top of page

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)


The “Weekly Cyber Security Newsletter” provides a comprehensive overview of the latest developments in the cybersecurity landscape. Each edition highlights significant data breaches, emerging vulnerabilities, and notable cyber attacks, offering insights into the evolving threats that organizations face. By staying informed through this newsletter, readers can better understand the current cybersecurity challenges and trends, enabling them to enhance their security measures and strategies.


1 Threats


1.1 Post-Exploitation Tactics on Ivanti and Fortigate VPN Servers

Threat actors are employing advanced post-exploitation tactics on Ivanti and Fortigate VPN servers. These tactics include leveraging vulnerabilities to gain unauthorized access and maintain persistence within compromised networks. The report highlights the need for organizations to patch vulnerabilities promptly to prevent such intrusions.


1.2 New Phishing Campaign Targets Users

A new phishing campaign has been identified, targeting users with sophisticated techniques to steal sensitive information. The campaign uses deceptive emails that appear legitimate, tricking users into providing personal data. Cybersecurity experts urge vigilance and recommend verifying the authenticity of emails before responding.


1.3 New SSLoad Loader Malware Attacking

A new variant of the SSLoad loader malware has been identified, which is being used in targeted attacks. This malware is part of a broader campaign aimed at compromising systems and stealing sensitive information. The SSLoad loader is known for its stealthy operations, making it a significant threat to cybersecurity.


1.4 Iranian APT42 Phishing Campaign

A new phishing campaign by the Iranian threat actor group APT42 has been uncovered. This campaign targets individuals and organizations to gather intelligence and compromise systems. The group uses sophisticated phishing techniques to lure victims into revealing sensitive information.


2 Vulnerabilities


2.1 Critical Vulnerabilities in AWS Services

Researchers from Aqua have identified critical vulnerabilities in several Amazon Web Services (AWS), including CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar. These vulnerabilities could potentially allow remote code execution, data exposure, and denial of service attacks. AWS has implemented fixes, but organizations are advised to follow best practices for additional protection.


2.2 0-Click Outlook Vulnerability

A critical vulnerability in Microsoft Outlook, identified as CVE-2024-30103, allows remote code execution as soon as an email is opened. This vulnerability exploits a flaw in the allow-listing mechanism, enabling unauthorized instantiation of custom forms.


2.3 Microsoft Patches Six Zero-Days

Microsoft has released patches for six zero-day vulnerabilities, addressing critical security threats across its products.


2.4 Zoom Vulnerabilities Escalate Privileges

Zoom has addressed vulnerabilities that could allow attackers to escalate privileges on affected systems. These vulnerabilities posed significant risks, enabling unauthorized access and potential data breaches.


2.5 Kubernetes Vulnerability: Command Injection

A command injection vulnerability has been identified in Kubernetes, allowing attackers to execute arbitrary commands. This vulnerability underscores the need for continuous monitoring and updating of Kubernetes environments to protect against potential exploits.


3 Cyber Attacks


3.1 Massive DDoS Attack on X During Trump Interview

Elon Musk reported a massive Distributed Denial-of-Service (DDoS) attack on the social media platform X (formerly Twitter) during a scheduled live interview with former President Donald Trump. The attack disrupted services, preventing many users from accessing the event.


3.2 New Phishing Campaign Targets AWS Accounts

A sophisticated phishing campaign has been identified, targeting AWS accounts to steal login credentials. The campaign highlights the importance of layered security measures, such as enforcing strong account security and using phishing-proof multi-factor authentication (MFA).


3.3 Golddigger Gigabud Malware Affecting Airlines

There is a critical error on the website, and details regarding the Golddigger Gigabud malware affecting airlines are currently unavailable.


3.4 Windows 0-Day Flaw Exploited

Information regarding the exploitation of a Windows 0-day flaw is not available in the provided search results.


3.5 FBI Dismantles Dispossessor Ransomware Operations

The FBI has successfully dismantled the operations of the Radar/Dispossessor ransomware group, which gained notoriety for targeting small- to mid-sized businesses across various sectors, including healthcare, financial services, and transportation.

Comments


bottom of page