Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

23/01/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer. “The campaign is global, with Netskope Threat

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

23/01/2025 0 Comments 0 tags

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices’ firmware as well as misconfigured security features. “These

QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features

23/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat actors linked to the infamous QakBot loader. “BackConnect is a common feature or

New Research: The State of Web Exposure 2025

23/01/2025 0 Comments 0 tags

Are your websites leaking sensitive data? New research reveals that 45% of third-party apps access user info without proper authorization, and 53% of risk exposures in Retail are due to

SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

23/01/2025 0 Comments 0 tags

SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access (SMA) 1000 Series appliances that it said has been likely exploited in the wild as a

How to Eliminate Identity-Based Threats

23/01/2025 0 Comments 0 tags

Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80% of enterprise breaches[1],[2]. While identity-based attacks continue to dominate as

Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

23/01/2025 0 Comments 0 tags

Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit a remote, authenticated attacker to gain administrator privileges on susceptible instances. The vulnerability,

TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

23/01/2025 0 Comments 0 tags

Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and on-premise ransomware attacks. “This actor engaged in

Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

22/01/2025 0 Comments 0 tags

The new Trump administration has terminated all memberships of advisory committees that report to the Department of Homeland Security (DHS).  “In alignment with the Department of Homeland Security’s (DHS) commitment

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet

22/01/2025 0 Comments 0 tags

Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks.