Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

05/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and SmartScreen that could enable threat actors to gain initial access to target environments without raising any warnings.

Enhancing Incident Response Readiness with Wazuh

05/08/2024 0 Comments 0 tags

Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection, comprehensive data collection, and coordinated actions to

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

05/08/2024 0 Comments 0 tags

A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw,

China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates

05/08/2024 0 Comments 0 tags

The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software updates to target companies in mid-2023, highlighting a new level of

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

05/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information. “BlankBot features a range of malicious capabilities, which include

DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

03/08/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform TikTok for “flagrantly violating” children’s privacy laws in the country.

Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

03/08/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter Notebooks. The activity, codenamed Panamorfi by cloud security firm Aqua, utilizes a Java-based tool

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

02/08/2024 0 Comments 0 tags

A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing lure to deliver a modular Windows backdoor called HeadLace. “The

APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack

02/08/2024 0 Comments 0 tags

A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties to China, according to new findings from Cisco Talos. The

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication

02/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS) as a command-and-control (C2) mechanism. The newly identified malware strain