Devices from Dell, HP and Lenovo have been found to use outdated versions of the OpenSSL cryptographic library, which are known to contain at least 10 critical vulnerabilities.
Read: https://thehackernews.com/2022/11/dell-hp-and-lenovo-devices-found-using.html
Read: https://thehackernews.com/2022/11/dell-hp-and-lenovo-devices-found-using.html
π37π11π₯6π€―6β‘5
Google has released an update for the Chrome browser to patch a new, actively exploited zero-day vulnerability (CVE-2022-4135) that resides in the GPU component.
Read: https://thehackernews.com/2022/11/update-chrome-browser-now-to-patch-new.html
Read: https://thehackernews.com/2022/11/update-chrome-browser-now-to-patch-new.html
π₯31π15β‘8π4π3π€―2
Researchers warn of new "RansomBoggs" ransomware attacks targeting organizations in Ukraine and linked to the Russia-based Sandworm nation-state hacking group.
Read:https://thehackernews.com/2022/11/russia-based-ransomboggs-ransomware.html
Read:https://thehackernews.com/2022/11/russia-based-ransomboggs-ransomware.html
π16π₯8β‘5π5π€5π±3π2π€―2
U.S. regulators have imposed a ban on Chinese telecommunications and video surveillance equipment from Huawei, ZTE, Hytera, Hikvision, and Dahua, classifying them as "unacceptable" threats to national security.
Read: https://thehackernews.com/2022/11/us-bans-chinese-telecom-equipment-and.html
Read: https://thehackernews.com/2022/11/us-bans-chinese-telecom-equipment-and.html
π58π€18π13π8β‘7π€―7π₯2
Elon Musk has confirmed that #Twitter 2.0 - The Everything App - will bring end-to-end #encryption (E2EE) for direct messages and long-form tweets to the platform.
Read: https://thehackernews.com/2022/11/elon-musk-confirms-twitter-20-will.html
Read: https://thehackernews.com/2022/11/elon-musk-confirms-twitter-20-will.html
π84π33π€14β‘9π₯8π8π±8π€―4
Over a dozen new vulnerabilities have been discovered in the firmware of Lanner's Baseboard Management Controller (BMC) that could leave OT and IoT networks vulnerable to remote attacks.
Read: https://thehackernews.com/2022/11/over-dozen-new-bmc-firmware-flaws.html
Read: https://thehackernews.com/2022/11/over-dozen-new-bmc-firmware-flaws.html
π19π₯8π3β‘2π2π€―1
Researchers have reported a cross-tenant vulnerability in Amazon Web Services (AWS) that exploits #AWS AppSync and allows an attacker to infiltrate a victim organization and access resources in those accounts.
Read: https://thehackernews.com/2022/11/researchers-detail-appsync-cross-tenant.html
Read: https://thehackernews.com/2022/11/researchers-detail-appsync-cross-tenant.html
π36π€―17π₯9β‘8π3π2
CISA has added a critical vulnerability affecting Oracle Fusion Middleware to the Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation.
Read: https://thehackernews.com/2022/11/cisa-warns-of-actively-exploited.html
Read: https://thehackernews.com/2022/11/cisa-warns-of-actively-exploited.html
π26π€5π3β‘2
Ireland's data regulator has fined Facebook β¬265 million ($277 million) for failing to protect the personal data of more than half a billion users of its social media platform.
Read: https://thehackernews.com/2022/11/irish-regulator-fines-facebook-277.html
Read: https://thehackernews.com/2022/11/irish-regulator-fines-facebook-277.html
π₯54π31π10β‘5π4π€―3π±3
Researchers have reported a new vulnerability (CVE-2022-4020) in Acer laptops that could be potentially weaponized to disable UEFI Secure Boot protection.
Read: https://thehackernews.com/2022/11/new-flaw-in-acer-laptops-could-let.html
Read: https://thehackernews.com/2022/11/new-flaw-in-acer-laptops-could-let.html
π₯17π€―14π12β‘3π3π2π±2
A hacking group with suspected ties to China has been linked to a series of cyber espionage attacks in the Philippines, mainly using USB devices as the initial infection vector.
Read: https://thehackernews.com/2022/11/chinese-cyber-espionage-hackers-using.html
Read: https://thehackernews.com/2022/11/chinese-cyber-espionage-hackers-using.html
π24π₯11π4π€4π€―4β‘3π±3π1
Researchers have disclosed details of three new security vulnerabilities affecting Operational Technology (OT) products from CODESYS and Festo.
Read: https://thehackernews.com/2022/11/3-new-vulnerabilities-affect-ot.html
Read: https://thehackernews.com/2022/11/3-new-vulnerabilities-affect-ot.html
π15π₯3π€3β‘1
Australian government has passed a new bill that significantly increases penalties (up to $50 million) for companies affected by serious or repeated data breaches.
Read: https://thehackernews.com/2022/11/australia-passes-bill-to-fine-companies.html
Read: https://thehackernews.com/2022/11/australia-passes-bill-to-fine-companies.html
π27π7π₯5β‘4π±3
French data protection watchdog has fined the country's largest electricity provider ElectricitΓ© de France (EDF) β¬600,000 for using insecure MD5 hash algorithm to store its customers' passwords.
Read: https://thehackernews.com/2022/11/french-electricity-provider-fined-for.html
Read: https://thehackernews.com/2022/11/french-electricity-provider-fined-for.html
π34π15π₯12π€―12π±4β‘1
A malicious Android app distributed through the Google Play Store secretly collected users' text messages in order to create accounts on various platforms, including Facebook, Google, and WhatsApp.
https://thehackernews.com/2022/11/this-malicious-app-abused-hacked.html
https://thehackernews.com/2022/11/this-malicious-app-abused-hacked.html
π31π₯12π€―9π±6β‘5π€4π2
An "unexpected behavior" in the npm command line interface could allow malicious NPM libraries to bypass security checks and hide vulnerabilities.
Read: https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
Read: https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
π₯21π±20π8π2β‘1π1
North Korea-linked ScarCruft APT hackers have been spotted using a previously undocumented backdoor called "Dolphin" to spy on targets in its southern counterpart.
Read: https://thehackernews.com/2022/12/north-korea-hackers-using-new-dolphin.html
Read: https://thehackernews.com/2022/12/north-korea-hackers-using-new-dolphin.html
π±19π8β‘4π€4π₯1π1
LastPass password management service has been hit by another security incident in which attackers gained access to some of its customers' data.
Read: https://thehackernews.com/2022/12/lastpass-suffers-another-security.html
Read: https://thehackernews.com/2022/12/lastpass-suffers-another-security.html
π±46π19π11π₯5π€―5β‘3π3
Researchers 'accidentally' crash the KMSDBot cryptocurrency mining botnet while sending commands to the bot to test its functionality and attack signatures.
Read: https://thehackernews.com/2022/12/researchers-accidentally-crashed.html
Read: https://thehackernews.com/2022/12/researchers-accidentally-crashed.html
π38π16π₯5π4π±3π€2β‘1
Over 300,000 Android users have fallen victim to dozens of Google Play Store apps that contain the Schoolyard Bully Trojan and steal users' Facebook credentials.
Read: https://thehackernews.com/2022/12/schoolyard-bully-trojan-apps-stole.html
Read: https://thehackernews.com/2022/12/schoolyard-bully-trojan-apps-stole.html
π32π16π€―11β‘10π5π€4
Hackers behind the devastating cyberattack on Australian insurer Medibank have posted another dump of the stolen data on the dark web after the company refused to pay a ransom.
Read: https://thehackernews.com/2022/12/hackers-leak-another-set-of-medibank.html
Read: https://thehackernews.com/2022/12/hackers-leak-another-set-of-medibank.html
π€―26π15π€10π±10π₯4β‘3π2