Tag: attackers

  • The Register: Snyk appears to deploy ‘malicious’ packages targeting Cursor for unknown reason

    Source URL: https://www.theregister.com/2025/01/14/snyk_npm_deployment_removed/ Source: The Register Title: Snyk appears to deploy ‘malicious’ packages targeting Cursor for unknown reason Feedly Summary: Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test Developer security company Snyk is at the center of allegations concerning the possible targeting or…

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • Slashdot: Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup

    Source URL: https://it.slashdot.org/story/25/01/14/0920245/snyk-researcher-caught-deploying-malicious-code-targeting-ai-startup Source: Slashdot Title: Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a dependency confusion attack targeting Cursor, an AI coding startup, via the publication of malicious NPM packages. This incident raises significant concerns regarding supply chain security and illustrates potential…

  • The Register: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used

    Source URL: https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/ Source: The Register Title: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used Feedly Summary: Ransomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg Miscreants running a “mass exploitation campaign" against Fortinet firewalls, which peaked in December, may be using an unpatched zero-day vulnerability to compromise the equipment, according…

  • Rekt: Moby Trade – Rekt

    Source URL: https://www.rekt.news/mobytrade-rekt Source: Rekt Title: Moby Trade – Rekt Feedly Summary: When your private keys become the white whale, who’s really hunting whom? Moby Trade loses roughly $1 million to a compromised key, while white hats rescue $1.47M from the depths. Some lessons of the sea only need to be learned once. AI Summary…

  • The Register: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug

    Source URL: https://www.theregister.com/2025/01/13/severe_aviatrix_controller_vulnerability/ Source: The Register Title: Cryptojacking, backdoors abound as attackers abuse Aviatrix Controller bug Feedly Summary: This is what happens when you publish PoCs immediately “Several cloud deployments" are already compromised following the disclosure of the maximum-severity vulnerability in Aviatrix Controller, researchers say.… AI Summary and Description: Yes Summary: The text discusses a…

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • CSA: How Illumio Simplified eBay’s Large-Scale Microsegmentation Project

    Source URL: https://www.illumio.com/blog/how-illumio-simplified-ebays-large-scale-microsegmentation-project Source: CSA Title: How Illumio Simplified eBay’s Large-Scale Microsegmentation Project Feedly Summary: AI Summary and Description: Yes Summary: The text outlines eBay’s cybersecurity enhancements through Illumio’s Zero Trust Segmentation (ZTS) platform, focusing on the implementation of microsegmentation to fortify its expansive network against breaches and ransomware. Key benefits include enhanced visibility, simplified…

  • Schneier on Security: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

    Source URL: https://www.schneier.com/blog/archives/2025/01/microsoft-takes-legal-action-against-ai-hacking-as-a-service-scheme.html Source: Schneier on Security Title: Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme Feedly Summary: Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed to allow the creation of harmful and illicit…