Smash-and-Grab Extortion

10/07/2024 0 Comments 0 tags

The Problem The “2024 Attack Intelligence Report” from the staff at Rapid7 [1] is a well-researched, well-written report that is worthy of careful study. Some key takeaways are:  53% of

Google Adds Passkeys to Advanced Protection Program for High-Risk Users

10/07/2024 0 Comments 0 tags

Google on Wednesday announced that it’s making available passkeys for high-risk users to enroll in its Advanced Protection Program (APP). “Users traditionally needed a physical security key for APP —

ViperSoftX Malware Disguises as eBooks on Torrents to Spread Stealthy Attacks

10/07/2024 0 Comments 0 tags

The sophisticated malware known as ViperSoftX has been observed being distributed as eBooks over torrents. “A notable aspect of the current variant of ViperSoftX is that it uses the Common

Crypto Analysts Expose HuiOne Guarantee’s $11 Billion Cybercrime Transactions

10/07/2024 0 Comments 0 tags

Cryptocurrency analysts have shed light on an online marketplace called HuiOne Guarantee that’s widely used by cybercriminals in Southeast Asia, particularly those linked to pig butchering scams. “Merchants on the

New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk

10/07/2024 0 Comments 0 tags

Select versions of the OpenSSH secure networking suite are susceptible to a new vulnerability that can trigger remote code execution (RCE). The vulnerability, tracked as CVE-2024-6409 (CVSS score: 7.0), is

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

10/07/2024 0 Comments 0 tags

Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured Jenkins Script Console instances to further criminal activities such as cryptocurrency mining. “Misconfigurations such as improperly set

RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks

10/07/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity

GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel

09/07/2024 0 Comments 0 tags

Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android data-gathering tool called GuardZoo. The campaign, believed to have commenced as early

HUMINT: Diving Deep into the Dark Web

09/07/2024 0 Comments 0 tags

Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components: Clear Web – Web assets that can be viewed through public search

Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation

09/07/2024 0 Comments 0 tags

Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have released a joint advisory about a China-linked cyber espionage group called APT40, warning