Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models
The Hacker News
by
39m ago
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained ..read more
Visit website
New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation
The Hacker News
by
15h ago
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE-2024-3661 (CVSS score: 7.6). It impacts all operating systems that implement a DHCP client and has ..read more
Visit website
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
The Hacker News
by
18h ago
Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link ..read more
Visit website
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Hacker News
by
22h ago
Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous Mirai botnet. That's according to findings from Juniper Threat Labs, which said the vulnerabilities CVE-2023-46805 and CVE-2024-21887 have been leveraged to deliver the botnet payload. While CVE-2023-46805 is an authentication bypass flaw ..read more
Visit website
Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover
The Hacker News
by
1d ago
Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws "can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next ..read more
Visit website
A SaaS Security Challenge: Getting Permissions All in One Place 
The Hacker News
by
2d ago
Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each user’s base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. Layered on top of ..read more
Visit website
New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data
The Hacker News
by
2d ago
Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard (AES) algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue University, UNC Chapel ..read more
Visit website
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
The Hacker News
by
2d ago
A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. "These enhancements aim to increase the malware's stealthiness, thereby remaining undetected for longer periods of time," Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report. "Hijack ..read more
Visit website
The Fundamentals of Cloud Security Stress Testing
The Hacker News
by
2d ago
״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as possible, starting with the most critical ..read more
Visit website
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
The Hacker News
by
2d ago
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with the names wpsupp‑user  ..read more
Visit website

Follow The Hacker News on FeedSpot

Continue with Google
Continue with Apple
OR