Cyber Round-up
News

Cyber Round-up for 17th May

May 16, 2024

Cyber Round-up for 17th May

Welcome to Ironshare’s Cyber Round-up, where we look back at the events of that last week to cover some of the news, posts, views, and highlights from the world of Security.

In this week’s round-up:

Security News

Google Patches Third Actively Exploited Chrome Zero-Day in One Week

Google has released an emergency security update for Chrome to fix CVE-2024-4947, the third zero-day vulnerability exploited within a week. This high-severity flaw, caused by a type confusion in the V8 JavaScript engine, was reported by Kaspersky researchers and can lead to arbitrary code execution. This update follows the recent patches for CVE-2024-4671 and CVE-2024-4761, highlighting ongoing security challenges for Chrome. The update is available now for all users on Mac, Windows, and Linux; Microsoft is also working on a fix for Edge.  

By bleepingcomputer.com

Cybercriminals Exploit Fake DocuSign Templates to Steal Credentials

Cybercriminals are increasingly using fake DocuSign templates to carry out phishing attacks, targeting organizations to steal credentials and sensitive data. These scams exploit the familiarity and trust users have with DocuSign, an electronic signature service, by sending emails that appear to be legitimate DocuSign notifications. The emails often contain links to malicious websites designed to steal login credentials.

To protect against these scams, users should be cautious of unexpected DocuSign emails, verify the sender's email address, and avoid clicking on links directly from emails. Instead, they should access documents by logging into DocuSign's official website. Organizations should also invest in comprehensive security awareness training to educate their users, specifically on the threat of email phishing attacks.

By darkreading.com

Dell Data Breach Exposes Information of 49 Million Customers

Dell has reported a data breach affecting approximately 49 million customers. The breach involved the unauthorized access of customer names, physical addresses, and Dell order information, including details about purchased hardware, service tags, item descriptions, and warranty information. Notably, financial details, email addresses, and phone numbers were not compromised.

The breach was discovered after a threat actor attempted to sell the stolen data on a hacking forum and while Dell claims that the breach does not pose significant risks due to the nature of the data involved, cybersecurity experts warn that the exposed information could still be used for targeted attacks, such as phishing.

Dell is currently working with law enforcement and a third-party forensics firm to investigate the incident and has advised affected customers to be cautious of any suspicious communications that appear to be from Dell, particularly those requesting software installations or password changes.

More information on this breach can be found here.

By techcrunch.com

NCSC Offers Cyber Defence Service for High-Risk Groups Ahead of UK Election

The UK's National Cyber Security Centre (NCSC) has announced measures to support entities at high risk of cyberattacks ahead of the upcoming election. This includes providing tailored guidance and resources to political parties, candidates, and election administrators to bolster their cybersecurity defenses. The initiative aims to safeguard democratic processes from potential threats and ensure the integrity of the election. The NCSC emphasizes the importance of proactive measures and vigilance in the face of increasing cyber threats targeting the electoral system.

For more details, you can read the full article here.

By ncsc.gov.uk

Microsoft Patch Tuesday: May 2024

A total of 61 vulnerabilities were addressed by Microsoft this month, including: 1 critical, 2 publicly disclosed, and 2 actively exploited vulnerabilities. The only critical vulnerability to be patched this month targets Microsoft SharePoint Server and, if exploited successfully, allows an authenticated attacker with site owner permission to perform remote code execution.

For more details on this critical flaw, and other important fixes included in this release, we advise reading Ironshare’s round-up of Microsoft’s Patch Tuesday for May 2024.

Stay Safe, Secure and Healthy!

Edition #274 – 17th May 2024

Author

Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.

Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.

SUBSCRIBE

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi