Vulnerabilities in Lamassu Bitcoin ATMs

The attack, IOActive explains, was possible due to a vulnerability in the ATM’s software update mechanism that could allow an attacker to supply their own malicious file and trigger legitimate processes for code execution.

Cyware News – Latest Cyber News – ​Read More

The SEC Won’t Let CISOs Be: Understanding New SaaS Cybersecurity Rules

The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now subject to cyber incident disclosure and cybersecurity readiness requirements for data stored in SaaS systems, along with the 3rd and 4th party apps connected to them. 
The new cybersecurity mandates make no distinction between data exposed in a breach that was stored on-premise, in the

The Hacker News – ​Read More

45,000 Exposed Jenkins Instances Found Amid Reports of In-the-Wild Exploitation

Shadowserver Foundation has seen 45,000 Jenkins instances affected by CVE-2024-23897, which may already be exploited in attacks.

The post 45,000 Exposed Jenkins Instances Found Amid Reports of In-the-Wild Exploitation appeared first on SecurityWeek.

SecurityWeek – ​Read More

Online Ransomware Decryptor Helps Recover Partially Encrypted Files

White Phoenix attempts to recover data through automated restoration methods and may help restore valuable files for ransomware victims, providing a potential option for those affected by certain ransomware strains.

Cyware News – Latest Cyber News – ​Read More

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that’s used to drop the open-source Sliver adversary simulation tool.
The security vulnerabilities, tracked as CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), could be abused

The Hacker News – ​Read More

Critical Workspace Creation Flaw in GitLab Allows File Overwrite

The latest update also addressed four medium-severity flaws, including issues related to regular expression denial-of-service, HTML injection, and disclosure of user’s public email address via the tags RSS feed.

Cyware News – Latest Cyber News – ​Read More

Israeli Government Says Smallest of SMBs Hit Hardest in Cyberattacks

Businesses with five to 20 employees were the most impacted, especially those in the industrial sector. The field of commerce reported the fewest cyberattacks, with only 3% of businesses being affected.

Cyware News – Latest Cyber News – ​Read More

OpenAI Says Mysterious Chat Histories Resulted From Account Takeover

ChatGPT users’ private conversations were leaked due to unauthorized logins from a different location, highlighting the need for better security measures such as 2FA and IP tracking.

Cyware News – Latest Cyber News – ​Read More

Best Methods for Storing, Protecting Digital Company Files: Secure Strategies for Data Safety

By Waqas

With businesses continuing to generate a vast amount of data, from financial records to client information, understanding the…

This is a post from HackRead.com Read the original post: Best Methods for Storing, Protecting Digital Company Files: Secure Strategies for Data Safety

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Microsoft Teams External Access Abuses to Spread DarkGate Malware

By Waqas

Threat actors are exploiting Microsoft Teams’ External Access feature to spread DarkGate malware through chats.

This is a post from HackRead.com Read the original post: Microsoft Teams External Access Abuses to Spread DarkGate Malware

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More