Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code

14/05/2024 0 Comments 0 tags

The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues that could lead to the execution of arbitrary code. The

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

14/05/2024 0 Comments 0 tags

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

14/05/2024 0 Comments 0 tags

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

14/05/2024 0 Comments 0 tags

The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

14/05/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. “These vulnerabilities include

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

14/05/2024 0 Comments 0 tags

In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

14/05/2024 0 Comments 0 tags

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices

14/05/2024 0 Comments 0 tags

The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

11/05/2024 0 Comments 0 tags

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used

Researchers Uncover ‘LLMjacking’ Scheme Targeting Cloud-Hosted AI Models

10/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack