CTEM 101 – Go Beyond Vulnerability Management with Continuous Threat Exposure Management

12/03/2024 0 Comments 0 tags

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for

South Korean Citizen Detained in Russia on Cyber Espionage Charges

12/03/2024 0 Comments 0 tags

Russia has detained a South Korean national for the first time on cyber espionage charges and transferred from Vladivostok to Moscow for further investigation. The development was first reported by Russian news

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

12/03/2024 0 Comments 0 tags

A new malware campaign is leveraging a high-severity security flaw in the Popup Builder plugin for WordPress to inject malicious JavaScript code. According to Sucuri, the campaign has infected more than

New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics

11/03/2024 0 Comments 0 tags

Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing PDF attachments. “This intricate attack involves the PDF downloading a ZIP file

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

11/03/2024 0 Comments 0 tags

The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from GuidePoint Security, which responded

Data Leakage Prevention in the Age of Cloud Computing: A New Approach

11/03/2024 0 Comments 0 tags

As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

11/03/2024 0 Comments 0 tags

A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities into its arsenal in order to opportunistically breach edge devices and public-facing services and deploy malware on compromised

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

11/03/2024 0 Comments 0 tags

Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

09/03/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

09/03/2024 0 Comments 0 tags

Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed “large company” to connect to their infrastructure. While a number of