Skip to main content

Security

Cyberattackers targeting telecommunications and the military-industrial complex in the Middle East

posted onMarch 27, 2024
by l33tdawg
Credit: PT Security

A significant portion of the Middle East's economy is driven by the extraction of natural resources. The biggest growth in global oil production was in the Middle East, including Saudi Arabia and the United Arab Emirates (UAE). The region is home to a high concentration of industrial companies and enterprises in the energy sector. These organizations, alongside government agencies, actively employ information technologies. Digitalization has led to significant economic and social growth in Middle Eastern countries.

Popular open-source AI framework under siege, critical flaw has no patch

posted onMarch 27, 2024
by l33tdawg
Credit: The Record

Researchers are warning that hackers are actively exploiting a disputed vulnerability in a popular open-source AI framework known as Ray.

This tool is commonly used to develop and deploy large-scale Python applications, particularly for tasks like machine learning, scientific computing and data processing.

Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own

posted onMarch 25, 2024
by l33tdawg
Credit: Security Week

Mozilla has released Firefox browser updates to patch two zero-day vulnerabilities that were exploited at the Pwn2Own Vancouver 2024 hacking contest last week.

The issues, discovered by security researcher Manfred Paul, were chained together to escape the browser’s sandbox and execute code on the system. Tracked as CVE-2024-29943, the first vulnerability is described as an out-of-bounds access flaw that leads to the bypass of range analysis.

GitHub Developers Hit in Complex Supply Chain Cyberattack

posted onMarch 25, 2024
by l33tdawg
Credit: Dark Reading

n unidentified group of threat actors orchestrated a sophisticated supply chain cyberattack on members of the Top.gg GitHub organization as well as individual developers in order to inject malicious code into the code ecosystem.

The attackers infiltrated trusted software development elements to compromise developers. They hijacked GitHub accounts with stolen cookies, contributed malicious code via verified commits, established a counterfeit Python mirror, and released tainted packages on the PyPi registry.

Iranian hackers claim to have breached Israeli nuclear facility

posted onMarch 21, 2024
by l33tdawg
Credit: The Record

 An Iran-linked hacking group claims to have breached the computer network of a sensitive Israeli nuclear installation in an incident declared by the ‘Anonymous’ hackers as a protest against the war in Gaza.

The hackers claim to have stolen and published thousands of documents — including PDFs, emails, and PowerPoint slides — from the Shimon Peres Negev Nuclear Research Center. The secretive facility, which houses a nuclear reactor linked to Israel’s unavowed nuclear weapons program, has historically been targeted by Hamas rockets.

U.S. Government Doubles Down on Chinese APT Warnings

posted onMarch 21, 2024
by l33tdawg
Credit: Wikipedia

At the Billington Cybersecurity State and Local Summit on Tuesday, U.S. government officials warned that the critical infrastructure security threat posed by Chinese state-sponsored actors could potentially have a very real and significant impact on state and local governments.

Hackers Use Fingertip Friction Sound To Steal Fingerprints

posted onMarch 20, 2024
by l33tdawg
Credit: Cyber Security News

Researchers have unveiled a new cybersecurity threat that could compromise the integrity of fingerprint authentication systems worldwide.

The method, dubbed “PrintListener,” exploits the sound of fingertip friction on smartphone screens to infer and reconstruct users’ fingerprints, potentially unlocking access to sensitive personal and financial information.

A Timely Leak Offers a Peek Into Chinese Cyberespionage Worldwide

posted onMarch 20, 2024
by l33tdawg
Credit: Mind Matters

Earlier this month, we looked at the way that Chinese hackers infiltrate critical infrastructures in the U.S. They can preposition code to disable systems such as clean water supply and electrical power grid on command. Because current targets are, among other things, near military bases, intelligence agencies believe that the hacks anticipate a conflict in the South China Sea over Taiwan.

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088