Security Affairs newsletter Round 503 by Pierluigi Paganini – INTERNATIONAL EDITION

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

International Press – Newsletter

Cybercrime  

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

Texas Tech University Data Breach Impacts 1.4 Million People 

Hacker Leaks Cisco Data

New fake Ledger data breach emails try to steal crypto wallets  

How to Lose a Fortune with Just One Bad Click  

Effective Phishing Campaign Targeting European Companies and Institutions  

Ukrainian National Sentenced to Federal Prison in “Raccoon Infostealer” Cybercrime Case  

Romanian National Sentenced to 20 Years in Prison in Connection with NetWalker Ransomware Attacks Resulting in the Payment of Millions of Dollars in Ransoms  

United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group  

ACE Shutters One of the Largest Live Sports Piracy Rings in the World  

Malware

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion  

Spyware distributed through Amazon Appstore  

BADBOX Botnet Is Back  

Supply Chain Attack on Rspack npm Packages Injects Cryptojacking Malware  

Hacking

Researchers find security flaws in Skoda cars that may let hackers remotely track them  

Exploit attempts inspired by recent Struts2 File Upload Vulnerability (CVE-2024-53677, CVE-2023-50164)

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets  

Not All Roads Lead to PWN2OWN: Firmware Reverse Engineering (Part 2)  

Current State of SonicWall Exposure: Firmware Decryption Unlocks New Insights  

Investigating Malicious Hardware with Industrial CT  

Fortinet FortiWLM Deep-Dive, IOCs, and the Almost Story of the “Forti Forty”  

Intelligence and Information Warfare 

Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals 

“A Digital Prison”: Surveillance and the suppression of civil society in Serbia  

The SBU and the National Police detained minors in Kharkiv who were spying for the FSB under the guise of a quest game  

Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs  

Analyzing FLUX#CONSOLE: Using Tax-Themed Lures, Threat Actors Exploit Windows Management Console to Deliver Backdoor Payloads 

Trump administration wants to go on cyber offensive against China

Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks  

Cyberattack UAC-0125 using the theme “Army+” (CERT-UA#12559)  

Cybersecurity

ESET Threat Report H2 2024 

OpenAI whistleblower found dead in San Francisco

Irish Data Protection Commission fines Meta €251 Million  

Foreign hackers need to face real consequences, Mike Waltz says  

US considers ban on China’s TP-Link over security concerns, WSJ reports 

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS