News
Hi friends,
Greetings from the glorious Belgian coast! It's been raining a lot, because of course it has. But since I prefer rainy weather over hot and sunny I'm not complaining :-)
This week is a minimal issue, I want to get everything out of this holiday that I can :-) I've collected the articles that seemed most interesting and used the automatically available summaries, like last week. That's quite a timesaver for me, and I hope it's still a good read.
Enjoy!
Breaches and leaks
- Hawai'i Community College pays ransomware gang to prevent data leak: link.
- Israel's largest oil refinery website offline after DDoS attack: link.
- Retail chain Hot Topic discloses wave of credential-stuffing attacks: link.
- Over 640 Citrix servers backdoored with web shells in ongoing attacks: link.
- US govt contractor Serco discloses data breach after MoveIT attacks: link.
- Matrass company Tempur Sealy responding to cyberattack that disrupted operations: link.
New Collide+Power side-channel attack impacts almost all CPUs
A new software-based power side-channel attack called 'Collide+Power' was discovered, impacting almost all CPUs and potentially allowing data to leak. However, the researchers warn that the flaw is low-risk and will likely not be used in attacks on end users.
Google: Android patch gap makes n-days as dangerous as zero-days
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in the Android platform that elevates the value and use of disclosed flaws for extended periods.
Hackers use new malware to breach air-gapped devices in Eastern Europe
Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems.
P2PInfect server botnet spreads using Redis replication feature
Threat actors are actively targeting exposed instances of the Redis open-source data store with a peer-to-peer self-replicating worm with versions for both Windows and Linux that the malware authors named P2Pinfect.
GlitchSecure: real-time and continuous security testing
If you feel like doing a quick pentest every few quarters isn't enough, you are correct. Take a look at the combination of continuous vulnerability assessments and real-time pentesting that GlitchSecure offers. Every finding is verified by highly skilled (and wonderful) humans. (Sponsored)
Amazon's AWS SSM agent can be used as post-exploitation RAT malware
Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform's System Manager (SSM) agent as an undetectable Remote Access Trojan (RAT).
Cult of the Dead Cow hacktivists give life to 'privacy-first' app framework
The well-known collective is taking on targeted advertising with the Veilid framework, in some ways similar to IPFS and Tor, and says it wants to make the Internet accessible to everyone who fears being monetized.
Tesla jailbreak unlocks theft of in-car paid features
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
Deputy National Security Advisor Anne Neuberger on addressing the security threats of AI
The deputy national security adviser for cyber and emerging technologies discusses how to mitigate AI's disinformation threat.
From 1Password, to No Password?
Remembering one strong password isn't all that difficult, but there is still the risk that it might be phished or keylogged. Passkeys on the other hand remove that risk entirely, and 1Password will soon allow you to use a passkey to unlock your vault. Very exciting stuff. (Sponsored)