Wiz CEO explains why he turned down a $23 billion deal

Assaf Rappaport, the co-founder and CEO of cloud security startup Wiz, said that turning down a $23 billion offer from Google was “the toughest decision ever,” but justified it by saying the company can get even bigger and reach $100 billion because cloud security is the future.  “I think we did the right choice,” Rappaport […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Russian Court Jails Four REvil Ransomware Gang Members

Four members of the notorious REvil ransomware group have been sentenced to prison terms in Russia. This development…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset codenamed CloudScout.
“The CloudScout toolset is capable of retrieving data from various cloud services by leveraging stolen web session cookies,” ESET security researcher Anh Ho said. “Through

The Hacker News – ​Read More

EU president denounces Russian influence campaigns targeting Western Balkans

Speaking at a press conference in Kosovo this weekend Ursula von der Leyen emphasized that the EU is working daily to debunk misinformation and expose Russian propaganda “for the benefit of the whole region.”

The Record from Recorded Future News – ​Read More

Google: Russia Targeting Ukrainian Military Recruits With Android, Windows Malware

Google has uncovered a Russian cyberespionage and influence campaign targeting Ukrainian military recruits.

The post Google: Russia Targeting Ukrainian Military Recruits With Android, Windows Malware appeared first on SecurityWeek.

SecurityWeek – ​Read More

Google Invests in Alternative Neutral Atom Quantum Technology

Google invested in QuEra Computing, which is developing a very different and potentially rival quantum computer technology.

The post Google Invests in Alternative Neutral Atom Quantum Technology appeared first on SecurityWeek.

SecurityWeek – ​Read More

New Vulnerabilities Identified in Philips Smart Lighting and Matrix Door Controller

Overview

The Indian Computer Emergency Response Team (CERT-In) has issued two critical vulnerability advisories related to Philips Smart Lighting products and the Matrix Door Controller. Both vulnerabilities are classified as high severity, signaling significant risks for users that cannot be ignored. If left unaddressed, these vulnerabilities could lead to serious repercussions, including unauthorized access to sensitive information and potential data breaches.

The implications of these vulnerabilities extend beyond mere inconvenience; they threaten the security and integrity of users’ home networks and connected devices. Affected users must take immediate action to protect their systems and ensure they are not exposed to potential exploitation.

By staying informed and implementing the recommended security measures stated in these vulnerability advisories, users can help mitigate these risks and protect their personal information from malicious actors.

Breakdown of Vulnerability Advisories

The first vulnerability advisory, labeled CIVN-2024-0329, addresses a vulnerability that impacts various Philips smart lighting devices. Specifically, the affected products include the Philips Smart Wi-Fi LED Batten 24-Watt, the Philips Smart Wi-Fi LED T Beamer 20-Watt, and the Philips Smart Bulb models (9, 10, and 12-Watt), as well as the Philips Smart T-Bulb models (10 and 12-Watt).  

All of these devices are at risk if they are operating on firmware versions prior to 1.33.1. The vulnerability arises from the storage of sensitive information, specifically Wi-Fi credentials, in cleartext within the firmware of these devices. This flaw allows an attacker with physical access to the device to extract the firmware and analyze the binary data, ultimately revealing the plaintext Wi-Fi credentials.  

Once obtained, these credentials could enable unauthorized access to the Wi-Fi network, jeopardizing the security of other connected devices and private information. Shravan Singh, Amey Chavekar, Vishal Giri, and Dr. Faruk Kazi, a team of researchers from the CoE-CNDS Lab at VJTI Mumbai, India, reported this vulnerability. 

To mitigate this vulnerability, CERT-In strongly advises users to upgrade their Philips Smart Wi-Fi LED Batten, LED T Beamer, Smart Bulb, and Smart T-Bulb to firmware version 1.33.1 or later. This update will secure the devices against potential exploitation.

The second advisory, CIVN-2024-0328, addresses an authentication bypass vulnerability in the Matrix Door Controller Cosec Vega FAXQ. This vulnerability affects all firmware versions prior to V2R17.

The flaw in the Matrix Door Controller is attributed to improper implementation of session management within its web-based management interface. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the device, potentially gaining unauthorized access and complete control over it.

If exploited, this vulnerability could compromise the confidentiality, integrity, and availability of the system. While there is currently no evidence of public proof-of-concept exploitation, the potential risks remain significant, warranting immediate attention from users.

Recommendations and Mitigation Strategies

To protect against these two vulnerabilities, users are urged to follow these mitigations and mitigation strategies, as reported by the vulnerability advisories.


Ensure that better authentication mechanisms are in place for the web-based management interface.

Limit access to the Matrix Door Controller devices through effective network segmentation.

Regularly monitor and log all access attempts to these devices to detect any unauthorized activity.

Apply any security updates or patches provided by the vendor as soon as they are available.

Consider deploying a web application firewall (WAF) to protect against malicious HTTP requests.

Conclusion

The vulnerability advisories issued by CERT-In related to the technical flaws in Philips Smart Lighting products and the Matrix Door Controller highlight the sophistication of cyber threats and the importance of maintaining updated firmware. As smart devices become increasingly integrated into everyday life, ensuring their security is important.

Users of the affected Philips lighting devices are strongly encouraged to upgrade to firmware version 1.33.1, while Matrix Door Controller users should promptly move to firmware version V2R17. Adopting these updates and implementing the recommended security measures will help mitigate the risks associated with these vulnerabilities and enhance overall cybersecurity resilience.

The post New Vulnerabilities Identified in Philips Smart Lighting and Matrix Door Controller appeared first on Cyble.

Blog – Cyble – ​Read More

U.S. Agencies Investigate China-Linked Telecom Hacks Targeting High-Profile Politicians

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have launched an investigation into a series of cyber intrusions linked to hackers believed to be affiliated with the Chinese state-linked threat actors

This investigation follows reports that the phone communications of prominent U.S. political figures, including former President Donald Trump, Vice President Kamala Harris’ campaign team, and vice-presidential candidate JD Vance, have been targeted in a sweeping cyber-espionage effort.

Allegations of Unauthorized Access by Chinese State Linked Threat Actors

The FBI and CISA issued a statement confirming their investigation into “unauthorized access to commercial telecommunications infrastructure” perpetrated by actors associated with the People’s Republic of China, reported CBS News. This response was prompted by specific malicious activities detected within the telecommunications sector, which the agencies say are part of a larger Chinese hacking campaign aimed at gathering sensitive information from high-level U.S. officials.

The agencies emphasized their quick action, stating that upon identifying the threat, they immediately notified affected telecommunications companies, provided technical assistance, and shared crucial information to help potential victims mitigate their exposure.

High-Profile Targets

Reports indicate that the hacking campaign targeted the phone communications of several key political figures, including Donald Trump and JD Vance, as part of a broader strategy to compromise the communications of U.S. officials.

According to sources cited by CNN, the Chinese hackers also sought to infiltrate the communications of senior officials within the Biden administration. The gravity of these allegations raises concerns over the potential for foreign espionage and the safety of sensitive government communications.

Reacting to these findings, Steven Cheung, a spokesperson for Trump’s campaign, criticized the Harris campaign for allegedly “emboldening” China, reflecting the heightened political tensions surrounding the issue. However, it remains unclear whether the hackers succeeded in accessing any specific information from the targeted communications, reported Asian News International.

The Broader Context

The New York Times was among the first to report on this breach, revealing that the hacking effort is part of a wider Chinese campaign that has successfully infiltrated several U.S. telecommunications companies over the past few months. 

Investigators believe that these hackers aim to access sensitive national security information, including information on wiretap warrant requests made by the U.S. Justice Department. Notably, there is currently no evidence suggesting that the hackers targeted communications linked to law enforcement activities involving Trump and Vance.

Major U.S. broadband and internet providers, such as AT&T, Verizon, and Lumen, have also been identified as targets in this ongoing campaign.

The Response from U.S. Authorities

In light of these events, U.S. agencies are taking a coordinated approach to combat the threat posed by foreign hackers. CISA reiterated its commitment to working closely with industry partners to strengthen cybersecurity in U.S. elections. They encouraged any organization that suspects it may be a victim of similar attacks to reach out to local FBI field offices or CISA for assistance.

The information about this breach coincides with other cybersecurity threats facing the U.S. political domain. Iranian hackers have also targeted Trump’s campaign, leading to the theft and subsequent publication of sensitive campaign emails. 

These hackers, linked to Iran’s Basij paramilitary force, shared the stolen material with a Democratic operative who subsequently published it through various channels. The ongoing conflict between foreign actors and U.S. political campaigns highlights the precarious nature of cybersecurity in U.S. elections.

In a related investigation, the hacking group known as Mint Sandstorm, or APT42, reportedly compromised multiple Trump campaign staff accounts earlier this year. The U.S. Department of Justice has indicted three Iranian hackers involved in this breach, underscoring the persistent threat posed by foreign actors in U.S. elections cybersecurity.

International Response

As the investigation into the Chinese-linked hacks unfolds, the Chinese government has denied involvement in these alleged cyber activities. The geopolitical implications of such hacking campaigns are profound as China, Iran, and Russia continue to explore avenues to influence or monitor aspects of U.S. elections.

While U.S. intelligence agencies indicate that China has not made a significant effort to influence the presidential election directly, it has targeted various congressional and local election races through covert social media campaigns.

The investigation into the telecom hacks targeting high-profile U.S. politicians represents a critical moment in the ongoing struggle against cyber espionage. As authorities work to unravel the details of this sophisticated breach, the implications for national security remain an open question.

The post U.S. Agencies Investigate China-Linked Telecom Hacks Targeting High-Profile Politicians appeared first on Cyble.

Blog – Cyble – ​Read More

Police operation claims takedown of prolific Redline and Meta password stealers

Authorities have gained ‘full access’ to the servers used by the two notorious infostealers

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Filigran Secures $35M Investment to Disrupt Threat Intel

French startup scores investments from Insight Partners, Accel and Moonfire, bringing the total raised to $56 million.

The post Filigran Secures $35M Investment to Disrupt Threat Intel appeared first on SecurityWeek.

SecurityWeek – ​Read More