Security News

Patch your Jira Service Management Server and Data Center and check for compromise! (CVE-2023-22501)
2023-02-03 09:57

Australian software maker Atlassian has released patches for CVE-2023-22501, a critical authentication vulnerability in Jira Service Management Server and Data Center, and is urging users to upgrade quickly. "Installing a fixed version of Jira Service Management is the recommended way to remediate this vulnerability. If you are unable to immediately upgrade Jira Service Management, you can manually upgrade the version-specific servicedesk-variable-substitution-plugin JAR file as a temporary workaround," they advised.

Supply chain attacks caused more data compromises than malware
2023-01-26 04:00

Data compromises steadily increased in the second half of 2022. Data breach notices suddenly lacked details, resulting in increased risk for individuals and businesses, as well as uncertainty about the number of data breaches and victims.

Recent rise in SEO poisoning attacks compromise brand reputations
2023-01-24 20:40

The researchers explain that attackers using search engine optimization poisoning are generally more successful "When they SEO poison the results of popular downloads associated with organizations that do not have extensive internal brand protection resources." SEO poisoning attacks consist of altering search engines results so that the first advertised links actually lead to attacker controlled sites, generally to infect visitors with malware or to attract more people on ad fraud.

FortiOS flaw was exploited to compromise governmental targets (CVE-2022-42475)
2023-01-13 10:43

A critical vulnerability in FortiOS SSL-VPN that Fortinet has issued patches for in November 2022 has been exploited by attackers to compromise governmental or government-related targets, the company has shared.They also pointed out that the malware can manipulate log files so it can avoid detection.

CircleCI – code-building service suffers total credential compromise
2023-01-09 19:52

If you're a programmer, whether you code for a hobby or professionally, you'll know that creating a new version of your project - an official "Release" version that you yourself, or your friends, or your customers, will actually install and use - is always a bit of a white-knuckle ride. The idea is simple: every time anyone makes a change in their part of the project, grab that person's new code, and whisk them and their new code through a full build-and-test cycle, just like you would before creating a final release version.

Business email compromise attacks now targeting people via SMS messages
2022-12-13 23:24

A business email compromise attack is a type of scam aimed at an organization's employees in which the attacker impersonates a top executive or other trusted person associated with the business. While BEC attacks usually occur via email, they're now using SMS text messages to hit recipients.

APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network
2022-11-09 13:47

The Russia-linked APT29 nation-state actor has been found leveraging a "Lesser-known" Windows feature called Credential Roaming as part of its attack against an unnamed European diplomatic entity. "The diplomatic-centric targeting is consistent with Russian strategic priorities as well as historic APT29 targeting," Mandiant researcher Thibault Van Geluwe de Berlaere said in a technical write-up.

Mitigating the risks of artificial intelligence compromise
2022-10-27 09:14

The number of cyberattacks directed at artificial intelligence continues to increase, and hackers are no longer planting malicious bugs within code - their techniques have become increasingly complex, allowing them to tamper with systems to compromise and "Weaponize" AI against the organizations leveraging it for their operations. There are four typical elements to consider when it comes to ML. The first is data sets: the data provided to a device or machine so it can function, review, and decide based on the information received.

Attackers use novel technique, malware to compromise hypervisors and virtual machines
2022-09-30 13:13

Unknown attackers wielding novel specialized malware have managed to compromise VMware ESXi hypervisors and guest Linux and Windows virtual machines, Mandiant threat analysts have discovered. VirtualGATE is a utility program that incorporates a memory-only dropper and a payload that can run commands from a hypervisor host on a guest virtual machine, or between guest virtual machines on the same hypervisor host.

SMBs vs. large enterprises: Not all compromises are created equal
2022-09-22 03:00

Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. Lumu has found that compromise is significantly different for small businesses than for medium-sized and large enterprises.