FBI, Europol Say Akira Ransomware Has Drained $42M from 250 Firms
The Cyber Post
by The Cyber Post
7h ago
Last updated: April 19, 2024 04:42 EDT | 1 min read Akira, a ransomware group, has drained $42 million from 250 firms since March 2023, said the Federal Bureau of Investigation (FBI), Europol, CISA, Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security Centre (NCSC-NL) in a joint statement. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. In an announcement, the national security organizations said Akira Akira ransomware has impacted businesses in North America ..read more
Visit website
Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns
The Cyber Post
by The Cyber Post
7h ago
Hackers are increasingly trying to plant data-stealing malware on messaging apps used by the Ukrainian armed forces, according to the latest report from the country’s computer emergency response team, CERT-UA. The agency is attributing the surge to a group tracked as UAC-0184, which was spotted in February targeting an unnamed Ukrainian entity in Finland. CERT-UA does not attribute UAC-0184’s activity to any specific foreign cyberthreat group CERT-UA urged soldiers to be careful when using apps, noting that “any careless online activity of a serviceman (for example, posting a photo in militar ..read more
Visit website
Telecom giant Frontier shuts down some systems after cyberattack
The Cyber Post
by The Cyber Post
7h ago
Texas-based telecommunications company Frontier Communications reported a cyberattack to the Securities and Exchange Commission on Thursday. The company provides internet services in more than 25 states and reported $5.75 billion revenues in 2023.  The company said it detected unauthorized access to its IT systems on April 14 and began instituting “containment measures” that included “shutting down certain of the Company’s systems.” The shutdowns caused operational disruption that the company said “could be considered material.” “Based on the Company’s investigation, it has determined th ..read more
Visit website
UK cyber agency NCSC announces Richard Horne as its next chief executive
The Cyber Post
by The Cyber Post
7h ago
Britain’s National Cyber Security Centre (NCSC) has announced that Richard Horne will become its next CEO later this year. Horne, who has a PhD from Royal Holloway, University of London, in mathematics and cryptography — his thesis being On Point-Weighted Designs — is the agency’s third permanent chief executive and the first person to lead the NCSC with any formal academic training in cybersecurity. His permanent predecessors in the role, Ciaran Martin and Lindy Cameron, had both studied history at the University of Oxford (not at the same time) before ultimately joining the Civil Service. T ..read more
Visit website
Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Authentication Bypass
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device’s system security. Change Mirror Download Elber Signum DVB-S/S2 IRD For Radio Netw ..read more
Visit website
Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Insecure Direct Object Reference
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Device ConfigVendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 1.999 Revision 1243 1.317 Revision 602 1.220 Revision 1250 1.220 Revision 1248_1249 1.220 Revision 597 1.217 Revision 1242 ..read more
Visit website
Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device’s system security. Change Mirror Download Elber Cleber/3 Broadcast Multi-Purpos ..read more
Visit website
Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Insecure Direct Object Reference
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Device ConfigVendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 1.0.0 Revision 7304 1.0.0 Revision 7284 1.0.0 Revision 6505 1.0.0 Revision 6332 1.0.0 Revision 6258 XS2DAB v1.50 rev 6267Sum ..read more
Visit website
Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Authentication Bypass
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device’s system security. Change Mirror Download Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave ..read more
Visit website
Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Insecure Direct Object Reference
The Cyber Post
by The Cyber Post
22h ago
Authored by LiquidWorm | Site zeroscience.mk Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link suffers from an unauthenticated device configuration and client-side hidden functionality disclosure vulnerability. Change Mirror Download Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Device ConfigVendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 0.01 Revision 0Summary: The REBLE610 features an accurate hardware design, absence ofinternal cabling and full modularity. The unit is composed by a basicchassis with 4 extractable boards which makes maintenance and criti ..read more
Visit website

Follow The Cyber Post on FeedSpot

Continue with Google
Continue with Apple
OR