Greetings from the glorious Belgian coast! It's been raining a lot, because of course it has. But since I prefer rainy weather over hot and sunny I'm not complaining :-)
This week is a minimal issue, I want to get everything out of this holiday that I can :-) I've collected the articles that seemed most interesting and used the automatically available summaries, like last week. That's quite a timesaver for me, and I hope it's still a good read.
Breaches and leaks
- Hawai'i Community College pays ransomware gang to prevent data leak: link.
- Israel's largest oil refinery website offline after DDoS attack: link.
- Retail chain Hot Topic discloses wave of credential-stuffing attacks: link.
- Over 640 Citrix servers backdoored with web shells in ongoing attacks: link.
- US govt contractor Serco discloses data breach after MoveIT attacks: link.
- Matrass company Tempur Sealy responding to cyberattack that disrupted operations: link.
A new software-based power side-channel attack called 'Collide+Power' was discovered, impacting almost all CPUs and potentially allowing data to leak. However, the researchers warn that the flaw is low-risk and will likely not be used in attacks on end users.
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in the Android platform that elevates the value and use of disclosed flaws for extended periods.
Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems.
Threat actors are actively targeting exposed instances of the Redis open-source data store with a peer-to-peer self-replicating worm with versions for both Windows and Linux that the malware authors named P2Pinfect.
If you feel like doing a quick pentest every few quarters isn't enough, you are correct. Take a look at the combination of continuous vulnerability assessments and real-time pentesting that GlitchSecure offers. Every finding is verified by highly skilled (and wonderful) humans. (Sponsored)
Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform's System Manager (SSM) agent as an undetectable Remote Access Trojan (RAT).
The well-known collective is taking on targeted advertising with the Veilid framework, in some ways similar to IPFS and Tor, and says it wants to make the Internet accessible to everyone who fears being monetized.
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
The deputy national security adviser for cyber and emerging technologies discusses how to mitigate AI's disinformation threat.
Remembering one strong password isn't all that difficult, but there is still the risk that it might be phished or keylogged. Passkeys on the other hand remove that risk entirely, and 1Password will soon allow you to use a passkey to unlock your vault. Very exciting stuff. (Sponsored)