Attackers Exploit Public .env Files to Breach Cloud and Social Media Accounts

16/08/2024 0 Comments 0 tags

A large-scale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable files (.env) that contain credentials associated with cloud and social media applications. “Multiple security

The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence?

16/08/2024 0 Comments 0 tags

SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these applications offer come with inherent security risks, often leaving hidden

New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems

16/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered new stealer malware that’s designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it’s offered for sale in the cybercrime underground for a steep price

Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk

16/08/2024 0 Comments 0 tags

A large percentage of Google’s own Pixel devices shipped globally since September 2017 included dormant software that could be used to stage nefarious attacks and deliver various kinds of malware.

SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software

15/08/2024 0 Comments 0 tags

SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances. The flaw, tracked

RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks

15/08/2024 0 Comments 0 tags

A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to terminate endpoint detection and response (EDR) software on compromised hosts, joining the

Identity Threat Detection and Response Solution Guide

15/08/2024 0 Comments 0 tags

The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response (ITDR) has emerged as a critical component to effectively detect and respond to identity-based attacks. Threat actors

Russian-Linked Hackers Target Eastern European NGOs and Media

15/08/2024 0 Comments 0 tags

Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations active in Eastern Europe have become the target of two separate spear-phishing campaigns orchestrated by threat actors whose

New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data

15/08/2024 0 Comments 0 tags

A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim to steal sensitive data. The attack campaign, detected by NSFOCUS

GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover

15/08/2024 0 Comments 0 tags

A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited to take over repositories and gain access to organizations’ cloud environments. “A combination of misconfigurations and