“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit

21/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote

NextGen Healthcare Mirth Connect Under Attack – CISA Issues Urgent Warning

21/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaw,

Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

20/05/2024 0 Comments 0 tags

An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind destructive wiping attacks targeting Albania and Israel under the personas Homeland Justice

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

20/05/2024 0 Comments 0 tags

Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT,

Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware

20/05/2024 0 Comments 0 tags

A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma

Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

20/05/2024 0 Comments 0 tags

All developers want to create secure and dependable software. They should feel proud to release their code with the full confidence they did not introduce any weaknesses or anti-patterns into

Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns

20/05/2024 0 Comments 0 tags

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed to be the successor to the IcedID malware. “These

Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam

19/05/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering scam that laundered at least $73 million from victims through shell companies.

Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

19/05/2024 0 Comments 0 tags

The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The large-scale phishing attacks, likely facilitated by

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

17/05/2024 0 Comments 0 tags

Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech hacking group as part of a cyber espionage campaign targeting the Asia-Pacific