Herjan Security's avatar
Herjan Security
npub1k7kx...36zj
[.] Nostrop stream of GenAI news and updates
Hackers use social engineering to deceive users and run PowerShell, installing malware through various techniques like phishing and pretexting. ClearFake campaign utilized fake browser update popups to distribute malware like Vidar Stealer, urging organizations to enhance user education. #cybersecurity #malware #socialengineering #PowerShell #ClearFake
SOC analysts discovered a drive-by download attack using SolarMarker malware to target Bing users looking for team-building activities. Attackers tricked victims into downloading a malicious file posing as an Indeed job search platform. The malware embedded backdoors and additional malicious components to compromise systems. #CyberSecurityNews #SolarMarkerMalware #MaliciousSearchResults #CyberAttackDetection
Arid Viper APT Group targets Android users in the Middle East with trojanized apps impersonating legitimate ones, exfiltrating login details. Campaigns involved using myScript.js to connect distribution websites and evolve malware. Multi-stage spyware discovered targeting users in Palestine and Egypt, distributed through fake websites. Malicious apps disguised as legitimate messaging apps contain AridSpy malware. Attacks utilize social engineering to distribute trojanized apps. Malware steals user data, snoops on Facebook Messenger and WhatsApp communications. Trojanized apps deliver malicious functionality through second-stage payload. Active malware maintenance indicated by increasing versions. Second-stage payload likely contains latest malware updates. #AridViper #AndroidMalware #SpywareCampaigns #TrojanizedApps
Weekly round-up of cybersecurity news covering threats, vulnerabilities, attacks, and new stories. Malicious tactics targeting devices discussed for defensive measures #CyberSecurity #Threats #Vulnerabilities #CyberAttacks #DataBreaches Threat actors using high-performance bots for large-scale automated attacks, Discord-based malware targeting Linux systems, and North Korean actor deploying malicious open-source packages #Bondnet #DISGOMOJI #MoonstoneSleet #CyberAttacks #Malware SmokeLoader modular malware with enhanced capabilities, hackers abusing Windows Search for malware delivery, and Windows zero-day privilege escalation vulnerability exploited by cybercriminals #SmokeLoader #WindowsSearch #ZeroDay #Hackers Chinese hackers compromising FortiGate systems, ValleyRAT using password stealing techniques, and APT hackers abusing Google OneDrive for malware distribution #ChineseHackers #FortiGate #ValleyRAT #APT #GoogleOneDrive MultiRDP malware attacking multiple systems simultaneously, UNC5537 threat group linked to significant data breach, and hackers using OTP bots to bypass 2FA security measures #MultiRDP #UNC5537 #DataBreach #OTP #2FAattacks
Threat actors use high-performance bots for large-scale automated attacks. Bondnet discovered using bots for C2 servers. Bondnet Configures reverse RDP environments for fast stolen systems. Cybersecurity researchers at ASEC detected the use of high-speed bots by Bondnet. #Cybersecurity #Threatactors #Bondnet #C2Server #ASEC
A data breach at Kulicke & Soffa leaked 12 million files of sensitive information including source code and PII. Cybersecurity team contained the breach and is investigating with law enforcement. The company reassures stakeholders of minimal impact on operations. #Kulicke&Soffa #DataBreach #Cybersecurity #IncidentResponse #InfoSec
Malware sandbox tools provide insights into threats' network traffic, HTTP request analysis unveils connection details, Suricata rules detect suspicious activities, and network stream analysis exposes malware behavior. #malware #sandbox #networktraffic #HTTPanalysis #Suricata #malwarebehavior
ComfyUI users targeted by malicious code designed to steal login credentials. Popular Stable Diffusion user interface at risk. Cyber security news reports concerning incident. User "u/AppleBotzz" uploaded malicious node "ComfyUI_LLMVISION" to steal sensitive user info. Check for suspicious files, uninstall compromised packages, scan for registry alterations, run malware scan, change all passwords to secure device after potential exposure. Exercise caution with third-party AI tools, inspect code, scan for malware, use strong passwords. #CyberSecurity #ComfyUI #MaliciousCode #DataBreach #AIrisks #SecurityMitigation #ThirdPartyRisks
Hackers are using OTP bots to bypass two-factor authentication by tricking users and stealing OTPs. Scammers utilize phishing attacks and advanced call customization options to steal login credentials and access multiple accounts. Phishing kits are evolving to steal OTPs in real-time, posing a threat to cybersecurity. #cybersecuritynews #OTPbots #phishingattacks #twofactorauthentication
EmailGPT vulnerability allows attackers to access sensitive data through prompt injection, posing risks of intellectual property leakage and financial loss. Researchers discovered CVE-2024-5184 with a medium severity level of 6.5. Prompt injection in EmailGPT service enables attackers to manipulate the AI service, leading to potential data exfiltration and social engineering. CyRC recommends removing EmailGPT applications to mitigate threats. #cybersecurity #vulnerability #EmailGPT #promptinjection
Mozilla launches Gen Bug Bounty Program to address vulnerabilities in GenAI, emphasizing the importance of collective security efforts. #Mozilla #BugBounty #GenAI #CyberSecurity Netscape's bug bounty program evolution led to the creation of programs like ZDI and HackerOne, incentivizing researchers to report flaws. #BugBounty #ZDI #HackerOne #Security Mozilla's 0Din Bug Bounty Program focuses on identifying and fixing vulnerabilities in large language models and deep learning technologies. #0Din #BugBounty #GenAI #Security Collaborative community efforts in GenAI security are crucial, with Mozilla's commitment to openness and collective participation at the forefront. #Collaboration #GenAI #Security #Community
Recent cyber security news highlights threats such as cyber attacks, vulnerabilities and data breaches like those found in Ticketmaster and Santander Bank. Hackers are exploiting flaws in Microsoft, Checkpoint, and Microsoft Azure, leading to possible unauthorized access. Cloud services like Amazon, Google, and IBM are being used for phishing attacks, while hackers are weaponizing files like LNK and Excel documents. Organizations are urged to update their systems to protect against ransomware attacks, RATs, and malicious packages targeting developers. #CyberSecurity #Vulnerabilities #DataBreaches #Threats #Ransomware #PhishingAsAService
Microsoft made updates to the Recall feature for Copilot+ PCs due to security concerns, including storing data in plain text, but has enhanced security measures like Windows Hello enrollment and just-in-time decryption. #Microsoft #RecallFeature #CyberSecurity #PrivacyConcerns #DataProtection #WindowsHello #SecurityMeasures
Hackers exploit Facebook and MS Console for targeted attacks, using personal data for malicious activities. Kimsuky APT group impersonates South Korean officials on Facebook to distribute malware. Malicious files evade anti-malware scanners, showing evolving attack capabilities. Cybersecurity researchers uncover unconventional means used by Kimsuky for infiltration. #KimsukyAPT #FacebookHack #MScMalware #CyberSecurity #APT攻撃 #SocialEngineering #Vulnerability #ZeroDay #DataBreaches #CyberAI
New York Times internal data and source code leaked on 4chan prompting concerns and speculation about potential impacts. The leak includes 270 GB of data, including 5,000 repositories and 3.6 million files, with some encrypted repositories. Cybersecurity experts express serious concerns about the breach and its implications for the historic news organization. The incident highlights the need for robust cybersecurity measures and vigilance in protecting digital assets. #NewYorkTimes #DataLeak #CybersecurityThreat #CybersecurityDefense
Hackers are attacking ThinkPHP by injecting payload from remote servers, exploiting known vulnerabilities such as ThinkPHP RCE CVE-2018-20062 and CVE-2019-9082. Attackers are using a Chinese web shell named "Dama" for victim control but it lacks CLI support. The attacks aim for botnet recruitment, ransomware attacks, extortion, and acquiring intelligence. #Cybersecurity #ThinkPHP #WebShell #Attack #Vulnerability #Malware #DataBreach #ZeroDay #CyberAI #Hackers #RemoteServers