HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

01/02/2024 0 Comments 0 tags

Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly a year

Why the Right Metrics Matter When it Comes to Vulnerability Management

01/02/2024 0 Comments 0 tags

How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you tell how well you’re doing, progressing, or

U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers

01/02/2024 0 Comments 0 tags

The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small office and home office (SOHO) routers hijacked by a China-linked state-sponsored threat

Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

01/02/2024 0 Comments 0 tags

Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN and

RunC Flaws Enable Container Escapes, Granting Attackers Host Access

01/02/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage follow-on attacks.

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

01/02/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of

Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation

31/01/2024 0 Comments 0 tags

Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one of which is said to have come under targeted exploitation in the wild.

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

31/01/2024 0 Comments 0 tags

Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram as an epicenter for cybercrime, enabling threat actors to mount a mass

Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware

31/01/2024 0 Comments 0 tags

A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target organizations in Italy. Google-owned Mandiant said the attacks single out multiple industries,

The SEC Won’t Let CISOs Be: Understanding New SaaS Cybersecurity Rules

31/01/2024 0 Comments 0 tags

The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now subject to cyber incident disclosure and cybersecurity readiness requirements for data stored in SaaS