The Information Highway

The Information Highway

all things technology risk and cybersecurity

LA County Health Services: Patients' data exposed in phishing attack

Hospital_cyber_attack

The Los Angeles County Department of Health Services disclosed a data breach after thousands of patients' personal and health information was exposed in a data breach resulting from a recent phishing attack impacting over two dozen employees.

Continue reading
  91 Hits

Reddit down in major outage blocking access to web, mobile apps

Reddit-outage

Reddit is investigating a major outage blocking users worldwide from accessing the social network's websites and mobile apps.

Continue reading
  81 Hits

WP Automatic WordPress plugin hit by millions of SQL injection attacks

back

Hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts with administrative privileges and to plant backdoors for long-term access.

Continue reading
  102 Hits

UnitedHealth confirms it paid ransomware gang to stop data leak

United--Healthcare

The UnitedHealth Group has confirmed that it paid a ransom to cybercriminals to protect sensitive data stolen during the Optum ransomware attack in late February.

Continue reading
  115 Hits

Malware dev lures child exploiters into honeytrap to extort them

hacker-arms-raised-brighter

You rarely root for a cybercriminal, but a new malware campaign targeting child exploiters doesn't make you feel bad for the victims.

Continue reading
  162 Hits

Critical Forminator plugin flaw impacts over 300k WordPress sites

back-2

The Forminator WordPress plugin used in over 500,000 sites is vulnerable to a flaw that allows malicious actors to perform unrestricted file uploads to the server.


Continue reading
  116 Hits

GitHub comments abused to push malware via Microsoft repo URLs

GitHub-headpic

A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with a Microsoft repository, making the files appear trustworthy.

Continue reading
  161 Hits

CrushFTP warns users to patch exploited zero-day “immediately”

CrushFTP_headpic

CrushFTP warned customers today in a private memo of an actively exploited zero-day vulnerability fixed in new versions released today, urging them to patch their servers immediately.

Continue reading
  142 Hits

HelloKitty ransomware rebrands, releases CD Projekt and Cisco data

HelloKitty

An operator of the HelloKitty ransomware operation announced they changed the name to 'HelloGookie,' releasing passwords for previously leaked CD Projekt source code, Cisco network information, and decryption keys from old attacks.

Continue reading
  146 Hits

MITRE says state hackers breached its network via Ivanti zero-days

MITRE

The MITRE Corporation says that a state-backed hacking group breached its systems in January 2024 by chaining two Ivanti VPN zero-days.

Continue reading
  164 Hits

22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks

palo-alto-networks

Approximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024-3400 flaw, a critical command injection vulnerability that has been actively exploited in attacks since at least March 26, 2024.

Continue reading
  146 Hits

Frontier Communications shuts down systems after cyberattack

Frontier

American telecom provider Frontier Communications is restoring systems after a cybercrime group breached some of its IT systems in a recent cyberattack.

Continue reading
  137 Hits

Active exploit of Atlassian Confluence

Threat-Advisory-Banne2r

Threat update

This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create administrator accounts, granting them complete control over affected systems.

Continue reading
  169 Hits

LayerSlider SQL injection vulnerability

Threat-Advisory-Banne2r

Threat update

An unauthenticated Structured Query Language (SQL) injection vulnerability, known as CVE-2024-2879, has been found in the WordPress plugin LayerSlider.

Continue reading
  121 Hits

Roku warns 576,000 accounts hacked in new credential stuffing attacks

Roku

Roku warns that 576,000 accounts were hacked in new credential stuffing attacks after disclosing another incident that compromised 15,000 accounts in early March.

Continue reading
  194 Hits

Palo Alto Networks warns of PAN-OS firewall zero-day used in attacks

Palo_Alto_Networks

Today, Palo Alto Networks warns that an unpatched critical command injection vulnerability in its PAN-OS firewall is being actively exploited in attacks.

Continue reading
  219 Hits

LastPass: Hackers targeted employee in failed deepfake CEO call

LastPass-headpi_20240413-224058_1

LastPass revealed this week that threat actors targeted one of its employees in a voice phishing attack, using deepfake audio to impersonate Karim Toubba, the company's Chief Executive Officer.

Continue reading
  204 Hits

Palo Alto Networks zero-day exploited since March to backdoor firewalls

Hacker_datacenter_servers

Suspected state-sponsored hackers have been exploiting a zero-day vulnerability in Palo Alto Networks firewalls tracked as CVE-2024-3400 since March 26, using the compromised devices to breach internal networks, steal data and credentials.

Continue reading
  133 Hits

Critical flaws in Ivanti

Threat-Advisory-Banner

Threat update

Recent flaws found in Ivanti Connect Secure and Policy Secure Gateways can lead to remote code execution (RCE) attacks. Review this Cybersecurity Threat Advisory to learn additional details and recommendations to keep your organization secure. 

Continue reading
  182 Hits

D-Link NAS vulnerabilities

Threat-Advisory-Banner

Threat update

Two vulnerabilities were found in legacy D-Link products that have reached end-of-life (EoL) status. The vulnerabilities can cause command injection and backdoor account to these devices. This Cybersecurity Threat Advisory discusses the impact of the threat, as well as recommendations to mitigate risks these vulnerabilities may cause.

Continue reading
  136 Hits