Also: DSLRoot Turns Homes Into Proxies, Cyberattack Disrupts Swedish Towns This week: TransUnion incident affects 4.5 million, DSLRoot residential proxies, Operation Serengeti 2.0, ZipLine campaign exploits contact forms, a cyberattack disrupts 200 Swedish municipalities, Maryland Transit Administration hit by ransomware, TAG-144 escalated attacks in South America.
US Cyber Defense Agency Deploys Support to Nevada Following Ransomware Incident The Cybersecurity and Infrastructure Security Agency and FBI are aiding Nevada after a cyberattack disabled state services, exposing how local governments - amid surging ransomware, IT shortfalls and federal funding cuts - are increasingly reliant on strained national cyber defense resources.
Buying Spanish Startup Brings Real-Time Data Pipeline Tech to Boost SOC Efficiency CrowdStrike announced plans to acquire Spanish startup Onum Technology for $290 million. The move brings advanced data pipeline tools into its Falcon platform, speeding up threat detection and consolidating SOC workflows for customers leaving legacy SIEMs.
AI Giants Evaluated Each Other's Newer Models for Safety Risks OpenAI and Anthropic evaluated each other's AI models in the summer, testing for concerning behaviors that could indicate misalignment risks. Both companies released their findings simultaneously: no model was severely problematic, but all showed plenty of troubling behavior in testing scenarios.
Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims.
A vulnerability, which was classified as critical, was found in Microsoft Exchange Server 2013 CU23/2016 CU17/2016 CU18/2019 CU6/2019 CU7. This affects an unknown part. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2020-17117. The attack can be executed remotely. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows. It has been declared as problematic. The affected element is an unknown function of the component GDI+. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2020-17098. The attack can only be performed from a local environment. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability marked as critical has been reported in Microsoft Excel up to 2019. Affected by this vulnerability is an unknown functionality. This manipulation causes Remote Code Execution.
This vulnerability is registered as CVE-2020-17123. Remote exploitation of the attack is possible. No exploit is available.
To fix this issue, it is recommended to deploy a patch.