06 April 2023 WEEKLY NEWSLETTER

BOCRA website

     

NEWSLETTER

 

New Proxyjacking Attack Exploits Log4j for Initial Access


                                                     LATEST CYBER HACKS 

 
 
icon

Florida Hospital Begins Breach Notification Post-Attack

A Florida-based community healthcare system has begun notifying about 20,000 individuals whose information was compromised in a data security incident that prompted the organization to operate under its IT downtime procedures, including diverting some emergency patients, for two weeks in February.

icon

TAFE data breach uncovered by SA Police

TAFE South Australia has revealed a data breach that was discovered when SA Police seized “devices containing electronic scanned copies of TAFE SA student identification forms”.

icon

Proxyjacking has Entered the Chat

Did you know that you can effortlessly make a small passive income by simply letting an application run on your home computers and mobile phones? It lets others (who pay a fee to a proxy service provider) borrow your Internet Protocol (IP) address for things like watching a YouTube video that isn’t available in their region, conducting unrestricted web scraping and surfing, or browsing dubious websites without attributing the activity to their own IP.


                                                      VULNERABILITIES

 
 
icon

Exploited Elementor Pro Plugin Under Attack; Affects  Over 11 Million Sites

The Elementor Pro plugin for WordPress is being targeted by hackers who are exploiting a critical vulnerability in it. This vulnerability affects over 11 million websites that have installed the Elementor Pro plugin.

icon

HP to patch critical bug in LaserJet printers within 90 days

 

HP announced in a security bulletin this week that it would take up to 90 days to patch a critical-severity vulnerability that impacts the firmware of certain business-grade printers. The security issue is tracked as CVE-2023-1707 and it affects about 50 HP Enterprise LaserJet and HP LaserJet Managed Printers models it both widely used and problematic, at least from a security perspective.


                                     MALWARES

 
 
icon

Rilide Info-stealer: A Serious Threat to Cryptocurrency Assets

Trustwave SpiderLabs has exposed a fresh variant of info-stealer malware, named Rilide, that specifically aims at Chromium-based browsers. This strain is capable of stealing cryptocurrency assets and monitoring users' browsing actions.
icon

Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that's both sophisticated and fast.

icon

AlienFox Evolves to Target Variety of Cloud Services for Cryptomining

A threat actor group is using a comprehensive toolset named AlienFox to steal sensitive information such as API keys, authentication secrets, and credentials from cloud service providers and popular services. Adversaries are using security scanning platforms, such as LeakIX and SecurityTrails, to discover misconfigured servers with popular web frameworks.


                               GENERAL NEWS

 
 
icon

Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online

Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to provide more transparency and control over their data.

 

icon

Unapproved Apps Used By 32% of Remote Workers

Roughly one in three (32%) remote and hybrid workers use apps or software not approved by IT, and 92% of remote workers use a personal tablet or smartphone device to do work tasks.