Patch now! Citrix Sharefile joins the list of actively exploited file sharing software

Categories: Exploits and vulnerabilities

Categories: News

Tags: Citrix

Tags: ShareFile

Tags: CVE-2023-24489

Tags: RCE

Tags: unauthenticated

Tags: vulnerability

Tags: PoC

Citrix ShareFile can be exploited remotely by unauthenticated attackers.

(Read more…)

The post Patch now! Citrix Sharefile joins the list of actively exploited file sharing software appeared first on Malwarebytes Labs.

Read more

Exchange Server security updates updated

Categories: Exploits and vulnerabilities

Categories: News

Tags: Exchange

Tags: CVE-2023-21709

Tags: August update

Tags: re-release

Microsoft Exchange Server administrators may have to install a re-released security patch

(Read more…)

The post Exchange Server security updates updated appeared first on Malwarebytes Labs.

Read more

Mallox Ransomware Strikes Unsecured MSSQL Servers

Credit to Author: Vaibhav Billade| Date: Fri, 18 Aug 2023 10:27:55 +0000

Introduction: First observed in the middle of 2021, ‘Mallox’ Ransomware has emerged as a formidable threat in the…

The post Mallox Ransomware Strikes Unsecured MSSQL Servers appeared first on Quick Heal Blog.

Read more

DarkRace Ransomware: A Deep Dive into its Techniques and Impact

Credit to Author: Vaibhav Billade| Date: Fri, 18 Aug 2023 10:27:23 +0000

As cyber threats continue to evolve, a new ransomware has been discovered bearing unmistakable similarities to another well-known…

The post DarkRace Ransomware: A Deep Dive into its Techniques and Impact appeared first on Quick Heal Blog.

Read more

Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams

Categories: Threat Intelligence

Tags: tech support scams

Tags: fingerprinting

Tags: steganography

This tech support scam is one of the most long running and covert ones we have ever seen.

(Read more…)

The post Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams appeared first on Malwarebytes Labs.

Read more

Citrix NetScalers backdoored in widespread exploitation campaign

Categories: Exploits and vulnerabilities

Categories: News

Tags: Citrix

Tags: NetScalers

Tags: Germany

Tags: CVE-2023-3519

Tags: Fox-IT

Tags: DIVD

Researchers have found almost 2000 backdoored Citrix NetScalers, many of which were patched after the backdoor in the form of a web shell was dropped.

(Read more…)

The post Citrix NetScalers backdoored in widespread exploitation campaign appeared first on Malwarebytes Labs.

Read more

Karma Catches Up to Global Phishing Service 16Shop

Credit to Author: BrianKrebs| Date: Thu, 17 Aug 2023 19:58:56 +0000

You’ve probably never heard of “16Shop,” but there’s a good chance someone using it has tried to phish you. Last week, the international police organization INTERPOL said it had shuttered the notorious 16Shop, a popular phishing-as-a-service platform launched in 2017 that made it simple for even complete novices to conduct complex and convincing phishing scams. INTERPOL said authorities in Indonesia arrested the 21-year-old proprietor and one of his alleged facilitators, and that a third suspect was apprehended in Japan.

Read more

Zoom goes for a blatant genAI data grab; enterprises, beware (updated)

Credit to Author: eschuman@thecontentfirm.com| Date: Thu, 17 Aug 2023 07:06:00 -0700

When Zoom amended its terms of service earlier this month — a bid to make executives comfortable that it wouldn’t use Zoom data to train generative AI models — it quickly stirred up a hornet’s nest. So the company “revised” the terms of service, and left in place ways it can still get full access to user data.

Computerworld repeatedly reached out to Zoom without success to clarify what the changes really mean.

Editor’s note: Shortly after this column was published, Zoom again changed its terms and conditions. We’ve added an update to the end of the story covering the latest changes.

Before I delve into the legalese — and Zoom’s weasel words to falsely suggest it was not doing what it obviously was doing — let me raise a more critical question: Is there anyone in the video-call business not doing this? Microsoft? Google? Those are two firms that never met a dataset that they didn’t love.

To read this article in full, please click here

Read more

China hacks the US military and government — the Feds blame Microsoft

Hidden in the basic infrastructure that runs the US military is a powerful piece of Windows-borne Chinese malware that can disrupt the communications systems, power grids, and water supplies at the military’s bases around the world. One US congressional aide calls it a “ticking time bomb” that as The New York Times put it, “could give China the power to interrupt or slow American military deployments or resupply operations by cutting off power, water and communications to US military bases.”

To read this article in full, please click here

Read more