Content Paint

Vault 33: Cyber News - Intel - Research

Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.

Intel  | Jan 17, 2025
/
FBI Informant Communications Compromised: AT&T Breach Reveals Expanded Damage
Intel  | Jan 16, 2025
/
Scammers Target California Wildfire Victims by Posing as Relief Services
Intel  | Jan 16, 2025
/
Critical UEFI Secure Boot Flaw Exposes Systems to Malicious Bootkit Attacks
Intel  | Jan 16, 2025
/
Misconfigured SPF DNS Records Enable MikroTik Botnet to Spread Malware
Intel  | Jan 15, 2025
/
FBI Employs Malware's 'Self-Delete' Tactic to Remove Chinese PlugX from U.S. Systems
News  | Jan 15, 2025
/
CISA Releases Guidance on Enhanced Microsoft Logging Features

Read Our Latest Posts

Latest Posts

158 Posts
FBI Informant Communications Compromised: AT&T Breach Reveals Expanded Damage

A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for

Scammers Target California Wildfire Victims by Posing as Relief Services

The continuing devastation of the California wildfires has given rise to another threat—cybercriminals seeking to exploit the disaster. These malicious actors are leveraging the chaos, using sophisticated phishing tactics to deceive those impacted by the fires. New Domains Mimic Legitimate Services Researchers at Veriti have discovered a proliferation of

Critical UEFI Secure Boot Flaw Exposes Systems to Malicious Bootkit Attacks

A recently corrected vulnerability has come to light, highlighting a flaw in the Secure Boot mechanism of Unified Extensible Firmware Interface (UEFI) systems. This issue, tracked as CVE-2024-7344 with a CVSS score of 6.7, involves an application signed with Microsoft's third-party UEFI certificate from 2011, as reported

Misconfigured SPF DNS Records Enable MikroTik Botnet to Spread Malware

A sophisticated botnet comprising 13,000 MikroTik devices is leveraging domain name system (DNS) misconfigurations to circumvent email security measures and disseminate malware. The perpetrators exploit weaknesses in the Sender Policy Framework (SPF) of roughly 20,000 web domains to achieve this. Exploiting SPF Misconfiguration Security experts at Infoblox have

FBI Employs Malware's 'Self-Delete' Tactic to Remove Chinese PlugX from U.S. Systems

FBI Neutralizes PlugX Malware Using Its Own Self-Destruct Feature In an unprecedented collaboration, the FBI and French law enforcement have successfully removed the PlugX malware from over 4,200 computers in the United States. Leveraging the malware’s innate self-delete mechanism, authorities dismantled this notorious China-linked remote access trojan (RAT)

CISA Releases Guidance on Enhanced Microsoft Logging Features

CISA Issues Guidance on Microsoft’s Enhanced Logging Features The Cybersecurity and Infrastructure Security Agency (CISA) has released new guidance for government and business users on leveraging expanded logging capabilities within Microsoft 365. These enhancements are designed to improve forensic and compliance investigations. Enhanced Logging Capabilities Microsoft has introduced advanced

Over 660,000 Rsync Servers at Risk: Code Execution Vulnerabilities Uncovered

New Rsync Vulnerabilities Threaten Over 660,000 Exposed Servers A series of newly identified vulnerabilities have left more than 660,000 Rsync servers at risk of remote code execution attacks, including a critical heap-buffer overflow flaw. This open-source utility, known for its efficient file synchronization and data transfer capabilities, is

Codefinger Ransomware Targets AWS to Encrypt S3 Buckets in Latest Attack

The Halcyon RISE Team has discovered a sophisticated ransomware campaign by a threat actor known as "Codefinger." This new attack targets Amazon S3 buckets, utilizing AWS’s Server-Side Encryption with Customer-Provided Keys (SSE-C) to lock data and demand ransom for the decryption keys. Attack Mechanism: The campaign leverages

Fortinet warns of auth bypass zero-day exploited to hijack firewalls

A newly discovered zero-day vulnerability in FortiOS and FortiProxy systems is being actively exploited by cybercriminals to compromise Fortinet firewalls, posing a severe risk to enterprise network security. Vulnerability Details and Exploitation Type of Vulnerability: Authentication Bypass Affected Products: FortiOS and FortiProxy Impact: Unauthorized access and potential control hijacking of

Browse by Tags

3 Tags
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.