Security researchers from Intel 471 told about EtterSilent, a flexible malicious document builder used by hackers to implement their criminal schemes. First advertised on a well-known Russian cybercrime forum, the seller offered two types of weaponized Microsoft Office documents (maldocs) to users: one that exploits a known vulnerability in Microsoft Office (CVE-2017-8570) and another that uses a malicious macro.
Microsoft Exchange Server attacks: a significant number of cyberattacks targeting vulnerable Microsoft Exchange servers are attempted every single day, warn researchers at F-Secure – who say it is critical to apply the patches immediately.
Popular npm library netmask has a critical networking vulnerability. Netmask is frequently used by hundreds of thousands of applications to parse IPv4 addresses and CIDR blocks or compare them. The component gets over 3 million weekly downloads, and as of today, has scored over 238 million total downloads over its lifetime.
Cornell University specialists have introduced the first microarchitectural side channel attacks that leverage contention on the CPU ring interconnect. They demonstrated our attack by extracting key bits from vulnerable EdDSA and RSA implementations, as well as inferring the precise timing of keystrokes typed by a victim user.
PingSafe AI, a security company that monitors multiple breaches in real-time, has uncovered a critical vulnerability in the iPhone automatic call recorder application that exposed thousands of users’ recorded calls. The Call Recorder app-enabled third-parties to access a user’s entire library of recordings, just by knowing their phone number.
Masslogger Trojan reinvented in quest to steal Outlook, Chrome credentials. The operators have also been linked to the use of AgentTesla, Formbook, and AsyncRAT. Cybersecurity researchers from Cisco Talos said the campaign is currently focused on victims in Turkey, Latvia, and Italy, expanding activities documented in late 2020 which targeted users in Spain, Bulgaria, Lithuania, Hungary, Estonia, and Romania.
The GreatHorn Threat Intelligence Team has identified a new email attack trend, where cybercriminals are able to bypass traditional URL defenses to attack end users. The URLs are malformed, not utilizing the normal URL protocols, such as http:// or https://. Instead, they use http:/\ in their URL prefix.
A small but complex malware variant called Kobalos is targeting supercomputers worldwide. The malware’s codebase is tiny but is sophisticated enough to impact at least Linux, BSD, and Solaris operating systems. ESET suspects it may possibly be compatible with attacks against AIX and Microsoft Windows machines, too.
The vulnerability, disclosed recently as CVE-2021-3156 by security researchers from Qualys, impacts Sudo, an app that allows admins to delegate limited root access to other users. Matthew Hickey, the co-founder of Hacker House, has discovered that a recent security flaw in the Sudo app also impacts the macOS operating system, and not just Linux and BSD, as initially believed.