APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor

27/11/2024 0 Comments 0 tags

The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor.

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

27/11/2024 0 Comments 0 tags

An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 malicious infrastructures and networks as part of a coordinated effort

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

27/11/2024 0 Comments 0 tags

A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

26/11/2024 0 Comments 0 tags

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

26/11/2024 0 Comments 0 tags

The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies.  Trend Micro,

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

26/11/2024 0 Comments 0 tags

The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in Microsoft Windows, as part

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

26/11/2024 0 Comments 0 tags

When CVEs go viral, separating critical vulnerabilities from the noise is essential to protecting your organization. That’s why Intruder, a leader in attack surface management, built Intel – a free

CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks

26/11/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot

25/11/2024 0 Comments 0 tags

The administrators of the Python Package Index (PyPI) repository have quarantined the package “aiocpa” following a new update that included malicious code to exfiltrate private keys via Telegram. The package

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration

25/11/2024 0 Comments 0 tags

Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s