At a glance.
- Atlassian patches Confluence critical vulnerability.
- LockBit claims to have hit Mandiant, but their claim looks baseless.
- Effects of ransomware on businesses.
- Update on the cyber phases of a hybrid war: DDoS as a weapon.
- US officials continue to rate the threat of Russian cyberattack as high.
- Joint CISA/FBI warning of Chinese cyberespionage.
- Phishing for cryptocurrency.
- FakeCrack delivers a malicious payload to the unwary.
- Vacations are back. So is travel-themed phishbait.
- Emotet returns, in the company of some old familiar criminal collaborators.
- Another hacked broadcast, this time a Russian news program.
- Hunting forward as an exercise in threat intelligence collection and sharing.
- "Unpatchable" vulnerability in Apple chips reported.
- SentinelOne finds a Chinese APT that's been operating, quietly, for a decade.
- US NSA, FBI warn of nation-state cyber threats.
- Vice Society claims responsibility for Palermo cyberattack.
Atlassian patches Confluence critical vulnerability.
As promised, Atlassian released a patch for Confluence vulnerabilities last Friday. Atlassian's tools are widely used. The Record estimates that more than 200,000 enterprises use the company's products. The US Cybersecurity and Infrastructure Security Agency (CISA), which had on Thursday required all the US Federal agencies whose security it oversees to immediately mitigate the risk of compromise via the vulnerability by disconnecting affected versions of Confluence from the Internet, on Friday updated its direction: "per BOD 22-01 Catalog of Known Exploited Vulnerabilities, federal agencies are required to immediately block all internet traffic to and from Atlassian’s Confluence Server and Data Center products AND either apply the software update to all affected instances OR remove the affected products by 5 pm ET on Monday, June 6, 2022."