Security News
![Exploit released for Juniper firewall bugs allowing RCE attacks](/static/build/img/news/exploit-released-for-juniper-firewall-bugs-allowing-rce-attacks-small.jpg)
Proof-of-concept exploit code has been publicly released for vulnerabilities in Juniper SRX firewalls that, when chained, can allow unauthenticated attackers to gain remote code execution in Juniper's JunOS on unpatched devices.Juniper disclosed four medium-severity bugs in its EX switches and SRX firewalls and released security patches two weeks ago.
![Kroll SIM-swap attack: FTX, BlockFi and Genesis clients’ info exposed](/static/build/img/news/kroll-sim-swap-attack-ftx-blockfi-and-genesis-clients-info-exposed-small.jpg)
Financial and risk advisory firm Kroll has suffered a SIM-swapping attack that allowed a threat actor to access files containing personal information of clients of bankrupt cryptocurrency platforms FTX, BlockFi and Genesis. On Saturday, August 19, 2023, an attacker targeted a Kroll employee's T-Mobile US account "In a highly sophisticated SIM swapping attack".
![Rhysida claims ransomware attack on Prospect Medical, threatens to sell data](/static/build/img/news/rhysida-claims-ransomware-attack-on-prospect-medical-threatens-to-sell-data-small.jpg)
The Rhysida ransomware gang has claimed responsibility for the massive cyberattack on Prospect Medical Holdings, claiming to have stolen 500,000 social security numbers, corporate documents, and patient records. While PMH did not respond to queries about the security incident, BleepingComputer later learned that the Rhysida ransomware gang was behind the attack.
![Tor turns to proof-of-work puzzles to defend onion network from DDoS attacks](/static/build/img/news/tor-turns-to-proof-of-work-puzzles-to-defend-onion-network-from-ddos-attacks-small.jpg)
No miners were involved in this story Tor, which stands for The Onion Router, weathered a massive distributed denial-of-service (DDoS) storm from June last year through to May.…
![Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack](/static/build/img/news/kroll-suffers-data-breach-employee-falls-victim-to-sim-swapping-attack-small.jpg)
Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a "Highly sophisticated" SIM swapping attack."Specifically, T-Mobile, without any authority from or contact with Kroll or its employee, transferred that employee's phone number to the threat actor's phone at their request," it said in an advisory.
![Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses](/static/build/img/news/cisco-talos-research-new-lazarus-group-attack-malware-campaign-hits-uk-us-businesses-small.jpg)
The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in the U.K. and the U.S. Two reports from cybersecurity company Cisco Talos provide intelligence about a new attack campaign from the North Korean threat actor Lazarus. The researchers observed the Lazarus group successfully compromise an internet backbone infrastructure provider in the U.K. in early 2023, deploying a new malware dubbed QuiteRAT. The initial compromise was done via exploitation of the CVE-2022-47966 vulnerability, which affects Zoho's ManageEngine ServiceDesk.
![Exploit released for Ivanti Sentry bug abused as zero-day in attacks](/static/build/img/news/exploit-released-for-ivanti-sentry-bug-abused-as-zero-day-in-attacks-small.jpg)
Proof-of-concept exploit code is now available for a critical Ivanti Sentry authentication bypass vulnerability that enables attackers to execute code remotely as root on vulnerable systems. Successful exploitation can let them run system commands or write files onto systems running Ivanti Sentry versions 9.18 and prior.
![Cloud hosting firms hit by devastating ransomware attack](/static/build/img/news/cloud-hosting-firms-hit-by-devastating-ransomware-attack-small.jpg)
Danish cloud hosting firms CloudNordic and Azero - both owned by Certiqa Holding - have suffered a ransomware attack that resulted in most customer data being stolen and systems and servers rendered inaccessible. The companies believe the attack happened while they were transfering servers from one data center to another.
![WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders](/static/build/img/news/winrar-security-flaw-exploited-in-zero-day-attacks-to-target-traders-small.jpg)
A recently patched security flaw in the popular WinRAR archiving software has been exploited as a zero-day since April 2023, new findings from Group-IB reveal. The vulnerability, cataloged as CVE-2023-38831, allows threat actors to spoof file extensions, thereby making it possible to launch malicious scripts contained within an archive that masquerades as seemingly innocuous image or text files.
![Webinar: The external attack surface & AI’s role in proactive security](/static/build/img/news/webinar-the-external-attack-surface-ais-role-in-proactive-security-small.jpg)
The enterprise perimeter is now a massively decentralized IT landscape characterized by large-scale adoption of cloud platforms, digital services, and an increasingly tangled digital supply chain. Regulators are on the march as new threat actors emerge, exploiting increasingly sophisticated attack vectors to compromise organizations faster.