GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

05/07/2024 0 Comments 0 tags

The malware known as GootLoader continues to be in active use by threat actors looking to deliver additional payloads to compromised hosts. “Updates to the GootLoader payload have resulted in

Blueprint for Success: Implementing a CTEM Operation

05/07/2024 0 Comments 0 tags

The attack surface isn’t what it once was and it’s becoming a nightmare to protect. A constantly expanding and evolving attack surface means risk to the business has skyrocketed and

New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks

05/07/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a new botnet called Zergeca that’s capable of conducting distributed denial-of-service (DDoS) attacks. Written in Golang, the botnet is so named for its reference to a

Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies

05/07/2024 0 Comments 0 tags

The supply chain attack targeting widely-used Polyfill[.]io JavaScript library is wider in scope than previously thought, with new findings from Censys showing that over 380,000 hosts are embedding a polyfill

Microsoft Uncovers Critical Flaws in Rockwell Automation PanelView Plus

04/07/2024 0 Comments 0 tags

Microsoft has revealed two security flaws in Rockwell Automation PanelView Plus that could be weaponized by remote, unauthenticated attackers to execute arbitrary code and trigger a denial-of-service (DoS) condition. “The

Brazil Halts Meta’s AI Data Processing Amid Privacy Concerns

04/07/2024 0 Comments 0 tags

Brazil’s data protection authority, Autoridade Nacional de Proteção de Dados (ANPD), has temporarily banned Meta from processing users’ personal data to train the company’s artificial intelligence (AI) algorithms. The ANPD

Twilio’s Authy App Breach Exposes Millions of Phone Numbers

04/07/2024 0 Comments 0 tags

Cloud communications provider Twilio has revealed that unidentified threat actors took advantage of an unauthenticated endpoint in Authy to identify data associated with Authy accounts, including users’ cell phone numbers.

Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike

04/07/2024 0 Comments 0 tags

A coordinated law enforcement operation codenamed MORPHEUS has felled close to 600 servers that were used by cybercriminal groups and were part of an attack infrastructure associated with the Cobalt

The Emerging Role of AI in Open-Source Intelligence

03/07/2024 0 Comments 0 tags

Recently the Office of the Director of National Intelligence (ODNI) unveiled a new strategy for open-source intelligence (OSINT) and referred to OSINT as the “INT of first resort”. Public and

Microsoft MSHTML Flaw Exploited to Deliver MerkSpy Spyware Tool

03/07/2024 0 Comments 0 tags

Unknown threat actors have been observed exploiting a now-patched security flaw in Microsoft MSHTML to deliver a surveillance tool called MerkSpy as part of a campaign primarily targeting users in