The Hacker News

" French authorities launch operation to remover PlugX malware from infected systems."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 28 July 2024, 1505 UTC.

Content and Source:   https://thehackernews.com/

Please check link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

Free OAuth Investigation Checklist - How to Uncover Risky or Malicious Grants

Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps

Offensive AI: The Sine Qua Non of Cybersecurity

U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

CrowdStrike Warns of New Phishing Scam Targeting German Customers

Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk

Jul 26, 2024 Software Security / Vulnerability
Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw that could result in remote code execution. The vulnerability, tracked as CVE-2024-6327 (CVSS score: 9.9), impacts Report Server version 2024 Q2 (10.1.24.514) and earlier. "In Progress Telerik Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability," the company said in an advisory. Deserialization flaws occur when an application reconstructs untrusted data that an attacker has control over without adequate validation in place, resulting in the execution of unauthorized commands. Progress Software said the flaw has been addressed in version 10.1.24.709. As temporary mitigation, it's recommended to change the user for the Report Server Application Pool to one with limited permission. Administrators can check if their servers are vulnerable
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

Comments

Popular posts from this blog

SecurityWeek Briefing.

SecurityWeek Briefing.