

Trend Micro, the global leader in cybersecurity is bringing the cyber risk conversation to more than 120 cities around the world in their latest “Risk to Resilience World Tour” - The largest cybersecurity roadshow of its kind. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticipate and defend against even the most advanced attacks. ( Bleeping Computer) Thanks to this week’s episode sponsor, Trend MicroĬybersecurity is not just about protection, it’s about foresight, agility, and resilience. The company said they found the ransomware time bomb, which had been secretly planted a few years ago “greedy former contractor,” with an intention to extract exorbitant ransom from the company. On Saturday, Orqa started receiving reports from customers surprised to see their FPV.One V1 goggles enter bootloader mode and become unusable.
#Papercut ng code
Orqa, a maker of First Person View (FPV) drone racing goggles, claims that a contractor introduced code into its devices’ firmware that acted as a time bomb designed to brick them. ( The Register) Drone goggles maker claims firmware sabotaged to ‘brick’ devices
#Papercut ng software
The other two flaws placed on the CISA list this week involve versions of Oracle’s WebLogic Server software and the Apache Foundation’s Log4j Java logging library. Mirai malware rolls up infected Linux-based IoT devices into a botnet that can then be remotely controlled to perform large-scale network attacks, including DDoS assaults. Trend Micro’s Zero Day Initiative (ZDI) threat-hunting group stated in a report released last week that operators of the Mirai botnet were beginning to exploit the flaw primarily by attacking devices in Eastern Europe, though the campaign soon expanded beyond that region. ( The Hacker News) Mirai botnet loves exploiting unpatched TP-Link routers, CISA warnsĬISA is adding three more flaws to its list of known-exploited vulnerabilities, including one involving TP-Link routers that is being targeted by the operators of the notorious Mirai botnet.

VulnCheck has published a proof-of-concept exploit that sidesteps existing detection signatures by affecting the print management software’s “User/Group Sync” feature, which makes it possible to synchronize user and group information from Active Directory, LDAP, or a custom source. Tracked as CVE-2023-27350 (CVSS score: 9.8), the issue affects PaperCut MF and NG installations that could be exploited by an unauthenticated attacker to execute arbitrary code with SYSTEM privileges. ( Bleeping Computer) Researchers uncover new exploit for PaperCut vulnerability that can bypass detection A photo of the ransom note made it appear that the Royal ransomware operation conducted the attack. According to numerous sources, network printers on the City of Dallas’ network began printing out ransom notes that taunted the City over its choice of cybersecurity procedures. The City’s court system canceled all jury trials and jury duty from May 2nd into yesterday.
#Papercut ng Offline
The Dallas County Police Department’s website was also offline for part of the day due to the security incident but has since been restored. Local media reported that the City’s police communications and IT systems were shut down Monday morning due to a suspected ransomware attack, leading to 911 dispatchers having to write down received reports for officers rather than submit them via the computer-assisted dispatch system. The ninth largest city in the United States, with a population of approximately 2.6 million people, saw some of its IT systems shut down to prevent the attack’s spread. City of Dallas hit by Royal ransomware attack impacting IT services
