Latest News Articles



--- TLP:WHITE ---

News

− Censys Finds Hundreds of Exposed Servers as Volt Typhoon APT Targets Service Providers

Amidst Volt Typhoon zero-day exploitation, Censys finds hundreds of exposed servers presenting ripe attack surface for attackers.

https://www.securityweek.com/censys-finds-hundreds-of-exposed-servers-as-volt-typhoon-apt-targets-isps-msps/

− I Spy With My Little Eye: Uncovering an Iranian Counterintelligence Operation

Today Mandiant is releasing details of a suspected Iran-nexus counterintelligence operation aimed at collecting data on Iranians and domestic threats who may be collaborating with intelligence and security agencies abroad, particularly in Israel.

https://cloud.google.com/blog/topics/threat-intelligence/uncovering-iranian-counterintelligence-operation

− SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments

A comprehensive guide authored by Dean Parsons, SANS Certified Instructor and CEO / Principal Consultant of ICS Defense Force, emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats.

https://thehackernews.com/2024/08/sans-institute-unveils-critical.html

− Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future's Insikt Group has linked the infrastructure to a hacking group it tracks as GreenCharlie, an Iran-nexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm.

https://www.recordedfuture.com/research/greencharlie-infrastructure-linked-us-political-campaign-targeting

Vulnerabilities

− Critical Google Chromium V8 Type Confusion Vulnerability

Type confusion in the V8 JavaScript and WebAssembly engine, impacting versions of Google Chromium prior to 128.0.6613.84, which allows a remote attacker to exploit heap corruption via a crafted HTML page (Chromium security severity: High). It has been observed under active exploitation in the wild.

https://www.ncsc.gov.ie/pdfs/2409020129_Google_Chromium_V8_Type_Confusion_Vulnerability.pdf

Community News

- QQI L6 2-Year Cyber Security Apprenticeship Information Session

The AMTCE Dundalk are hosting this September a free information session for industry members interested to understand more on the programme and processes to partake in advance of the next AMTCE iteration of the QQI L6 Cyber Security Apprenticeship Programme this Autumn.

https://cyberireland.ie/ci-event/qqi-l6-cyber-security-apprenticeship-10th-september/

--- TLP:WHITE ---