CyberSecurity updates
Updated: 2024-12-03 23:05:00 Pacfic

ciso2ciso.com
Critical Vulnerability in Ivanti Cloud Service Appliance Actively Exploited - 19d

A critical vulnerability in Ivanti’s Cloud Service Appliance (CSA) has been actively exploited by attackers. The flaw, tracked as CVE-2024-8190, allows attackers to gain unauthorized access to sensitive data and execute arbitrary commands on vulnerable systems. The vulnerability exists in the CSA’s authentication mechanism and can be exploited by attackers who can send specially crafted requests to the CSA. This attack vector allows attackers to bypass the CSA’s security measures and gain access to the underlying operating system. The vulnerability has been exploited in the wild by a suspected nation-state adversary. There are strong indications that China is behind the attacks. Organizations using Ivanti CSA should prioritize patching the vulnerability immediately to reduce their risk of being compromised.

LĂ©onie Chao-Fong in Washington DC @ Data and computer security
Chinese Cyberespionage Targeting US Leaders: Trump and Vance Phones - 8d

Chinese-linked cyberespionage campaigns have reportedly targeted the phone communications of former President Donald Trump and Senator JD Vance. The attacks involved gathering intelligence on American leaders, potentially through the interception of phone calls, messages, and other communications. This incident raises concerns about the vulnerability of leaders’ communications to cyber espionage and the increasing sophistication of nation-state hacking groups. The incident highlights the importance of robust security measures for protecting high-profile individuals’ communications and the need for continuous monitoring and threat detection to counter these attacks.

djohnson @ Cybercrime Archives
North Korean Fake IT Worker Scheme Targets Global Organizations with Sophisticated Identity Fraud - 15d

A sophisticated identity fraud scheme is being employed by North Korean threat actors to infiltrate global organizations and gain access to sensitive information. The attackers create fraudulent profiles, often using stolen identities, to apply for IT positions within target companies. Once hired, these malicious actors steal company trade secrets and potentially extort the companies for ransom. The scheme highlights the growing threat of sophisticated social engineering tactics used by nation-state actors and the need for robust background checks and security measures to prevent such infiltration.


This site is an experimental news aggregator using feeds I personally follow. You can provide me feedback using this form or using Bluesky.