The Information Highway

The Information Highway

all things technology risk and cybersecurity

FBI: Reported cryptocurrency losses reached $5.6 billion in 2023

FBI_cryptocurrency

The FBI says that 2023 was a record year for cryptocurrency fraud, with total losses exceeding $5.6 billion, based on nearly 70,000 reports received through the Internet Crime Complaint Center (IC3).

Continue reading
  285 Hits

Fortinet confirms data breach after hacker claims to steal 440GB of files

Fortinet

Cybersecurity giant Fortinet has confirmed it suffered a data breach after a threat actor claimed to steal 440GB of files from the company's Microsoft SharePoint server.

Continue reading
  351 Hits

Fake password manager coding test used to hack Python developers

developer

Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware.

Continue reading
  362 Hits

Adobe fixes Acrobat Reader zero-day with public PoC exploit

adob_20240914-211645_1

A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit.

Continue reading
  390 Hits

Veeam Backup security flaws

Threat-Advisory-Banner3

Threat update

There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass, credential sniffing, and privilege escalation. Review the details in this Cybersecurity Threat Advisory to limit customers' impact.

Continue reading
  314 Hits

Ivanti fixes maximum severity RCE bug in Endpoint Management software

Ivanti

Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote code execution on the core server.

Continue reading
  292 Hits

Progress LoadMaster vulnerable to 10/10 severity RCE flaw

Progress_headpic

Progress Software has issued an emergency fix for a maximum (10/10) severity vulnerability impacting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products that allows attackers to remotely execute commands on the device.

Continue reading
  274 Hits

New RAMBO attack steals data using RAM in air-gapped computers

Airgapped

 A novel side-channel attack dubbed "RAMBO" (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device's RAM to send data from air-gapped computers.

Continue reading
  337 Hits

Car rental giant Avis discloses data breach impacting customers

AVIS

American car rental giant Avis notified customers that unknown attackers breached one of its business applications last month and stole some of their personal information.

Continue reading
  386 Hits

Microsoft Office 2024 to disable ActiveX controls by default

Microsoft_Office

 After Office 2024 launches in October, Microsoft will disable ActiveX controls by default in Word, Excel, PowerPoint, and Visio client apps.

Continue reading
  367 Hits

SpyAgent Android malware steals your crypto recovery phrases from images

android-eyes

A new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots stored on the mobile device.

Continue reading
  290 Hits

SonicWall SSLVPN access control flaw is now exploited in attacks

Sonicwall

SonicWall is warning that a recently fixed access control flaw tracked as CVE-2024-40766 in SonicOS is now "potentially" exploited in attacks, urging admins to apply patches as soon as possible.

Continue reading
  390 Hits

Apache fixes critical OFBiz remote code execution vulnerability

apache-header-image

Apache has fixed a critical security vulnerability in its open-source OFBiz (Open For Business) software, which could allow attackers to execute arbitrary code on vulnerable Linux and Windows servers.

Continue reading
  303 Hits

LiteSpeed Cache bug exposes 6 million WordPress sites to takeover attacks

back-2

Yet, another critical severity vulnerability has been discovered in LiteSpeed Cache, a caching plugin for speeding up user browsing in over 6 million WordPress sites.

Continue reading
  280 Hits

Veeam warns of critical RCE flaw in Backup & Replication software

Veeam

Veeam has released security updates for several of its products as part of a single September 2024 security bulletin that addresses 18 high and critical severity flaws in Veeam Backup & Replication, Service Provider Console, and One.

Continue reading
  325 Hits

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

onlyfans-header-image

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma stealer information-stealing malware.

Continue reading
  262 Hits

Business services giant CBIZ discloses customer data breach

back

CBIZ Benefits & Insurance Services (CBIZ) has disclosed a data breach that involves unauthorized access of client information stored in specific databases.

Continue reading
  251 Hits

Linux version of new Cicada ransomware targets VMware ESXi servers

cicada

A new ransomware-as-a-service (RaaS) operation is impersonating the legitimate Cicada 3301 organization and has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide.

Continue reading
  358 Hits

New Voldemort malware abuses Google Sheets to store stolen data

evil_hacke_20240902-193133_1

 A new malware campaign is spreading a previously undocumented backdoor named "Voldemort" to organizations worldwide, impersonating tax agencies from the U.S., Europe, and Asia.

Continue reading
  393 Hits

Understanding the Difference Between Cybersecurity and Cybersecurity Risk

csr

In today's digital age, the terms "cybersecurity" and "cybersecurity risk" are often used interchangeably. However, they represent different concepts that are crucial for understanding how to protect information systems effectively. Let's delve into what these terms mean and how they relate to each other. 

Continue reading
  350 Hits

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023