Cyber News & Articles

Cyber News & Articles

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation 

Cybersecurity researchers have uncovered three security weaknesses in Microsoft’s Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment.
“Exploiting these flaws could allow attackers to gain persistent access as shadow administrators

read more
Cyber News & Articles

U.S. Army Soldier Arrested in AT&T, Verizon Extortions 

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea.

read more
Cyber News & Articles

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits 

The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients’ data against potential cyber attacks.
The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader initiative to bolster the

read more
Cyber News & Articles

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips 

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization.
In this week’s update, we’ll cover the most important developments in

read more
Cyber News & Articles

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions 

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have been found to be compromised, and customers are now working to figure out their exposure (LayerX, one of the companies involved in

read more
Cyber News & Articles

Happy 15th Anniversary, KrebsOnSecurity! 

KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. It’s also an occasion to note that despite my publishing fewer stories than ever this past year, we somehow managed to attract near record levels of readership (thank you!).

read more
Cyber News & Articles

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft 

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft.
The attack targeted publishers of browser extensions on the Chrome Web Store via a phishing campaign and used their access permissions to insert malicious code into legitimate extensions in order to steal

read more
Cyber News & Articles

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials 

A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck.
The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug affecting router models F3x24 and F3x36.
The severity of the shortcoming is lower due to the fact that it only works

read more
Cyber News & Articles

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign 

North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie.
Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into

read more
Cyber News & Articles

Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia 

The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting “several dozen users” in 2024.
“Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code,” Kaspersky researcher Oleg

read more

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X