CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits

20/01/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws in Ivanti

Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

20/01/2024 0 Comments 0 tags

A malicious package uploaded to the npm registry has been found deploying a sophisticated remote access trojan on compromised Windows machines. The package, named “oscompatible,” was published on January 9,

Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators

20/01/2024 0 Comments 0 tags

In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency. It’s the lifeblood of any organization in today’s interconnected and digital world. Thus,

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

20/01/2024 0 Comments 0 tags

Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected machines. “These applications are being hosted on Chinese pirating websites

U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

19/01/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core to its Known Exploited Vulnerabilities (KEV) catalog, stating

Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware

18/01/2024 0 Comments 0 tags

The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ever custom malware written in the Rust programming language.

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

18/01/2024 0 Comments 0 tags

Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well as the 9Hits Viewer software as part of

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

18/01/2024 0 Comments 0 tags

High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the U.K., and the U.S. have been targeted by an Iranian cyber espionage

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

18/01/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification used widely in modern computers.

MFA Spamming and Fatigue: When Security Measures Go Wrong

18/01/2024 0 Comments 0 tags

In today’s digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide range of cyberattacks. To safeguard critical business resources, organizations are increasingly turning to multi-factor