15 November 2022 WEEKLY NEWSLETTER

BOCRA website

     

NEWSLETTER

 

Google Pays $70k for Android Lock Screen Bypass null 599x250 data:image/png;base64,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 -1


                                                     LATEST CYBER HACKS 

 
 
icon

FTX Investigating Possible Hack Hours After Bankruptcy Filing

A day after it filed for bankruptcy, the collapsed cryptocurrency exchange FTX said on Saturday that it was investigating "unauthorized transactions flowing from its accounts, as crypto researchers documented suspicious transfers of $515 million that may have been the result of a hack or theft..

icon

Lockbit gang leaked data stolen from global high-tech giant Thales

Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the development of our societies, by placing people at the heart of decision-making.

icon

Over 15,000 WordPress Sites Compromised in Malicious SEO Campaign

A new malicious campaign has compromised over 15, 000 WordPress websites in an attempt to redirect visitors to bogus Q&A portals.


                                                      VULNERABILITIES

 
 
icon

New Vulnerability in Popular Widget Shows Risks of Third-Party Code

The Americans with Disabilities Act (ADA) includes requirements on companies falling within its scope to ensure their websites are accessible to individuals with disabilities. These requirements have created a strong incentive for companies to use third-party solutions in the form of JavaScript libraries to make their websites accessible. However, using third-party solutions comes with its own risks.

icon

Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server

The Unit 42 research team has researched and discovered three different vulnerabilities in the open source OpenLiteSpeed Web Server. These vulnerabilities also affect the enterprise version, LiteSpeed Web. By chaining and exploiting the vulnerabilities, adversaries could compromise the web server and gain fully privileged remote code execution.


                                     MALWARES

 
 
icon

New BadBazaar Android malware linked to Chinese cyberspies

A previously undocumented Android spyware tool named 'BadBazaar' has been discovered targeting ethnic and religious minorities in China, most notably the Uyghurs in Xinjiang.

icon

StrelaStealer and IceXLoader Drive Info-Stealing Campaigns

Researchers have discovered new waves of malware campaigns, with two information-stealing malware making rounds in the wild. Named StrelaStealer and IceXLoader, both malware leverage malicious email attachments to lure their targets.


                              

icon

New KmsdBot Malware Hijacking Systems for Mining Crypto and Launch DDoS Attacks

A newly discovered evasive malware leverages the Secure Shell (SSH) cryptographic protocol to gain entry into targeted systems with the goal of mining cryptocurrency and carrying out distributed denial-of-service (DDoS) attacks.


                              


                               GENERAL NEWS

 
 
icon

VPN vs. DNS Security

When you are trying to get another layer of cyber protection that would not require a lot of resources, you are most likely choosing between a VPN service & a DNS Security solution. Let's discuss both.

icon

What is an External Penetration Test?

A penetration test (also known as a pentest) is a security assessment that simulates the activities of real-world attackers to identify security holes in your IT systems or applications.