Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

31/01/2024 0 Comments 0 tags

A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that’s used to drop the

New Glibc Flaw Grants Attackers Root Access on Major Linux Distros

31/01/2024 0 Comments 0 tags

Malicious local attackers can obtain full root access on Linux machines by taking advantage of a newly disclosed security flaw in the GNU C library (aka glibc). Tracked as CVE-2023-6246,

URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite

30/01/2024 0 Comments 0 tags

GitLab once again released fixes to address a critical security flaw in its Community Edition (CE) and Enterprise Edition (EE) that could be exploited to write arbitrary files while creating

Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives

30/01/2024 0 Comments 0 tags

A Brazilian law enforcement operation has led to the arrest of several Brazilian operators in charge of the Grandoreiro malware. The Federal Police of Brazil said it served five temporary arrest warrants and 13

China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz

30/01/2024 0 Comments 0 tags

The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar’s Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors and remote access

New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility

30/01/2024 0 Comments 0 tags

Threat hunters have identified a new campaign that delivers the ZLoader malware, resurfacing nearly two years after the botnet’s infrastructure was dismantled in April 2022. A new variant of the malware is

Italian Data Protection Watchdog Accuses ChatGPT of Privacy Violations

30/01/2024 0 Comments 0 tags

Italy’s data protection authority (DPA) has notified ChatGPT-maker OpenAI of supposedly violating privacy laws in the region. “The available evidence pointed to the existence of breaches of the provisions contained

Top Security Posture Vulnerabilities Revealed

30/01/2024 0 Comments 0 tags

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It’s the nature of the field – the speed at which malicious actors carry

Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws

30/01/2024 0 Comments 0 tags

Juniper Networks has released out-of-band updates to address high-severity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems. The vulnerabilities,

Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords

29/01/2024 0 Comments 0 tags

A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager (NTLM) v2 hashed passwords when opening a specially crafted file. The issue,