware binaries collected over the years and identified 22 different AMI test PKs with warnings “DO NOT TRUST” or “DO NOT SHIP.” Th....

A bug in Chrome Password Manager caused user credentials to disappear cyber

from

Security Affairs

....

Secure Boot ‘PKfail’ Vulnerability Exposes Widespread Supply Chain Weakness cyber

from

The Cyber Express

The Binarly REsearch Team analysis of firmware images from major device vendors revealed alarming statistics. To mitigate these risks, device vendors must implement stronger cryptographic practices, including secure key generation and management. The researchers have provided a free website API to check if devices are affected by PKfail.....

Data Breach at Rhode Island Wyatt Detention Facility Estimated to Affect 20,000 breach

from

The Cyber Express

Peter Wasylyk, Hellested’s attorney, stated that the long delay in notification prevented victims from taking timely action to protect themselves. A letter sent to victims in July revealed that the actual number of affected individuals was significantly higher than initial estimates. They expressed regret for any inconvenience caused and stated that eligible individuals are entitled to receive free credit monitoring at the facility’s expense.....

2024 Gartner® CNAPP Market Guide: Runtime insights is a core pillar of cloud-native application protection platforms cyber

from

Sysdig

Customers have discovered that traditional tools focusing exclusively on static risks (such as misconfigurations, policy/control failures, and network exposure) are not enough to address today’s dynamic cloud threats. This provides a lens into what’s actually happening in deployments, allowing security and development teams to focus on current, exploitable risks. As organizations increasingly navigate cloud security complexities, runtime insights provide a decisive advantage by offering compreh....

Targeted PyPi Package Steals Google Cloud Credentials from macOS Devs cyber

from

Dark Reading:

It turns out that the malware is highly targeted, only looking to infect a predetermined list of 64 specific machines. For instance, "the malicious npm packages that we have seen associated with North Korean activity appear to be highly targeted," he says. For its part, Checkmarx stressed that critical thinking is an invaluable asset when it comes to defending against this kind of attack.....

CrowdStrike Outage Losses Estimated at a Staggering $5.4B breach

from

Dark Reading:

Parametrix researchers have found that roughly 25% of Fortune 500 companies experienced disruptions due to the incident, the most heavily impacted industries financially being healthcare ($1.94 billion in estimated losses), and banking ($1.15 billion). To prevent future losses, the new report encourages cyber insurers and risk-assessors to concentrate on mapping, managing, and assessing cloud-based service provider exposure; and stressed that it's important to take a broad view, and not rely so....

TA: 46711 TP: 2336 CP: 0