Hackers Weaponizing MSC Files In Targeted Attack Campaign

From gbhackers.com

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system. 

By mimicking legitimate files, MSC files can evade various security properties and access overview and control of the vulnerable system with privileges, consequently resulting in unauthorized access to its data and other malicious deeds.

Cybersecurity researchers at NTT recently identified that hackers are weaponizing the MSC files in targeted attack campaigns.

Read more…

Enterprise Browser vs Remote Browser Isolation (RBI): Key DifferenceAttribution

From latesthackingnews.com

In different industries, many companies are going digital as they explore various options to reach new audiences and convert new customers. However, many of these companies often encounter cybersecurity challenges in their quest, requiring them to invest in cybersecurity solutions. Besides customers, the increasing acceptance of remote work in different organizations means that sensitive information and resources are shared over the Internet. Thus, while accessing their options for security solutions, there are often arguments on which to choose between enterprise browsers and remote browser isolation tools. In this article, we will explore how each of these cybersecurity solutions works and the major differences between the two.

Read more…

Cylance confirms data breach linked to ‘third-party’ platform

From bleepingcomputer.com

Cybersecurity company Cylance confirmed the legitimacy of data being sold on a hacking forum, stating that it is old data stolen from a “third-party platform.”

A threat actor known as Sp1d3r is selling this stolen data for $750,000, as first spotted by Dark Web Informer.

The data allegedly includes a substantial amount of information, such as 34,000,000 customer and employee emails and personally identifiable information belonging to Cylance customers, partners, and employees.

However, researchers have told BleepingComputer that the leaked samples appear to be old marketing data used by Cylance.

BlackBerry Cylance told BleepingComputer that they’re aware of and investigating the threat actor’s claims but that no “BlackBerry data and systems related to [..] customers, products, and operations have been compromised.”

Read more…

Arm Warns Of Mali GPU Kernel Driver Flaws Exploited In The Wild

From gbhackers.com

The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux.

A new vulnerability has been discovered in the Mali GPU Kernel driver. It allows an authenticated, low-privileged user to gain access to freed memory. 

The CVE for this vulnerability has been assigned to CVE-2024-4610, and the severity has yet to be categorized.

However, Arm has patched this vulnerability, but there are reports that threat actors are exploiting it in the wild. Arm advises its users to upgrade their Mali GPU drivers to the latest versions.

Read more…

Exploit for critical Veeam auth bypass available, patch now

From bleepingcomputer.com

A proof-of-concept (PoC) exploit for a Veeam Backup Enterprise Manager authentication bypass flaw tracked as CVE-2024-29849 is now publicly available, making it urgent that admins apply the latest security updates.

Veeam Backup Enterprise Manager (VBEM) is a web-based platform for managing Veeam Backup & Replication installations via a web console. It helps control backup jobs and perform restoration operations across an organization’s backup infrastructure and large-scale deployments.

Veeam issued a security bulletin about the critical flaw on May 21, warning about a critical vulnerability enabling remote unauthenticated attackers to log in to VBEM’s web interface as any user.

The vendor urged its customers to address the problem by upgrading to VBEM version 12.1.2.172, while also sharing mitigation tips for those unable to apply the update immediately.

Read more…

NHS Appeals For Blood and Volunteers After Cyber-Attack

From infosecurity-magazine.com

The NHS is fighting on several fronts to recover from the impact of a crippling ransomware attack last week, issuing urgent appeals for blood donors and volunteers, according to reports.

Several London hospitals, including King’s College hospital and Guy’s and St Thomas’, were impacted by an attack on pathology service provider Synnovis last Monday.

It had an immediate and significant knock-on effect on blood transfusions and test results, and reportedly led to the cancellation of over 200 emergency and life-saving operations, as well as hundreds of urgently referred appointments for suspected cancer patients.

Now the health service is launching an appeal for O blood-type donations to help mitigate the impact of the attack, which has made it harder for doctors to match patients’ blood types as quickly as usual.

Read more…

Duckduckgo Launches Anonymous AI Chatbots

From gbhackers.com

DuckDuckGo has unveiled a new feature, AI Chat, which offers users an anonymous way to access popular AI chatbots.

This innovative service includes models like OpenAI’s GPT 3.5 Turbo, Anthropic’s Claude 3 Haiku, and two open-source models, Meta Llama 3 and Mistral’s Mixtral 8x7B.

Read more…