Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

24/10/2024 0 Comments 0 tags

The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google Chrome to seize control of infected devices.

Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

24/10/2024 0 Comments 0 tags

Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE-2024-47575 (CVSS score: 9.8), the vulnerability is also

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

23/10/2024 0 Comments 0 tags

New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that the malicious software is continuing to

CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

23/10/2024 0 Comments 0 tags

A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday, citing evidence of

Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

23/10/2024 0 Comments 0 tags

Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake to name a few. Organizations are starting to realize that a shake-up

Ransomware Gangs Use LockBit’s Fame to Intimidate Victims in Latest Attacks

23/10/2024 0 Comments 0 tags

Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

23/10/2024 0 Comments 0 tags

It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no

Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models

23/10/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

22/10/2024 0 Comments 0 tags

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

22/10/2024 0 Comments 0 tags

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the