top of page

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)


Welcome to this week's edition of CyberForte’s Weekly Cybersecurity Newsletter, your trusted source for the latest developments and insights in the cybersecurity world. As cyber threats continue to escalate at an unprecedented pace, staying informed is more important than ever. This newsletter is designed to keep you updated on significant incidents, emerging trends, and expert analyses, equipping you with the knowledge to navigate the complex digital security landscape.


1 Cyber Attacks


1.1 Iranian Hackers Using Fake Job Offers:

Iranian state-sponsored hackers are employing fake job offers to target individuals in specific industries, as part of a broader cyber-espionage campaign aimed at gathering sensitive information.


1.2 Threat Actors on Linux Systems:

Cybercriminals are increasingly focusing on Linux systems, using advanced techniques to establish persistence and evade detection, including leveraging legitimate system tools and creating backdoors.


1.3 State-Sponsored Exploits on iOS and Chrome:

Repeated exploits targeting iOS and Chrome platforms by state-sponsored hackers have been part of a coordinated effort to compromise devices and extract valuable data.


1.4 Fake Palo Alto GlobalProtect Malware:

A new malware campaign involves attackers distributing fake versions of Palo Alto's GlobalProtect VPN software, designed to steal sensitive information from unsuspecting users.


1.5 RansomHub Exploiting RDP for Exfiltration:

The RansomHub group is exploiting Remote Desktop Protocol (RDP) vulnerabilities to exfiltrate data, bypassing traditional security measures to access critical systems.


2 Current Threats


2.1 Lumma Stealer Delivered via GitHub:

Lumma Stealer, a new malware threat distributed through GitHub repositories, poses a significant risk by stealing sensitive information from infected systems.


2.2 Rocinante Malware Enables Remote Takeover:

Rocinante malware has been used by cybercriminals to gain remote access to victim systems, allowing attackers to execute commands and control infected devices.


2.3 Exploitation of Digital Marketing Tools by Cybercriminals:

Cybercriminals are exploiting vulnerabilities in digital marketing tools to launch phishing attacks and distribute malware, repurposing legitimate tools for malicious intent.


3 Vulnerability Updates


3.1 Jenkins Remote Code Execution Vulnerability:

A critical remote code execution vulnerability has been discovered in Jenkins, underscoring the importance of keeping installations up-to-date with the necessary patches.


3.2 Cisco NX-OS Software Vulnerability:

A significant vulnerability in Cisco's NX-OS software could allow unauthorized users to execute arbitrary code, affecting multiple Cisco products and requiring immediate attention.


3.3 Corona Mirai RCE Zero-Day Exploit:

A zero-day exploit related to the Corona Mirai botnet could lead to remote code execution on vulnerable devices, highlighting the ongoing threat posed by botnets.


3.4 Dell BIOS Flaw in Alienware:

Dell has disclosed a BIOS vulnerability affecting its Alienware line, potentially allowing attackers to bypass security mechanisms. Users are advised to update their BIOS immediately.


3.5 BlackByte VMware ESXi Authentication Bypass Flaw:

A critical authentication bypass flaw in VMware ESXi systems, exploited by the BlackByte ransomware group, necessitates immediate patching to prevent unauthorized access and potential breaches.


3.6 Chrome Zero-Day Vulnerability (CVE-2024-7965):

Google Chrome users should update their browsers immediately due to a zero-day vulnerability actively exploited in the wild, posing a significant threat to user security.


4 Data Breach News


4.1 AI Vulnerabilities Exposed:

Multiple vulnerabilities have been identified in AI systems, posing significant risks to data integrity and security, with potential for cybercriminal exploitation.


4.2 Seattle Airport Cyberattack:

Seattle Airport recently suffered a cyberattack disrupting several operations, emphasizing the increasing threats faced by critical infrastructure and the need for robust cybersecurity measures.


Other News


Wireshark 4.4.0 Released:

The latest version of Wireshark, the popular network protocol analyzer, has been released, featuring several updates and bug fixes to improve performance and security.

Stay tuned for more updates and insights in our next edition of CyberForte’s Weekly Cybersecurity Newsletter.

Comments


bottom of page