Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike

24/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop

U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks

24/04/2024 0 Comments 0 tags

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary

Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users

24/04/2024 0 Comments 0 tags

Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of

eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners

24/04/2024 0 Comments 0 tags

A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting

CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers

24/04/2024 0 Comments 0 tags

A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity

Apache Cordova App Harness Targeted in Dependency Confusion Attack

23/04/2024 0 Comments 0 tags

Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before

German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies

23/04/2024 0 Comments 0 tags

German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Federal

Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery

23/04/2024 0 Comments 0 tags

Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there’s a larger, more

Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

23/04/2024 0 Comments 0 tags

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry and

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

23/04/2024 0 Comments 0 tags

In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to