By security practitioners, for security practitioners novacoast federal | Apex Program | novacoast | about innovate
By security practitioners, for security practitioners

Weekly Top Ten Cybersecurity Stories – 6.24.2022

WEEKLY TOP TEN | JUNE 24, 2022 12:59 GMT

Our Threat Operations and Intelligence team compiles a daily digest of new cybersecurity threats from around the Internet. This top 10 has been culled from the 40+ unique stories we found relevant over the week, ranked by highest risk:

  1. Google Researchers Discover Years-Old Apple Safari Vulnerability in Active Exploitation
    https://thehackernews.com/2022/06/google-researchers-detail-5-year-old.html
  2. Cisco Announces It Won’t Patch End-of-Life Routers Affected By CVE-2022-20825
    https://securityaffairs.co/wordpress/132437/security/cisco-rce-small-business-rv-routers.html
  3. Researchers Discover Flaws in MEGA Cloud Storage Allowing Theft of Credentials and Malicious File Uploads
    https://thehackernews.com/2022/06/researchers-uncover-ways-to-break.html
  4. Threat Actors Abusing Azure Front Door (AFD) For Phishing Attacks
    https://securityaffairs.co/wordpress/132458/cyber-crime/azure-front-door-phishing.html
  5. Cyble Labs Discloses Risk of Using Misconfigured Network Management Tools
    https://blog.cyble.com/2022/06/16/misconfigured-tool-allows-hackers-insight-into-complete-it-networks/
  6. “DFSCoerce” NTLM Relay Attack Similar to PetitPotam Method Discovered
    https://securityaffairs.co/wordpress/132473/hacking/dfscoerce-attacks-windows-domains.html
  7. APTs Increasingly Use IoT, OT, Network Devices to Achieve Persistence
    https://www.darkreading.com/attacks-breaches/how-apts-are-achieving-persistence-through-iot-ot-and-network-devices
  8. .LNK File-based Malware Builders Are Growing in Popularity
    https://blog.cyble.com/2022/06/22/quantum-software-lnk-file-based-builders-growing-in-popularity/
  9. Researcher Creates Website Capable of Fingerprinting Google Chrome Users via Chrome Extensions
    https://www.bleepingcomputer.com/news/security/google-chrome-extensions-can-be-fingerprinted-to-track-you-online/
  10. Secureworks Researchers Note Chinese Threat Actor Using Ransomware As Cover for IP Theft
    https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader
Previous Post

Weekly Top Ten Cybersecurity Stories – 6.17.2022

Next Post

Weekly Top Ten Cybersecurity Stories – 7.1.2022

Innovate uses cookies to give you the best online experience. If you continue to use this site, you agree to the use of cookies. Please see our privacy policy for details.