Cyberthreats In Retail
Published Nov 14 2024 11:13 AM
The holiday season is busy time for the retail industry. Cybercriminals know this and ramp up their attacks on retail businesses. The attacks range from annoying to disastrous. Knowing what may be coming helps you better protect against them.
Holiday season for cyber attackers
Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs
Published Nov 14 2024 11:11 AM
Microsoft issued patches for 90 recently discovered vulnerabilities. Four of the vulnerabilities are rated as critical. Be sure to determine which of the patches apply to your systems and which have the most impact on you. Then install those first.
Microsoft patches 90 vulnerabilities - install now
Citrix 'Recording Manager' Zero-Day Bug Allows Unauthenticated RCE
Published Nov 14 2024 11:08 AM
A Zero-Day in Citrix Recording Manager allows attackers to install and execute code on the platform with no authentication. A patch was just issued. Install it now!
Citrix under attack again
'GoIssue' Cybercrime Tool Targets GitHub Developers En Masse
Published Nov 14 2024 11:03 AM
For only $700 you can purchase a tool that steals email addresses from the public profiles on GitHub. The stolen emails help cybercriminals steal other credentials, deliver malware, circumvent access protections, and more.
Cheap tool steals GitHub addresses
Microsoft Power Pages Leak Millions of Private Records
Published Nov 14 2024 11:00 AM
Low code and no code make it easy for almost anyone to create something. Microsoft’s Power Pages use it to let people build websites quickly and easily. However, these environments do not help people understand the security implications. The result is massive cybersecurity gaps and confidential information exposures. A recent example is Microsoft’s Power Pages with millions of private pages exposed on websites built using this platform.
Massive leak from misunderstanding requirements
AIāHelp & Hindrance to IT
Published Nov 8 2024 10:33 AM
AI, Artificial Intelligence, offers many benefits in many arenas including IT and cybersecurity. But it also still suffers from problems. The problems can reduce the trust in the AI system and undermine its effectiveness.
AI-not a panacea for cybersecurity
Docusign API Abused in Widescale, Novel Invoice Attack
Published Nov 8 2024 10:31 AM
Docusign is a widely used platform for e-signing documents. Attackers are
using a valid API in Docusign to send many phishing emails with invoices for signature and payment. The use of Docusign and its familiarity to those who pay invoices makes it a very effective scam.
Docusign fake invoices
Malicious PyPI Package 'Fabrice' Found Stealing AWS Keys from Thousands of Developers
Published Nov 8 2024 10:29 AM
PyPI, the Python package index, has been compromised for over three years! Everyone who downloaded the infected package got malware that stole Amazon Web Services credentials.
PyPI compromise steals AWS credentials
Malicious NPM Packages Target Roblox Users with Data-Stealing Malware
Published Nov 8 2024 10:26 AM
Roblox is a popular platform for developing and hosting online games. Attackers have compromised the open source repository so that anyone who downloads in gets malware and infostealers. Compromises of open source hae become a popular attack method.
Games may give more than fun
Attacker Hides Malicious Activity in Emulated Linux Environment
Published Nov 8 2024 10:24 AM
QUMU, Quick Emulator, a tool used to emulate different hardware operating systems is used for testing things on the different platforms. A new attack creates a compromised version that steals information.
QEMU compromised
Tricky CAPTCHA Caught Dropping Lumma Stealer Malware
Published Nov 1 2024 11:27 AM
Fake Captcha screens are being inserted into legitimate apps to trick users into downloading infostealers. The infostealers are difficult to detect but are very good are stealing credentials and more.
Corrupted Captchas infect systems
Recurring Windows Flaw Could Expose User Credentials
Published Nov 1 2024 11:24 AM
A Zero-Day vulnerability for all Windows systems that was patched twice before, has resurfaced as attackers discover a new way to enable it. The vulnerability allows attackers to steal credentials. Patch as soon as it is available.
Windows compromise returns
Vishing, Mishing Go Next-Level With FakeCall Android Malware
Published Nov 1 2024 11:21 AM
Cybercriminals are combining attack methods to go after Android phone users. The new attack uses fake phone calls to infect the mobile devices and gain control over them. Be very careful!
Android phones under attack
Your Devices May Be Listening
Published Nov 1 2024 11:19 AM
Rumors have been around for years about our devices listening to what we say. New evidence shows this is true. Companies are listening and mining it to create targeted ads.
Are your devices listening?
Swarms of Fake WordPress Plug-ins Infect Sites With Infostealers
Published Nov 1 2024 11:16 AM
WordPress is a favorite of cyber attackers. A new attack uses WordPress plugins to install infostealers. Infostealers are devious and dangerous. Be very careful!
WordPress plugin attacks