THN Cybersecurity Recap: Oct 14 Top Threats, Tools & News

SeniorTechInfo
8 Min Read

Oct 21, 2024Mohit KumarCybersecurity / Weekly Recap

THN Cybersecurity Recap: Oct 14 Top Threats, Tools & News

Hi there! Here’s your quick update on the latest in cybersecurity.

Hackers are constantly evolving their tactics to breach supposedly secure systems, resembling finding hidden doors in locked houses. Fortunately, security experts are innovating smarter tools to combat these threats and safeguard data.

Recent cyber attacks targeted some major corporations, underscoring the ongoing battle between hackers and cybersecurity professionals. Maintaining up-to-date devices and software is key to staying protected in this digital landscape.

In this newsletter, we’ll delve into the top cybersecurity stories of the week. Whether you’re safeguarding personal data or managing security for a business, we have valuable tips to enhance your security posture.

Let’s dive in!

⚡ Threat of the Week

China Calls Volt Typhoon an Invention of the U.S.: China’s National Computer Virus Emergency Response Center (CVERC) has labeled the threat actor known as Volt Typhoon as a creation of U.S. intelligence agencies and their allies. Accusations include the U.S. engaging in false flag operations to cover up their own cyber attacks and establishing a large-scale global internet surveillance network.

‎️‍Trending CVEs

CVE-2024-38178, CVE-2024-9486, CVE-2024-44133, CVE-2024-9487, CVE-2024-28987, CVE-2024-8963, CVE-2024-40711, CVE-2024-30088, CVE-2024-9164

🔔 Top News

  • Apple macOS Flaw Bypasses Privacy Controls in Safari Browser: Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency, Consent, and Control (TCC) framework in macOS that could be abused to get around a user’s privacy preferences and access data. There is some evidence that the vulnerability, tracked as CVE-2024-44133, may have been exploited by AdLoad adware campaigns. The issue has been addressed in macOS Sequoia 15 released last month.
  • Legitimate Red Team Tool Abuse in Real-World Attacks: Threat actors are attempting to weaponize the open-source EDRSilencer tool as part of efforts to interfere with endpoint detection and response (EDR) solutions and hide malicious activity. In doing so, the aim is to render EDR software ineffective and make it a lot more challenging to identify and remove malware.
  • TrickMo Can Now Steal Android PINs: Researchers have spotted new variants of the TrickMo Android banking trojan that incorporate features to steal a device’s unlock pattern or PIN by presenting to victims’ a bogus web page that mimics the device’s actual unlock screen.

📰 Around the Cyber World

  • Apple Releases Draft Ballot to Shorten Certificate Lifespan to 45 Days: Apple has published a draft ballot that proposes to incrementally phase the lifespan of public SSL/TLS certificates from 398 days to 45 days between now and 2027. Google previously announced a similar roadmap of its intention to reduce the maximum validity for public SSL/TLS certificates from 398 days to 90 days.
  • 87,000+ Internet-Facing Fortinet Devices Vulnerable to CVE-2024-23113: About 87,390 Fortinet IP addresses are still likely susceptible to a critical code execution flaw (CVE-2024-23113, CVSS score: 9.8), which was recently added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog. watchTowr Labs researcher Aliz Hammond described it as a “super complex vulnerability” that could result in remote code execution. The development comes as Google revealed that of the 138 exploited security vulnerabilities that were disclosed in 2023, 97 of them (70%) were first weaponized as zero-days. The time-to-exploit (TTE) has dropped from an average of 63 days in 2018-19 to just five days in 2023.
  • Researchers Outline Early Cascade Injection: Researchers have disclosed a novel-yet-stealthy process injection technique called Early Cascade Injection that makes it possible to evade detection by endpoint security software. “This new Early Cascade Injection technique targets the user-mode part of process creation and combines elements of the well-known Early Bird APC Injection technique with the recently published EDR-Preloading technique,” Outflank researcher Guido Miggelenbrink said. “Unlike Early Bird APC Injection, this new technique avoids queuing cross-process Asynchronous Procedure Calls (APCs), while having minimal remote process interaction.”

Cybersecurity Resources & Insights

LIVE Webinars

1. DSPM Decoded: Learn How Global-e Transformed Their Data Defense: Are your data defenses crumbling? Discover how Data Security Posture Management (DSPM) became Global-e’s secret weapon. In this can’t-miss webinar, Global-e’s CISO breaks down:

  • The exact steps that transformed their data security overnight
  • Insider tricks to implement DSPM with minimal disruption
  • The roadmap that slashed security incidents by 70%

2. Identity Theft 2.0: Defending Against LUCR-3’s Advanced Attacks: LUCR-3 is picking locks to your digital kingdom. Is your crown jewel data already in their crosshairs?

Join Ian Ahl, Mandiant’s former threat-hunting mastermind, as he:

  • Decrypts LUCR-3’s shadowy tactics that breach 9 out of 10 targets
  • Unveils the Achilles’ heel in your cloud defenses you never knew existed
  • Arms you with the counterpunch that leaves LUCR-3 reeling

This isn’t a webinar. It’s your war room strategy session against the internet’s most elusive threat. Seats are filling fast – enlist now or risk becoming LUCR-3’s next trophy.

Cybersecurity Tools

  • Vulnhuntr: AI-Powered Open-Source Bug Hunting Tool — What if AI could find vulnerabilities BEFORE hackers? Vulnhuntr uses advanced AI models to find complex security flaws in Python code. In just hours, it uncovered multiple 0-day vulnerabilities in major open-source projects.

Tip of the Week

Secure Your Accounts with Hardware Security Key: For advanced protection, hardware security keys like YubiKey are a game-changer. But here’s how to take it up a notch: pair two keys—one for daily use and a backup stored securely offline. This ensures you’re never locked out, even if one key is lost. Also, enable “FIDO2/WebAuthn” protocols when setting up your keys—these prevent phishing by ensuring your key only works with legitimate websites. For businesses, hardware keys can streamline security with centralized management, letting you assign, track, and revoke access across your team in real-time. It’s security that’s physical, smart, and almost foolproof.

Conclusion

That’s the roundup for this week’s cybersecurity news. Take a moment to review your security practices and make any necessary adjustments. Remember, cybersecurity is a collective responsibility. Join us next week for more insights and tips to keep you ahead of the curve.

Stay alert, and we’ll be back next Monday!

Enjoyed this article? Connect with us on Twitter and LinkedIn for more exclusive content.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *