16 DECEMBER 2024 WEEKLY NEWSLETTER

BOCRA website

     

NEWSLETTER

Join us on Slack

Follow us on Facebook


                                                     LATEST CYBER HACKS 
 
 
icon

Chinese hackers use Visual Studio Code tunnels for remote access

Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent remote access to compromised systems.
icon

Hackers find hole in Krispy Kreme Doughnuts' cyber-security

Doughnut chain Krispy Kreme says it has been hit by a cyberattack which has disrupted its online systems. Some customers in the US have been unable to make online orders as a result of the hack.
icon

Russian cyber spies hide behind other hackers to target Ukraine

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink.


                                                      VULNERABILITIES
 
 
icon

Critical Vulnerability in Apache Struts Allows Remote

Code Execution
 

Developers using the popular Apache Struts framework are urged to update their systems immediately following the discovery of a critical security flaw (CVE-2024-53677, CVSS 9.5) that could allow attackers to execute malicious code remotely.
icon

Dell Urges Immediate Update to Fix Critical Power Manager Vulnerability

A critical security flaw in Dell Power Manager has been discovered that could allow attackers to compromise your systems and execute arbitrary code.
icon

Top 10 Cyber Vulnerabilities Impacting Organizations in Botswana

The chart showcases the top 10 cyber vulnerabilities affecting organizations in Botswana, ranked by the number of unique IPs impacted, within the last 7 days.

                                     MALWARES
 
 
icon

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago.
icon

Lynx ransomware behind Electrica energy supplier cyberattack

The Romanian National Cybersecurity Directorate (DNSC) says the Lynx ransomware gang breached Electrica Group, one of the largest electricity suppliers in the country.
icon

Top 8 Malware Threats Targeting Organizations in Botswana

The chart showcases the top 8 Malware infections affecting organizations in Botswana, ranked by the number of unique IPs impacted, within the last 7 days.

                               GENERAL NEWS
 
 
icon

New stealthy Pumakit Linux rootkit malware spotted in the wild

A new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems.
icon

CISA confirms critical Cleo bug exploitation in ransomware attacks

CISA confirmed today that a critical security vulnerability in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited in ransomware attacks.This flaw (tracked as CVE-2024-50623 and impacting all versions before version 5.8.0.21) enables unauthenticated attackers to gain remote code execution on vulnerable servers exposed online.