In today’s episode, we delve into how AI-enhanced software Meliorator was used to spread Russian disinformation on X (formerly Twitter), as detailed by the US Justice Department (DoJ). We also discuss the ViperSoftX malware disguising as eBooks on torrents, uncovered by Trellix security researchers, and examine how the new EstateRansomware group exploited a Veeam Backup Software vulnerability to launch attacks. Lastly, we cover Check Point and Morphisec’s findings on zero-day vulnerabilities CVE-2024-38112 and CVE-2024-38021, and the urgency of applying Microsoft’s recent patches.
Video Episode: https://youtu.be/ZeL8oo0HRBY
Original URLs:
- https://www.helpnetsecurity.com/2024/07/10/russian-disinformation-x/
- https://thehackernews.com/2024/07/vipersoftx-malware-disguises-as-ebooks.html
- https://thehackernews.com/2024/07/new-ransomware-group-exploiting-veeam.html
- https://www.helpnetsecurity.com/2024/07/10/cve-2024-38112-cve-2024-38021/
Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com
Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/
Logo Design by https://www.zackgraber.com/
Tags: Russian disinformation, AI-enhanced software, Meliorator, social media bot farms, US Justice Department, domain seizure, digital army, fake personas, propaganda, ViperSoftX, malware, eBooks, torrent sites, Common Language Runtime, AutoIt, PowerShell commands, EstateRansomware, Veeam Backup & Replication, FortiGate firewall, vulnerability, ransomware attack, Check Point Research, Windows, CVE-2024-38112, Microsoft, patch, remote code execution, deceptive .url files, cyber threats.
Search Phrases:
- Russian disinformation bot farms
- AI-enhanced software in social media
- How Meliorator spreads fake news
- Protect against ViperSoftX malware
- Ransomware exploiting Veeam vulnerability
- FortiGate firewall security flaw
- Latest cyber threats Check Point Research
- CVE-2024-38112 vulnerability details
- Microsoft’s latest security patch
- Prevent remote code execution attacks
Leave a Reply