This week, we cover software-breaking updates, major security vulnerabilities including a Mediatek 0day, data breaches at Deloitte and Dell, cyber-espionage activities and Disney affected by Slack.
macOS Sequoia Update Breaking Security Tools
Links: Cybersecurity News Bleeping Computer
The recent macOS Sequoia update has caused significant issues for VPNs and antivirus tools, disrupting their networking capabilities. This break in security tools is leading to concerns over system vulnerabilities as users seek fixes.
Global InfoStealer Malware Operation Targets Crypto Users and Gamers
Link: Bleeping Computer
A global malware campaign is targeting cryptocurrency users and gamers. This operation uses info-stealers to obtain sensitive data, posing a threat to online transactions and digital assets.
0-Click Mediatek Vulnerability Exposes Phones to Wi-Fi Takeover
Links: Cybersecurity News Dark Reading
A zero-click remote code execution (RCE) vulnerability in Mediatek chips could allow attackers to take over devices via Wi-Fi. This critical flaw puts millions of smartphones at risk.
IntelBroker Exposes Deloitte Data
Link: Cybersecurity News
IntelBroker, a notorious data-leak group, has exposed sensitive data from Deloitte, one of the world’s largest professional services firms. The breach raises questions about the security of major consulting companies.
Dell Employee Data Leak Investigated After Hacker Claims
Links: Cybersecurity News Bleeping Computer
Dell is investigating claims of a data breach that allegedly exposed sensitive employee information. Hackers claim responsibility for leaking this data, sparking concerns over potential exploitation.
Disney to Stop Using Slack After Massive Data Breach
Links: Cybersecurity News Bleeping Computer
Following a massive data breach in July, Disney plans to discontinue using Slack as its primary communication platform, citing security concerns and vulnerabilities in the tool.
North Korean APT Bypasses DMARC in Email Espionage Attacks
Link: Dark Reading
A North Korean Advanced Persistent Threat (APT) group is bypassing DMARC email authentication protocols to conduct cyber espionage. These attacks are focused on gathering sensitive information via email-based intrusions.