OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script

30/07/2024 0 Comments 0 tags

Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a malicious PowerShell script. “This campaign heavily relies on social engineering

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

30/07/2024 0 Comments 0 tags

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

30/07/2024 0 Comments 0 tags

Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score:

How Searchable Encryption Changes the Data Security Game

29/07/2024 0 Comments 0 tags

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

29/07/2024 0 Comments 0 tags

An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint’s defenses to send millions of messages spoofing

‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread

29/07/2024 0 Comments 0 tags

A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting

Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site

29/07/2024 0 Comments 0 tags

The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as part of a drive-by download scheme targeting Chinese-speaking Windows users.

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

27/07/2024 0 Comments 0 tags

French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known malware called PlugX. The Paris Prosecutor’s Office, Parquet de Paris,

Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials

27/07/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with the goal of stealing users’ Google Cloud credentials from a

Offensive AI: The Sine Qua Non of Cybersecurity

26/07/2024 0 Comments 0 tags

“Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that the sharpest tools of peace are forged.” – Victor Hugo.