Breaking News

Security Affairs newsletter Round 386

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.

If you want to also receive for free the newsletter with the international press subscribe here.

CISA adds Atlassian Bitbucket Server flaw to its Known Exploited Vulnerabilities Catalog
Guacamaya hacktivists stole sensitive data from Mexico and Latin American countries
Luxury hotel chain Shangri-La suffered a security breach
Witchetty APT used steganography in attacks against Middle East entities
US DoD announced the results of the Hack US bug bounty challenge
Microsoft confirms Exchange zero-day flaws actively exploited in the wild
Unpatched Microsoft Exchange Zero-Day actively exploited in the wild
Experts uncovered novel Malware persistence within VMware ESXi Hypervisors
Hacker groups support protestors in Iran using Telegram, Signal and Darkweb
A cracked copy of Brute Ratel post-exploitation tool leaked on hacking forums
Go-based Chaos malware is rapidly growing targeting Windows, Linux and more
Threat actors use Quantum Builder to deliver Agent Tesla malware
ONLINE DISINFORMATION: Under the hood of a Doppelgänger
APT28 relies on PowerPoint Mouseover to deliver Graphite malware
Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks
NUVOLA: the new Cloud Security tool
Meta dismantled the largest Russian network since the war in Ukraine began
North Korea-linked Lazarus continues to target job seekers with macOS malware
Defense firm Elbit Systems of America discloses data breach
WhatsApp fixed critical and high severy vulnerabilities
Erbium info-stealing malware, a new option in the threat landscape
Mandiant identifies 3 hacktivist groups working in support of Russia
Russia prepares massive cyberattacks on the critical infrastructure of Ukraine and its allies
China-linked TA413 group targets Tibetan entities with new backdoor
Metador, a never-before-seen APT targeted ISPs and telco for about 2 years
Exmatter exfiltration tool used to implement new extortion tactics
Attackers impersonate CircleCI platform to compromise GitHub accounts
OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CrowdStrike update epic fail crashed Windows systems worldwide

Windows machines worldwide displayed BSoD screen following a faulty update pushed out by cybersecurity firm…

5 hours ago

Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users

Cisco has addressed a critical vulnerability that could allow attackers to add new root users…

12 hours ago

SAPwned flaws in SAP AI core could expose customers’ data

Researchers discovered security flaws in SAP AI Core cloud-based platform that could expose customers' data. Cybersecurity researchers…

1 day ago

Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums

The cybercrime group FIN7 is advertising a security evasion tool in multiple underground forums, cybersecurity…

1 day ago

How to Protect Privacy and Build Secure AI Products

AI systems are transforming technology and driving innovation across industries. How to protect privacy and…

1 day ago

A critical flaw in Cisco SSM On-Prem allows attackers to change any user’s password

A vulnerability in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers allows threat…

2 days ago

This website uses cookies.