
Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)
The weekly cybersecurity newsletter provides crucial intelligence briefings for the security community. It covers a broad spectrum of topics, including new malware strains, sophisticated phishing techniques, software vulnerabilities, and emerging defense strategies. Additionally, it informs readers about new regulations and industry trends, helping them stay ahead of potential risks and threats. This invaluable information enables readers to maintain a proactive stance, keeping them informed and vigilant in the rapidly evolving cyberspace.
Authorities have arrested multiple individuals involved in DDoS (Distributed Denial of Service) attacks targeting various online services. The coordinated effort by law enforcement agencies highlights the importance of collaboration to combat cybercrime. These arrests are expected to deter future attacks and enhance the security of online infrastructures
Researchers have discovered a new malware strain, the swap file skimmer, which monitors the browser’s swap file to steal payment card data even after users clear their cache or close the browser.
Hackers are exploiting Cloudflare WARP to launch attacks on internet-facing systems. This free VPN service enhances user traffic anonymity, which attackers leverage to hide their real IP addresses while targeting vulnerable systems. Proper firewall configuration and service updates are recommended to mitigate this threat.
1.4 Pentagon IT Service Provider Hacked
Hacktivist group USDoD claims to have leaked CrowdStrike’s threat actor database, containing over 250 million data points. CrowdStrike urges caution, stating that these records are widely distributed among users. The breach could impact ongoing investigations and aid criminals in evading detection.
Researchers from Check Point Technologies have discovered the Stargazers Ghost Network on GitHub, used by the Stargazer Goblin threat actor to spread malware. This network comprises over 3,000 “ghost” accounts hosting malicious repositories, highlighting the need for stronger security measures on legitimate platforms.
The Play ransomware variant has been targeting ESXi servers, encrypting virtual machine files and demanding ransoms for decryption keys. This underscores the critical need for robust security measures and regular backups in virtualized environments.
The Braodo Stealer malware has emerged, designed to steal login credentials from users. It spreads through malicious emails and compromised websites, emphasizing the importance of cautious online behavior and strong security practices.
3. Vulnerability Alerts
3.1 69% of API Services Susceptible to DoS Attacks
3.2 Telegram Zero-Day Vulnerability
3.3 Critical Flaws in AC Charging Controller
The Pwn2Own car hack competition revealed critical flaws in an AC charging controller for electric vehicles, allowing remote code execution. Manufacturers are urged to address automotive cybersecurity to prevent such hacks in the future.
Cisco has identified a critical flaw in its Small Business VPN routers (CVE-2023-20025) with a CVSS score of 9.8. Users are advised to upgrade their devices to firmware versions 1.0.03.26 or later to mitigate the risk.
3.5 Okta Browser Plugin Flaw
The Okta Browser Plugin has a Cross-Site Scripting (XSS) vulnerability (CVE-2024-0981). Okta recommends users upgrade to version 6.32.0 to minimize potential risks.
3.6 Google Chrome 127 Released with Fix
A critical vulnerability in Docker Engine (CVE-2024-41110) allows authentication bypass and unauthorized access. Docker users should apply patches and update their AuthZ plugins to protect against exploitation.
Security Recommendations
Stay Updated: Regularly update all software, plugins, and systems to the latest versions to mitigate vulnerabilities.
Implement Strong Access Controls: Use robust access control mechanisms and input validation to secure APIs and other critical systems.
Monitor for Suspicious Activity: Regularly check for unusual behavior within systems to detect and respond to potential threats promptly.
Backup Data Regularly: Maintain regular backups of critical data to ensure recovery in case of ransomware attacks or other data breaches.
Educate Users: Raise awareness and educate users about recognizing phishing attacks and practicing good cybersecurity hygiene.
As the cybersecurity landscape continues to evolve, partnering with a cyber security company in Australia can help businesses stay ahead of emerging threats. Expert services can provide tailored strategies to protect against these vulnerabilities and attacks, ensuring a strong defense posture for businesses in all sectors.

