News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

MOVEit and APT CLOP: Further company data leaked
B2B Cyber ​​Security ShortNews

The MOVEit vulnerabilities may have been patched by now, but the APT group CLOP is just getting started with its blackmail. A total of 52 names of companies that CLOP claims to have attacked via the MOVEit vulnerability have been published - for some even the first data packages or the entire data booty. Somehow the CLOP group doesn't quite believe its Robin Hood demeanor: the APT group only claims to take money from big companies. The captured data from public and government agencies had already been deleted because the group was not interested in politics. However, some experts are of the opinion that…

Read more

Microsoft Office: Researchers discover vulnerability
B2B Cyber ​​Security ShortNews

Important Word documents that are protected by a signature can still be modified due to a vulnerability. Microsoft has only patched 5 of 4 vulnerabilities that allow modification. So the problem still exists, according to researchers at the Ruhr University in Bochum and the Mainz University of Applied Sciences. If you want to securely send an important Word document digitally, you can protect it with a signature – actually. Because, as researchers from the Chair for Network and Data Security at the Horst Görtz Institute for IT Security at the Ruhr University Bochum and the Mainz University of Applied Sciences have discovered, unnoticed manipulation of the document is child's play for...

Read more

HP: 50 enterprise printers with 9.8 vulnerability – patch! 
B2B Cyber ​​Security ShortNews

Hewlett Packard reports through its security bulletins a critical vulnerability with a score of 9.8 out of 10 in its Enterprise LaserJet MFP and many managed models. Overall, the problem affects more than 50 models where the firmware must be patched immediately. There is a risk of remote code execution. The security alert reported by Hewlett Packard should not be underestimated. The vulnerability evaluated with the CVSS 3.1 is classified as “Critical” with a value of 9.8 and is already listed under the CVE number CVE-2023-1329. The description of the vulnerability is clear: “Certain HP multifunction printers…

Read more

Second vulnerability found in MOVEit - new patch!
B2B Cyber ​​Security ShortNews

The vulnerability in MOVEit Transfer was discovered on May 31st and caused a stir as it was immediately exploited by the APT group CLOP and stolen a lot of data. The manufacturer immediately offered a patch, which is already out of date, as a second vulnerability was found in which now affects MOVEit Transfer and also MOVEit Cloud. For many companies, the situation is far from over. After the first vulnerability in MOVEit Transfer, the manufacturer Progress Software immediately offered a suitable patch. But the APT group CLOP seems to have had enough time...

Read more

MOVEit zero-day gap: The countdown is on
MOVEit zero-day gap: The countdown is on

Last week, Progress Software reported a critical security vulnerability (CVE-2023-34362) in its MOVEit Transfer product and related MOVEit cloud solutions. The APT group CLOP, which also issued an ultimatum until June 14.06, carried out mass attacks and data theft on the software that is often used around the world. As the name suggests, MOVEit Transfer is a system that allows for easy storage and sharing of files across a team, department, company, or even a supply chain. The software is also used by the AOK, for example. In the current…

Read more

Barracuda: Replace attacked ESG hardware
B2B Cyber ​​Security ShortNews

The otherwise secure Barracuda Email Security Gateway Appliances (ESG) have a problem: In mid-May 2023, Barracuda identified the vulnerability (CVE-2023-28681) on their appliances, which was actively attacked. However, the existing security update is not able to close backdoors created by malware. Barracuda therefore recommends immediate hardware replacement. Initially, as with many vulnerabilities found, all started: On May 18, 2023, Barracuda was made aware of anomalous traffic originating from Barracuda Email Security Gateway (ESG) appliances. The very next day, Barracuda identified the vulnerability (CVE-2023-28681) which was already being actively exploited....

Read more

Critical 9,8 vulnerability: VMware Aria Operations for Networks 
B2B Cyber ​​Security ShortNews

In a new security notification, the BSI warns of 2 critical and one highly dangerous vulnerability in VMware Aria Operations for Networks. An attacker could exploit the vulnerabilities to execute arbitrary code or disclose information. The critical vulnerabilities in VMware Aria Operations for Networks have baseline CVSSv3 scores of 9,8 and 9,1. The highly dangerous vulnerability still has a value of 8,8. The vulnerabilities are described under the CVE designations CVE-2023-20887, CVE-2023-20888, and CVE-2023-20889. BSI warns of attacks The BSI names the vulnerabilities in its security advisory WID-SEC-2023-138 and warns against exploitation. VMware already offers updates...

Read more

Attacked vulnerability in Samsung smartphones running Android 12, 13
B2B Cyber ​​Security ShortNews

One of the vulnerabilities that Samsung's May update closes is even listed by CISA - Cybersecurity and Infrastructure Security Agency - as CVE-2023-21492. According to CISA, the vulnerability is even being actively exploited. Samsung's automatic system update alleviates the problem. The CVE-2023-21492 vulnerability describes a security hole in Samsung mobile devices by inserting sensitive information in log files. The CISA not only lists the vulnerability, but also indicates that it is already being actively exploited. However, there is no further indication of the form in which this occurs. Samsung May update closes…

Read more

ALPHV ransomware targets old Veritas backup vulnerabilities
ALPHV ransomware targets old Veritas backup vulnerabilities

According to Mandiant, a ransomware partner of ALPHV is increasingly looking for old vulnerabilities in Veritas backup installations. The gaps have actually been known since 2021 – but many of them have not been patched. It should currently be possible to find over 8.500 backup instances on the web. Mandiant has observed a new ALPHV ransomware partner (a.k.a. BlackCat ransomware) tracked as UNC4466 targeting public facing Veritas Backup Exec installations for vulnerabilities CVE-2021-27876, CVE-2021-27877 and CVE -2021-27878 are vulnerable. These CVEs have been known since March 2021 and patches are also available. However, some administrators have the…

Read more

Ransomware-as-a-Service on the rise
Ransomware as a Service on the rise

The Arctic Wolf Labs Threat Report provides insight into a tumultuous year for cybersecurity: Russia's invasion of Ukraine has disrupted the operations of leading ransomware groups. Ransomware-as-a-Service is on the rise. A lack of multi-factor authentication (MFA) has propelled the number of attacks targeting business email, and the Log4Shell and ProxyShell vulnerabilities continue to be exploited en masse more than a year after they were first exposed to business email Compromise One of the most noticeable trends in the threat landscape was a significant increase in the number of successful BEC attacks in 2022 compared to 2021. The compromise of…

Read more