U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

17/10/2024 0 Comments 0 tags

Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record 35,000 DDoS attacks in a single year,

SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

17/10/2024 0 Comments 0 tags

An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

17/10/2024 0 Comments 0 tags

A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as

FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

16/10/2024 0 Comments 0 tags

The FIDO Alliance said it’s working to make passkeys and other credentials more easier to export across different providers and improve credential provider interoperability, as more than 12 billion online

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

16/10/2024 0 Comments 0 tags

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

16/10/2024 0 Comments 0 tags

The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT.

From Misuse to Abuse: AI Risks and Attacks

16/10/2024 0 Comments 0 tags

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs.

5 Techniques for Collecting Cyber Threat Intelligence

16/10/2024 0 Comments 0 tags

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

16/10/2024 0 Comments 0 tags

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. “The spear-phishing

CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

16/10/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing