Aggregator
NoviSpy Spyware Installed on Journalist's Phone After Unlocking It With Cellebrite Tool
Security ProbLLMs in xAI's Grok: A Deep Dive
Hackers Abuse Google Ads To Attacking Graphic Design Professionals
Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as the actor has launched at least 10 malvertising campaigns hosted on two specific IP addresses: 185.11.61[.]243 and 185.147.124[.]110, where these malicious ads, when clicked, redirect users to websites that initiate malicious downloads. Two IP addresses, 185.11.61.243 and 185.147.124.110, have been […]
The post Hackers Abuse Google Ads To Attacking Graphic Design Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ИИ на страже жизни: 80 000 человек доверились MeMind против суицида
Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US, have been attributed to the Iranian-backed CyberAv3ngers. The attacks, leveraging a custom-built malware named IOCONTROL, exploit vulnerabilities in IoT and OT devices, such as routers, PLCs, HMIs, and firewalls. The malware, designed to operate on various platforms, […]
The post Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2014-0112 | Oracle WebCenter Sites 11.1.1.6.1/11.1.1.8.0 Community access control (EDB-33142 / Nessus ID 73763)
Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads
Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source framework for developing Java web applications. The vulnerability, assigned the identifier CVE-2024-53677, has a critical CVSS score of 9.5, indicating its potential for severe impact if left unaddressed. Background on the Vulnerability Apache Struts2 announced the vulnerability last week, highlighting […]
The post Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2008-1606 | Elastic Path 4.1.1 dir path traversal (EDB-31446 / XFDB-41356)
Visualising Tree Cutting, Air Pollution and Mudflows in Kyrgyzstan: Bellingcat’s First Hackathon Where Everyone Was A Winner
Amnesty Accuses Serbia of Tracking Journalists and Activists with Spyware
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
Short-Lived Certificates Coming to Let’s Encrypt
Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
Akira
Akira
CVE-2019-8982 | WaveMaker Studio 6.6 StudioService.java inUrl server-side request forgery (EDB-45158)
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-20767 Adobe ColdFusion Improper Access Control Vulnerability
- CVE-2024-35250 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Requests Public Comment for Draft National Cyber Incident Response Plan Update
Today, CISA—through the Joint Cyber Defense Collaborative and in coordination with the Office of the National Cyber Director (ONCD)—released the National Cyber Incident Response Plan Update Public Comment Draft. The draft requests public comment on the National Cyber Incident Response Plan (NCIRP)—public comment period begins today and concludes on January 15, 2025.
As of January 3, 2025: The public comment period has been extended and now concludes on February 14, 2025.
Since initial publication in 2016, CISA conducted broad and extensive engagement and information exchanges with public and private sector partners, interagency partners, federal Sector Risk Management Agencies (SRMAs), and regulators to build upon the successes of the inaugural NCIRP. The draft NCIRP update describes a national approach to coordinating significant cyber incident detection and response.
The draft update considers the evolution in the cyber threat landscape and lessons learned from historical incidents. The text also addresses the vital role that the private sector, state and local governments (including tribal and territorial), and federal agencies hold in responding to cyber incidents.
CISA is seeking more perspectives to help strengthen the NCIRP and invites stakeholders from across the public and private sectors to share their knowledge and experiences, further informing our findings and contributing to this revision. Public comments may be posted via the Federal Register.