From Security Weekly WikiJump to navigationJump to search
- A China-Linked Group Repurposed Hacking Team’s Stealthy Spyware The tool attacks a device’s UEFI firmware—which makes it especially hard to detect and destroy. When a hacking organization’s secret tools are stolen and dumped.
- Hackers chain Windows, VPN bugs to access government systems The FBI’s Cyber Division leads the nation’s efforts to investigate and prosecute internet crimes. (Source: FBI) Threat actors have gained access to government
- Leading Law firm Seyfarth Shaw discloses ransomware attack Seyfarth Shaw, one of the leading global legal firms announced that it was a victim of an “aggressive malware” attack, likely a ransomware attack.
- Enterprise Solutions Provider 'Software AG' Hit by Clop Ransomware German enterprise solutions giant Software AG revealed last week that it had been targeted by cybercriminals with the Clop ransomware.
- Children and parent info exposed in Georgia DHS data breach Information for children and parents was accessed by hackers over the summer, the Georgia Department of Human Services (DHS) said on Friday.
- Spotless hit by ransomware attack Spotless Group, the Downer-owned facilities services provider, is the latest high-profile Australian company to fall victim to ransomware attackers.
- Google Warns of Severe 'BleedingTooth' Low to Medium risk vulnerabilities. Bluetooth Flaw in Linux Kernel Exploitation consequences include the ability for an unauthenticated attacker to achieve code execution with kernel privileges, obtain potentially sensitive information, and/or cause a denial-of-service (DoS) condition. The severity of these vulnerabilities is offset by the adjacent access required and the attack complexity.
- US Cyber Command: Patch Windows 'Bad Neighbor' TCP/IP Bug Now High-risk due to the possibility of remote code execution with little to no user interaction required. While remote code execution is possible, sources report that it is difficult to achieve and the Blue Screen of Death (BSoD) is the more likely exploitation consequence.
- Hackers Claim to Have Access to 50,000 Home Security Cameras A hacking group is reportedly selling access to home security camera footage on the "Discord" platform that was stolen from more than 50,000 home security cameras and includes footage of children in different states of undress for a one-off subscription fee of $150. Secure your home video cameras! Recommend users change factory settings and employing multi-factor authentication where possible