Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
Cybercrime
Japanese watchmaker Seiko breached by BlackCat ransomware gang
Akira ransomware targets Cisco VPNs to breach organizations
Tornado Cash Founders Charged With Money Laundering And Sanctions Violations
Final negotiations on UN cybercrime treaty underway in New York
Lapsus$ hacker targeted Uber, Revolut, Grand Theft Auto maker, London jury finds
Kroll Employee SIM-Swapped for Crypto Investor Data
A Pôle emploi service provider victim of a cyber-malicious act
Malware
No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action
Cuba ransomware uses Veeam exploit against critical U.S. organizations
Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT
Telekopye: Hunting Mammoths using Telegram bot
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC
WinRAR zero-day exploited since April to hack trading accounts
Exploitation of Openfire CVE-2023-32315
Ivanti Sentry Authentication Bypass CVE-2023-38035 Deep Dive
Cellebrite asks cops to keep its phone hacking tech ‘hush hush’
How Attackers are Circumventing MFA (and How to Stop Them)
Critical Vulnerabilities Patched in Jupiter X Core Plugin
Intelligence and Information Warfare
North Korean hackers target U.S.-South Korea military drills, police say
FBI Identifies Cryptocurrency Funds Stolen by DPRK
Flax Typhoon using legitimate software to quietly access Taiwanese organizations By Microsoft Threat Intelligence
Uncle Sam: Rest of the world would love to steal our space blueprints – don’t let ’em
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
Lazarus Group’s infrastructure reuse leads to discovery of new malware
Cybersecurity
BIRD Foundation invests $3.85 million in critical infrastructure cyber projects via new program
Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability
Defense contractor Belcan leaks admin password with a list of flaws
Leaseweb is restoring ‘critical’ systems after security breach
Microsoft is now a cybersecurity titan. That could be a problem
Tor turns to proof-of-work puzzles to defend onion network from DDoS attacks
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)