Critical RCE Vulnerability Found in OpenPLC

The most severe issue is a stack-based buffer overflow vulnerability (CVE-2024-34026) that allows an attacker to execute remote code. Users are advised to update to the latest version of OpenPLC to protect against these security risks.

Cyware News – Latest Cyber News – ​Read More

Kia Dealer Portal Flaw Could Let Attackers Hack Millions of Cars

The vulnerabilities could be exploited to remotely control Kia vehicles equipped with remote hardware in under 30 seconds, exposing the sensitive personal information of car owners.

Cyware News – Latest Cyber News – ​Read More

BBTok Targeting Brazil Using the AppDomain Manager Injection Technique

The Brazilian-targeted threat BBTok has a complex infection chain that starts with an email containing an ISO image. The malware compiles C# code directly on the infected machine and uses the AppDomain Manager Injection technique.

Cyware News – Latest Cyber News – ​Read More

Hackers Deploy AI-Written Malware in Targeted Attacks

Hackers are now using AI-generated malware in targeted attacks. In a recent email campaign in France, researchers found malicious code crafted with the help of generative AI to distribute the AsyncRAT malware.

Cyware News – Latest Cyber News – ​Read More

Why Microsoft’s security initiative and Apple’s cloud privacy matter to enterprises now

Microsoft’s Secure Future Initiative (SFI) and Apple’s Private Cloud Compute (PCC)’s goals are to harden cloud security and privacy at scale.Read More

Security News | VentureBeat – ​Read More

UK national hacked public companies for stock trading intel, DOJ says

Robert Westbrook is accused of stealing information ahead of 14 different earnings announcements.

The Record from Recorded Future News – ​Read More

Millions of Kia Vehicles Open to Remote Hacks via License Plate

The vulnerability is the latest discovered in connected vehicles in recent years, and it points out the cyber dangers lurking in automotive APIs.

darkreading – ​Read More

How Should CISOs Navigate the SEC Cybersecurity and Disclosure Rules?

Companies that commit to risk management have a strong cybersecurity foundation that makes it easier to comply with the SEC’s rules. Here is what you need to know about 8K and 10K filings.

darkreading – ​Read More

Novel Exploit Chain Enables Windows UAC Bypass

Adversaries can exploit CVE-2024-6769 to jump from regular to admin access without triggering UAC, but Microsoft says it’s not really a vulnerability.

darkreading – ​Read More

Australian Organisations Targeted by Phishing Attacks Disguised as Atlassian

Mimecast tells TechRepublic that AI may exacerbate phishing risks in Australia.

Security | TechRepublic – ​Read More