• DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs

    DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs

    The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for allegedly running a “laptop farm” to help get North Koreans remote jobs with American and British companies. Matthew Isaac Knoot is charged with conspiracy to cause damage to protected computers, conspiracy to launder monetary instruments, conspiracy to commit wire…

    Read More

  • CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

    CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install (SMI) feature with the aim of accessing sensitive data. The agency said it has seen adversaries “acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart…

    Read More

  • University Professors Targeted by North Korean Cyber Espionage Group

    University Professors Targeted by North Korean Cyber Espionage Group

    The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff, researchers, and professors for intelligence gathering purposes. Cybersecurity firm Resilience said it identified the activity in late July 2024 after it observed an operation security (OPSEC) error made by the hackers. Kimsuky, also known by…

    Read More

  • 0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices

    0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices

    Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers that malicious websites could take advantage of to breach local networks. The critical vulnerability “exposes a fundamental flaw in how browsers handle network requests, potentially granting malicious actors access to sensitive services running on local devices,” Oligo Security researcher Avi Lumelsky

    Read More

  • Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework

    Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework

    The last few years have seen more than a few new categories of security solutions arise in hopes of stemming a never-ending tidal wave of risks. One of these categories is Automated Security Validation (ASV), which provides the attacker’s perspective of exposures and equips security teams to continuously validate exposures, security measures, and remediation at…

    Read More

  • Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities

    Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities

    Microsoft said it is developing security updates to address two loopholes that it said could be abused to stage downgrade attacks against the Windows update architecture and replace current versions of the operating system files with older versions. The vulnerabilities are listed below – CVE-2024-38202 (CVSS score: 7.3) – Windows Update Stack Elevation of Privilege…

    Read More

  • New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links

    New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links

    Cybersecurity researchers have discovered a novel phishing campaign that leverages Google Drawings and shortened links generated via WhatsApp to evade detection and trick users into clicking on bogus links designed to steal sensitive information. “The attackers chose a group of the best-known websites in computing to craft the threat, including Google and WhatsApp to host…

    Read More

  • Election coverage: Aug. 6 Washington Primary

    Election coverage: Aug. 6 Washington Primary

    KLICKITAT CO. — Polls closed at 8 p.m. Aug. 6 for Washington’s Primary Election; mailed ballots must be postmarked by 8 p.m. on election day to be counted.

    Read More

  • New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

    New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

    Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick that could be exploited to elevate a limited heap vulnerability to an arbitrary memory read-and-write primitive. “Initially, it exploits a timing side-channel of the allocator to perform a cross-cache attack reliably,” a group of academics from the Graz University of Technology…

    Read More

  • Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

    Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

    Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software that could be exploited to execute malicious JavaScript in a victim’s web browser and steal sensitive information from their account under specific circumstances. “When a victim views a malicious email in Roundcube sent by an attacker, the attacker can execute arbitrary JavaScript…

    Read More