Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform
Vulnerabilities in the Reyee cloud management platform and Reyee OS network appliances could allow threat actors to take over tens of thousands of devices, according to a warning from cybersecurity firm Claroty. Ruijie devices use the MQTT messaging protocol for communication, where devices authenticate to a broker using a username/password pair, where the username is […]
Read MoreUS Updates a Science and Technology Pact With China to Reflect Growing Rivalry and Security Threats
The U.S. has updated a decades-old science and technology agreement with China to reflect their growing rivalry for technological dominance. The new agreement, signed Friday after many months of negotiations, has a narrower scope and additional safeguards to minimize the risk to national security. The State Department said the agreement sustains intellectual property protections, establishes […]
Read MoreIn Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations
SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide a valuable summary of stories that may not warrant an entire article, but are nonetheless important for a comprehensive understanding of the cybersecurity landscape. Each week, we curate and present a collection of noteworthy developments, […]
Read MoreHackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal
Bitcoin ATM operator Byte Federal is notifying 58,000 people that their personal information might have been compromised in a data breach. Discovered on November 18, the hack occurred after threat actors exploited a vulnerability in the GitLab collaboration platform to access one of its servers. To contain the incident, Byte Federal shut down its platform, […]
Read MoreRydox Cybercrime Marketplace Disrupted, Administrators Arrested
The US on Thursday announced it has taken down Rydox, an illicit marketplace for stolen personal information and fraud tools, and unsealed charges against its alleged administrators. Three Kosovo nationals suspected of being the administrators of the cybercrime marketplace were arrested as part of the operation, the US announced. Ardit Kutleshi, 26, and Jetmir Kutleshi, […]
Read MoreMicrosoft Patches Vulnerabilities in Windows Defender, Update Catalog
Microsoft on Thursday informed customers that two potentially critical vulnerabilities have been patched in Update Catalog and Windows Defender. The tech giant has released advisories for each flaw and assigned CVE identifiers, but it’s only for transparency purposes as the issues have been fully mitigated and users do not need to take any action. The […]
Read MoreGermany Sinkholes Botnet of 30,000 BadBox-Infected Devices
At least 30,000 media devices were sold in Germany with pre-installed malware that ensnared them into a botnet, Germany’s Federal Office for Information Security (BSI) said on Thursday. The infected photo frames and streaming devices were running older Android versions and were infected with the BadBox malware prior to arriving on shelves, the German cybersecurity […]
Read MoreIranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
A notorious Iranian state-sponsored hacking group has been using custom-built malware to target IoT and operational technology (OT) devices in the United States and Israel, according to cybersecurity firm Claroty. The malware, named IOCONTROL, has been tied by Claroty researchers to CyberAv3ngers, which claims to be a hacktivist group, but which the US government and […]
Read MoreFake IT Workers Funneled Millions to North Korea, DOJ Says
The US Justice Department on Thursday announced indictments against 14 North Korean nationals for their involvement in a multi-year scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft. The indictment, unsealed in federal court in St. Louis, details an elaborate operation where North Korean operatives […]
Read MorePhishing: The Silent Precursor to Data Breaches
Phishing is one of the most prevalent tactics, techniques, and procedures (TTPs) in today’s cyber threat landscape. It often serves as a gateway to data breaches that can have devastating consequences for organizations and individuals alike. For instance, the Colonial Pipeline cyberattack in 2021 began with a Phishing-related compromise that led to a ransomware attack, […]
Read More