Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

30/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from

Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

30/08/2024 0 Comments 0 tags

Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future’s Insikt Group has

Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

30/08/2024 0 Comments 0 tags

The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

30/08/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself as Palo Alto Networks GlobalProtect virtual private network (VPN) tool.

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

30/08/2024 0 Comments 0 tags

Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. “The attacks involve

New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads

30/08/2024 0 Comments 0 tags

Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. “The attackers managed

SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments

30/08/2024 0 Comments 0 tags

A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50% increase in ransomware

North Korean Hackers Target Developers with Malicious npm Packages

30/08/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating “coordinated and relentless” efforts to target developers with malware

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

29/08/2024 0 Comments 0 tags

Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to infect mobile users with information-stealing malware. “These campaigns delivered n-day

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

29/08/2024 0 Comments 0 tags

A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of malware on compromised hosts. Cybersecurity company Huntress attributed the activity