25 JANUARY 2024 WEEKLY NEWSLETTER

BOCRA website

 

 

 

     

NEWSLETTER

 

Apple Issues Patch for Critical Zero-Day in iPhones, Macs - Update Now

                                                     LATEST CYBER HACKS 
 
 
icon

Black basta gang claims the hack of the uk water utility southern water

Southern Water is a private utility company responsible for collecting and treating wastewater in Hampshire, the Isle of Wight, West Sussex, East Sussex and Kent, and for providing public water supply to approximately half of this area.
icon

Slug slimes aerospace biz AerCap with ransomware, brags about 1TB theft

AerCap, the world's largest aircraft leasing company, has reported a ransomware infection that occurred earlier this month, but claims it hasn't yet suffered any financial losses yet and all its systems are under control.
icon

Mother of all breaches – a historic data leak reveals 26 billion records: check what’s exposed

The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records. The leak is almost certainly the largest ever discovered.

                                                      VULNERABILITIES
 
 
icon

Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes

Varonis Threat Labs discovered a new Outlook vulnerability (CVE-2023-35636) among three new ways to access NTLM v2 hashed passwords by exploiting Outlook, Windows Performance Analyzer (WPA), and Windows File Explorer.
icon

Hackers start exploiting critical Atlassian Confluence RCE flaw

Security researchers are observing exploitation attempts for the CVE-2023-22527 remote code execution flaw vulnerability that affects outdated versions of Atlassian Confluence servers.

                                     MALWARES
 
 
icon

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts.
icon

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were installed.
icon

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate.

                               GENERAL NEWS
 
 
icon

Data Privacy Week: Lack of Understanding, Underfunding Threaten Data Privacy and Compliance

A lack of understanding combined with budgetary squeezes are significant obstacles for organization's navigating data privacy and compliance with data protection laws, according to industry body ISACA.
icon

How to delete your personal information from the internet

Whether to protect against identity theft, to protect our privacy or to regain control over our information, there are numerous reasons for wanting to delete personal data from the internet. And there are more of them than we would like.