A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.
Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
International Press – Newsletter
Cybercrime
Ransomware Attack on Oklahoma Medical Center Impacts 133,000
Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges
Ransomware gang Akira leaks unprecedented number of victims’ data in one day
Ford investigates alleged breach following customer data leak
Targeting the Cybercrime Supply Chain
Cyberattack Disrupts Systems of Gambling Giant IGT
Justice Department Seizes Cybercrime Website and Charges Its Administrators
Malware
Fake AI video generators infect Windows, macOS with infostealers
How Italy became an unexpected spyware hub
Babble Babble Babble Babble Babble Babble BabbleLoader
One Sock Fits All: The use and abuse of the NSOCKS botnet
StopRansomware: BianLian Data Extortion Group
Hacking
Threat Actors Hijack Misconfigured Servers for Live Sports Streaming
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Hacker Is Said to Have Gained Access to File With Damaging Testimony About Gaetz
Qualys TRU Uncovers Five Local Privilege Escalation Vulnerabilities in needrestart
The Dark Side of Trust: Authority Citation-Driven Jailbreak Attacks on Large Language Models
Intelligence and Information Warfare
T-Mobile Hacked in Massive Chinese Breach of Telecom Networks
Library of Congress emails hacked by ‘adversary’
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
DPRK IT Workers | A Network of Active Front Companies and Their Links to China
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
Cybersecurity
CISA Director Jen Easterly to depart on Inauguration Day
The Silent AI Leader Nobody is Talking About
The AI Illusion: Navigating the Reality of Machine Learning in Cybersecurity
Roles and Responsibilities Framework for Artificial Intelligence in Critical Infrastructure
CWE Top 25 Most Dangerous Software Weaknesses
Navigating cybersecurity investments in the time of NIS 2
Vulnerabilities in VPNs Paper presented at the Privacy Enhancing Technologies Symposium 2024
China’s Surveillance State Is Selling Citizen Data as a Side Hustle
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)