30 MAY 2024 WEEKLY NEWSLETTER

BOCRA website

     

NEWSLETTER

 

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

                                                     LATEST CYBER HACKS 
 
 
icon

Check Point Software customers targeted by hackers using old, local VPN accounts

Check Point Software Technologies is warning its customers that malicious actors are attempting to hack a small number of targeting old VPN local accounts with password-only authentication methods,  according to a blog post released Monday.
icon

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks.
icon

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the threat actor creating rogue virtual machines (VMs) within its VMware environment.

                                                      VULNERABILITIES
 
 
icon

AI-as-a-Service Platform Patches Critical RCE             Vulnerability

Attackers could have exploited a now-mitigated critical vulnerability in the Replicate artificial intelligence platform to access private AI models and sensitive data, including proprietary knowledge and personal identifiable information.
icon

A high-severity vulnerability affects cisco firepower management center

Cisco addressed a SQL injection vulnerability in the web-based management interface of the Firepower Management Center (FMC) Software. 

                                     MALWARES
 
 
icon

Malicious PyPI packages targeting highly specific MacOS machines

In late 2022, we released GuardDog, a CLI-based tool that uses Semgrep and package metadata heuristics to identify malicious software packages based on common patterns. A few months later, we started instrumenting GuardDog at scale to continuously scan the Python Package Index (PyPI).

icon

Fake AV websites used to distribute info-stealer malware

Threat actors used fake AV websites masquerading as legitimate antivirus products from Avast, Bitdefender, and Malwarebytes to distribute malware.
icon

Arc browser’s Windows launch targeted by Google ads malvertising

A new Google Ads malvertising campaign, coinciding with the launch of the Arc web browser for Windows, was tricking people into downloading trojanized installers that infect them with malware payloads.


                               GENERAL NEWS
 
 
icon

Google’s AI Travel Tools

Google has made further inroads in the travel industry in recent months with several AI-powered products it's launched.Travel Technology Reporter Justin Dawes delves into four of them.
icon

Google just updated its algorithm. The Internet will never be the same

Over the last two years, a series of updates to Google Search amount to a dramatic upheaval to the Internet's most powerful tool, complete with an unprecedented AI feature. Will Google save the web, or destroy it?