Security News
![New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft](/static/build/img/news/new-wave-of-attack-campaign-targeting-zimbra-email-users-for-credential-theft-small.jpg)
A new "Mass-spreading" social engineering campaign is targeting users of the Zimbra Collaboration email server with an aim to collect their login credentials for use in follow-on operations. "Initially, the target receives an email with a phishing page in the attached HTML file," ESET researcher Viktor Šperka said in a report.
![Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks](/static/build/img/news/microsoft-powershell-gallery-vulnerable-to-spoofing-supply-chain-attacks-small.jpg)
Lax policies for package naming on Microsoft's PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground for massive supply chain attacks. PowerShell Gallery is a Microsoft-run online repository of packages uploaded by the wider PowerShell community, hosting a large number of scripts and cmdlet modules for various purposes.
![NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security](/static/build/img/news/nofilter-attack-sneaky-privilege-escalation-method-bypasses-windows-security-small.jpg)
A previously undetected attack method called NoFilter has been found to abuse the Windows Filtering Platform to achieve privilege escalation in the Windows operating system. "If an attacker has the ability to execute code with admin privilege and the target is to perform LSASS Shtinkering, these privileges are not enough," Ron Ben Yizhak, a security researcher at Deep Instinct, told The Hacker News.
![Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks](/static/build/img/news/russian-hackers-use-zulip-chat-app-for-covert-c-c-in-diplomatic-phishing-attacks-small.jpg)
The phishing attacks feature PDF documents with diplomatic lures, some of which are disguised as coming from Germany, to deliver a variant of a malware called Duke, which has been attributed to APT29. "The threat actor used Zulip - an open-source chat application - for command-and-control, to evade and hide its activities behind legitimate web traffic," Dutch cybersecurity company EclecticIQ said in an analysis last week.
![CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks](/static/build/img/news/cisa-adds-citrix-sharefile-flaw-to-kev-catalog-due-to-in-the-wild-attacks-small.jpg)
The U.S. Cybersecurity and Infrastructure Security Agency has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities catalog, based on evidence of active in-the-wild exploitation. "This vulnerability affects all currently supported versions of customer-managed ShareFile storage zones controller before version 5.11.24," Citrix said in an advisory released in June.
![Kubernetes clusters face widespread attacks across numerous organizations](/static/build/img/news/kubernetes-clusters-face-widespread-attacks-across-numerous-organizations-small.jpg)
In this Help Net Security video, Assaf Morag, Lead Threat Intelligence Analyst at Aqua Security, discusses research that discovered openly accessible and unprotected Kubernetes clusters belonging to more than 350 organizations, open-source projects, and individuals. At least 60% of these clusters were breached and had an active campaign with deployed malware and backdoors.
![Major U.S. energy org targeted in QR code phishing attack](/static/build/img/news/major-u-s-energy-org-targeted-in-qr-code-phishing-attack-small.jpg)
A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious emails into inboxes and bypass security. According to Cofense, who spotted this campaign, this is the first time that QR codes have been used at this scale, indicating that more phishing actors may be testing their effectiveness as an attack vector.
![Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks](/static/build/img/news/experts-uncover-weaknesses-in-powershell-gallery-enabling-supply-chain-attacks-small.jpg)
Active flaws in the PowerShell Gallery could be weaponized by threat actors to pull off supply chain attacks against the registry's users. "These flaws make typosquatting attacks inevitable in this registry, while also making it extremely difficult for users to identify the true owner of a package," Aqua security researchers Mor Weinberger, Yakir Kadkoda, and Ilay Goldman said in a report shared with The Hacker News.
![Ivanti Avalanche vulnerable to attack by unauthenticated, remote attackers (CVE-2023-32560)](/static/build/img/news/ivanti-avalanche-vulnerable-to-attack-by-unauthenticated-remote-attackers-cve-2023-32560-small.jpg)
Two stack-based buffer overflow bugs have been discovered in Ivanti Avalanche, an enterprise mobility management solution. Ivanti released Avalanche version 6.4.1 security update on August 3, 2023, which also fixes additional RCE and authentication bypass vulnerabilities.
![Back to school security against ransomware attacks on K-12 and colleges](/static/build/img/news/back-to-school-security-against-ransomware-attacks-on-k-12-and-colleges-small.jpg)
A recent Truman State University ransomware attack caused several days of shutdowns and the engagement of external security teams. In Pennsylvania, the Penncrest school district found itself the target of a ransomware attack leading to multiple days of no internet access and disruption of school routines, impacting local families.