Updates
- Cisco Releases Security Advisory for IP Phone 7800 and 8800 Series | CISA
- Fortinet Releases Security Updates for FortiOS | CISA
- New Python malware backdoors VMware ESXi servers for remote access
- Update now! Emergency fix for Google Chrome's V8 JavaScript engine zero-day flaw released
- Update now! Google patches Android vulnerability that allows remote code execution over Bluetooth
- Update now! NetGear routers’ default configuration allows remote attacks
- Microsoft: November updates break ODBC database connections
- Netgear Neutralizes Pwn2Own Exploits With Last-Minute Nighthawk Router Patches | SecurityWeek.Com
- Sophos fixed a critical flaw in its Sophos Firewall version 19.5
- Kali Linux 2022.4 adds 6 new tools, Azure images, and desktop updates
- Google Patches Ninth Chrome Zero-Day of 2022 | SecurityWeek.Com
Incidents
- Iranian Hackers Deliver New 'Fantasy' Wiper to Diamond Industry via Supply Chain Attack | SecurityWeek.Com
- Play ransomware claims attack on Belgium city of Antwerp
- Elon Musk's Twitter followers targeted in fake crypto giveaway scam
- Massive DDoS attack takes Russia’s second-largest bank VTB offline
- Rackspace confirms outage was caused by ransomware attack
- Antwerp's city services down after hackers attack digital partner
- Amnesty International Canada breached by suspected Chinese hackers
- Ransomware attack forces French hospital to transfer patients
Vulnerabilities
- VMSA-2022-0030
- Eufy "no cloud" security cameras streaming data to the cloud
- Security Vulnerabilities in Eufy Cameras - Schneier on Security
Threats
- Sparkassen warnen vor Phishing-SMS zur pushTAN
- Automated dark web markets sell corporate email accounts for $2
- Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android Apps
- Rackspace warns of phishing risks following ransomware attack
- Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls
- Watch out for this triple threat PayPal phish
- New Ransom Payment Schemes Target Executives, Telemedicine
- Google: State hackers still exploiting Internet Explorer zero-days
- New Zerobot malware has 21 exploits for BIG-IP, Zyxel, D-Link devices
- Compromised Android keys used to sign info-stealing malware
- North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps
- Hackers hijack Linux devices using PRoot isolated filesystems
- Hacking cars remotely with just their VIN
Cyber Crime
- Lazarus group uses fake cryptocurrency apps to plant AppleJeus malware
- SIM swapper jailed for 18 months over crypto heist
- Iranian hacking group uses compromised email accounts to distribute MSP remote access tool
- Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack
- Microsoft: Hackers target cryptocurrency firms over Telegram
- Suspects arrested for hacking US networks to steal employee data
Malware
- Users Warned of New Aerst, ScareCrow, and Vohuk Ransomware Families | SecurityWeek.Com
- Leaked Signing Keys Are Being Used to Sign Malware - Schneier on Security
- New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
Misc.
- Pwn2Own Toronto: 54 hacks, 63 new bugs, $1 million in bounties
- Pwn2Own Toronto 2022 hacking competition. Samsung S22 hacked
- Hive Social pulls the plug on itself after security flaws found
- Apple announces 3 new security features
- San Francisco Rolls Back Its Plan for Killer Robots
- Want to detect Cobalt Strike? Look to process memory