April 27, 2024

    Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings . This review is for the week ending Saturday, February 25th, 2023.

    1. ChatGPT getting used in Phishing Campaigns

    Researchers have warned of new Windows and Android phishing campaigns using ChatGPT to trick users into unwittingly downloading malware and handing over their credit card details. Several of the phishing sites are being spread by a fake social media page spoofed in the name of ChatGPT developer OpenAI that tries to build credibility by including a mix of content, such as videos and other unrelated posts.

    2. CVSS Scoring System Need an Revamp

    Researchers produced a detailed research report stating the weaknesses in the existing CVSS scoring system that is deemed to be responsible for overhyping some vulnerabilities.

    Advertisements

    3.Microsoft Automatic Attack Disruption in Defender 365

    Microsoft has came with an announcement that it’s automatic attack disruption capabilities in Microsoft 365 Defender, Its enterprise defense suite will now help organizations disrupt business email compromise and human-operated ransomware attacks. The signals on which Microsoft 365 Defender takes automated disruption actions are gathered from endpoints, identities, email, collaboration, and SaaS apps. They are then aggregated and automatically analyzed, and if a high level of confidence is established so they acted upon it.

    SUBSCRIBE TO OUR BLOG TODAY !

    We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day.

    4. RailYatri Suffers a Data Breach – PII leaked online

    RailYatri has suffered a massive data breach that has exposed the PII of over 31 million (31,062,673) users. The breach is believed to have occurred in late December 2022, with the database of sensitive information now being leaked online on Breachforums. The compromised data includes email addresses, full names, genders, phone numbers, and locations, which could put millions of users at risk of identity theft, phishing attacks, and other cyber crimes.

    5. Google fixes Critical Bug in Chrome 110

    Google patched a critical user after free RCE bug in its Chrome web browser that allows an attacker to install malware on a victim’s system simply by tricking them to visit a malicious site. In addition to that also patched six high-severity bugs, one of them close to a year old.

    Advertisements

    6. Frebniis Malware Targets Microsoft IIS

    Researchers have discovered a new malware that leverages a legitimate feature of Microsoft’s Internet Information Services (IIS) to install a backdoor in targeted systems. The malware, dubbed Frebniis, was used against targets in Taiwan.The technique used by Frebniis involves injecting malicious code into the memory of a DLL file related to an IIS feature used to troubleshoot and analyze failed web page requests.

    7. Telus suffers a possible Data Breach

    Canada’s largest telecommunications provider, Telus, is reportedly investigating a potentially major breach of its systems after a threat actor posted samples online. The leaked data includes a sample of employee payroll records, source code from the telecom firm’s private GitHub repositories, and other information.

    8. CISA KEV Catalog Update -Part IV -February 2023

    The US CISA has added another set of actively exploited flaws to its Known Exploited Vulnerabilities Catalog that includes CVE-2022-47986, CVE-2022-41223, CVE-2022-40765

    This brings end of this week in review security coverage. Thanks for visiting TheCyberThrone. If you like us please follow us on FacebookTwitterInstagram

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Discover more from TheCyberThrone

    Subscribe now to keep reading and get access to the full archive.

    Continue reading