Transcript
Claire Aird (0:04)
The EU launches its own vulnerability database A Turkish APT deploys a zero day in Iraq North Korea tasks an APT to Ukraine and Spain will probe cyber's role in last month's energy grid collapse. This is the risky bulletin prepared by Catalyn Kim Panu and read by me, Claire aird. Today is the 14th of May and this podcast episode is brought to you by Callight. The EU Cyber Security Agency has launched its own vulnerability database. The timing of the database, called the euvd, is unrelated to the funding issues with the American CVE program. The agency was tasked with establishing it in 2022. Spain's cybersecurity agency is assessing the cyber security practices of small and medium electricity providers. The inquiry is part of an investigation into the nationwide collapse of the country's power grid in late April, according to the Times, officials have yet to identify the cause and have not excluded a possible cyber attack. Russian authorities have arrested a military cadet for selling a hacking tool designed to access government networks. The tool allegedly allowed attackers to bypass security systems and access classified information on the Russian Ministry of Defence network. The cadet was a student at the A.F. mozhaisky Military Space Academy. He is accused of selling the tool on the Evito classified ads portal for $100. It detained by the FSB Last week, a Turkish cyber espionage group targeted Kurdish military members in Iraq by exploiting a zero day vulnerability in the output messenger. The attacks took place last year and the zero day was patched in December. Microsoft's security team attributed the operation to a group it tracks as marble dust. The group is also known as sea turtle and UNC1326. A North Korean APT is targeting the Ukrainian government to collect information about Russia's invasion. This is the first time the group is believed to have targeted the Ukrainian government. It's historically focused on Russia. The shift occurred in February, shortly after North Korea committed troops to assist Russia's invasion. The US army has deactivated its only information operations unit. The First Information Operations Command was established in 2002 and was responsible for providing providing information warfare capabilities and training. Its functions will be taken over by the Army Cyber Command. The order to shut down the centre was made in 2024 under the Biden administration. Fortinet has patched a zero day vulnerability that's been exploited in attacks against 40 voice phone systems. The zero day allows remote unauthenticated attackers to run malicious code using specially crafted web requests. Fortinet says 40 mail, 40 NDR, 40 recorder and 40 camera camera are also vulnerable to the same issue Ivanti has released a security Update to fix 20 days in its mobile device management platform EPMM. Attackers are chaining the vulnerabilities to bypass authentication and run malicious code. Avanti says the zero days are located in two open source libraries used by its software. It didn't name the libraries. Alabama state officials are investigating a security breach after suspicious network activity was detected last week. Officials said attackers obtained credentials for some state employees. A preliminary investigation suggests residents personal data appears safe A hacker has stolen customer data from Christian Dior's network in China. Stolen data included names, emails, phone numbers and home addresses. The French fashion house notified users last week and urged customers to watch for possible phishing emails. A citizen of Kosovo accused of running a cybercrime marketplace has been extradited to the US Don Masaritsa was arrested at the end of last year. He is accused of running BlackDB, an online marketplace for selling stolen credit card details and hacked service and accounts. If convicted, he faces up to 55 years in prison. The Dragon Force Ransomware Group has condemned the possible use of its ransomware in attacks on hospitals, critical infrastructure and Russian companies. In a forum post, the group said such attacks are against its rules. Similar attacks have contributed to the downfall of other major ransomware operations. The group's tools are being used in recent attacks against UK retailers. Telegram has shut down thousands of accounts that were used to launder proceeds from pig butchering operations. Crypto scammers use the accounts to launder more than $35 billion worth of cryptocurrency. Blockchain investigations firm Elliptic says some accounts were run by Cambodian company Huiwuan Guaranty. Others are run by Jinbei Guarantee, a similar operation for Chinese speaking scammers. The Huywu was sanctioned by the US this month. Scammers posing as DHS agents are contacting foreign students in the US and demanding payments to settle non existent immigration issues. The scammers threaten prosecution or deportation if fake legal fees aren't paid. Most victims are from the Middle East. Security researchers have found a new technique for CPU side channel attacks. The training solo variant of the Spectre attack bypasses existing mitigations including domain isolation protections. ARM and intel processors are vulnerable, including Intel's latest models. Eight vulnerabilities have been discovered in Nissan Leaf cars. Researchers from Hungarian security firm PC Automotive said the bugs allow control over the car's telematics, infotainment systems and the can bus. Attackers could control core vehicle features like steering and opening doors. They could also track vehicle locations and record occupants conversations and finally Microsoft will block users from taking screenshots during teams meetings. The Prevent Screen Capture feature will turn the screen black when a user tries to take a screenshot. It'll roll out for all platforms in July. And that is all for this podcast edition. Today's show was brought to you by our sponsor, Callight. Find them@callight.com thanks for your.
