News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cyber ​​danger Raspberry Robin
B2B Cyber ​​Security ShortNews

A leading provider of an AI-powered, cloud-delivered cybersecurity platform warns about Raspberry Robin. The malware was first discovered in 2021 and stands out for its remarkable adaptability and sophistication in its operations. Rapid Exploit Development: Raspberry Robin takes advantage of new 1-day Local Privilege Escalation (LPE) exploits developed in full view of the public. This suggests either internal development capability or access to a very sophisticated exploit market. Innovative distribution and evasion techniques: A novel distribution method via Discord and sophisticated evasion strategies improve stealth, which...

Read more

Outlook: Calendar entry can steal password
Outlook: Calendar entry can steal password -AI

There is a new vulnerability in Outlook and three ways to access NTLM v2 hashed passwords. Access can be done through the calendar function and double headers via calendar entry. Experts have discovered the vulnerability and are warning about it. Varonis Threat Labs discovered the new Outlook vulnerability (CVE-2023-35636) and three new ways to exploit it. This allows you to access the NTLM v2 hash passwords from Outlook, Windows Performance Analyzer (WPA) and Windows File Explorer. With access to these passwords, attackers can attempt an offline brute force attack or an authentication relay attack to compromise an account and gain access. Unpatched…

Read more

Hackers find ways into Google accounts
B2B Cyber ​​Security ShortNews

According to researchers at Cloudsek.com, hackers are abusing an undocumented Google OAuth endpoint called “MultiLogin.” The experts are currently observing that other groups of cyber attackers are copying the technology and using it in their infostealers. Is a bigger wave coming now? Several information-stealing malware families exploit an undocumented Google OAuth endpoint called “MultiLogin” to recover expired authentication cookies and log in to user accounts. Even for accounts where the account password has been reset. Infostealer groups want to exploit the vulnerability The experts at Cloudsek.com report: The Lumma Infostealer, which contains the discovered exploit, was implemented on November 14th...

Read more

Detect zero-day exploits through machine learning
Detect zero-day exploits through machine learning

Code injection is an attack technique that attackers often use, for example in zero-day exploits, to launch arbitrary code on victims' machines via vulnerable applications. Why signatures are not enough for intrusion prevention systems - how machine learning can help. Given the popularity of code injection for exploits, Palo Alto Networks has found that pattern-matching signatures are often used to identify network traffic anomalies. However, injections can come in numerous forms, and a simple injection can easily bypass a signature-based solution by adding foreign strings...

Read more

IoT security cameras: a found fodder for hackers
IoT security cameras: a found fodder for hackers

IoT security cameras are connected to both the company network and the Internet, and transmit large amounts of data to recording systems in the company or in the cloud. Implementation should be rigorously planned and ongoing monitoring implemented. Since these points are often neglected, IoT security cameras are often a target for hackers. Internet-connected security cameras can be found everywhere these days - in public institutions, businesses and even in homes. The market is estimated to be around $2021 billion in 50 and is growing rapidly. Every day, hundreds of thousands of IoT security cameras are deployed worldwide...

Read more

Exchange Server: New 0-day vulnerability - missing patches  
B2B Cyber ​​Security ShortNews

GTSC security researchers have discovered two new RCE vulnerabilities in MS Exchange Server. There are already suitable exploits for this in the wild. Microsoft was notified of the vulnerabilities and commented “Currently Microsoft is aware of limited targeted attacks”. Around early August 2022, while conducting security monitoring and incident response services, the GTSC SOC team discovered that a critical infrastructure was under attack, specifically their Microsoft Exchange application. During the investigation, GTSC Blue Team experts determined that the attack exploited an unpublished Exchange vulnerability (a 0-day vulnerability) and therefore immediately developed a temporary containment plan. At the same time, the experts began…

Read more

Follina zero-day vulnerability in MS Office
SophosNews

A new zero-day remote code execution bug in Microsoft Office is causing a stir. More specifically, it is likely a code execution vulnerability that can be exploited through Office files. Based on what is known so far, there may be other ways to trigger or abuse this vulnerability. Security researcher Kevin Beaumont has named the vulnerability "Follina," which is proving to be a useful search term on the topic until an official CVE number is assigned. In addition, Microsoft has now published an official workaround. Sophos expert Paul Ducklin gives…

Read more

RedLine Stealer exploits Internet Explorer vulnerability
Bitdefender_News

Global campaign - Germany hardest hit after India: Password thief RedLine Stealer steals confidential login information from Internet Explorer users. The outdated browser is vulnerable to a dangerous vulnerability. Bitdefender Labs is currently observing an intensive campaign to deploy malicious code using the RIG exploit kit. Among other things, the attackers distribute the password thief RedLine Stealer to exfiltrate sensitive credentials such as passwords, credit card information, crypto wallets, and VPN login details. After India, Germany is the country most affected by the global campaign, which has increased significantly in intensity since the beginning of April. RIG exploit kit for Internet Explorer Cyber ​​criminals distribute exploit kit…

Read more

DazzleSpy attacks visitors from pro-democracy news site 
B2B Cyber ​​Security ShortNews

ESET researchers analyze special macOS spy software: DazzleSpy attacks visitors of pro-democracy news site in Hong Kong by executing itself as an exploit and implanting itself in the site visitor. Hong Kong radio station D100's website was compromised. A Safari exploit runs that installs spyware on the Macs of news portal visitors. The "watering hole" operations carried out by the attackers indicate that the targets are likely politically active, pro-democracy figures in Hong Kong. The ESET researchers have named the spy program DazzleSpy and examined it in more detail. The malware is capable of a variety of…

Read more

MysterySnail: new zero-day exploit for Windows OS
Kaspersky_news

Kaspersky has discovered a new zero-day exploit for Windows OS: MysterySnail. It uses vulnerabilities for espionage campaigns against IT companies, military and defense organizations, and diplomatic institutions. Kaspersky experts have discovered a new zero-day exploit. “MysterySnail” was identified during analysis of a series of privilege elevation attacks on Microsoft Windows servers; previously, the automated detection technologies had caught the attacks. Increased zero-day attacks In the first half of the year, Kaspersky experts observed an increase in zero-day attacks. This exploits unknown software errors that attackers have already discovered, but of which the provider is not yet aware. Accordingly, there is no…

Read more