Breaking News

Security Affairs newsletter Round 337

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.

If you want to also receive for free the international press subscribe here.

NATO releases its first strategy for Artificial Intelligence
Threat actors offer for sale data for 50 millions of Moscow drivers
Cisco SD-WAN flaw could lead to arbitrary code execution, patch it now!
Supply-chain attack on NPM Package UAParser, which has millions of daily downloads
Facebook SSRF Dashboard allows hunting SSRF vulnerabilities
Groove ransomware group calls on other ransomware gangs to hit US public sector
DarkSide ransomware operators move 6.8M worth of Bitcoin after REvil shutdown
FIN7 cybercrime gang creates fake cybersecurity firm to recruit pentesters for ransomware attacks
FiveSys, a new digitally-signed rootkit spotted by Bitdefender experts
Evil Corp rebrands their ransomware, this time is the Macaw Locker
A flaw in WinRAR could lead to remote code execution
Administrators of bulletproof hosting sentenced to prison in the US
US Bureau of Industry and Security bans export of hacking tools to authoritarian regimes
Top 5 Attack Vectors to Look Out For in 2022
YouTube creators’ accounts hijacked with cookie-stealing malware
PurpleFox botnet variant uses WebSockets for more secure C2 communication
Acer suffers a second data breach in a week
China-linked LightBasin group accessed calling records from telcos worldwide
Zerodium is looking for zero-day exploits in ExpressVPN, NordVPN, and Surfshark Windows VPN clients
Experts found many similarities between the new Karma Ransomware and Nemty variants
Symantec uncovered a previously unknown nation-state actor, named Harvester, that targeted telcos
FBI, CISA, NSA published a joint advisory on BlackMatter ransomware operations
Trustwave released a free decryptor for the BlackByte ransomware
TeamTNT Deploys Malicious Docker Image On Docker Hub
Prometheus endpoint unprotected installs could expose sensitive data
Sinclair TV stations downtime allegedly caused by a ransomware attack
REvil ransomware operation shuts down once again
Experts spotted an Ad-Blocking Chrome extension injecting malicious ads
Experts hacked a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest
Twitch security breach had minimal impact, the company states

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

2 hours ago

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

20 hours ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

23 hours ago

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…

1 day ago

Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry

The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…

2 days ago

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

2 days ago