New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login

23/11/2023 0 Comments 0 tags

A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. The flaws were

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

22/11/2023 0 Comments 0 tags

Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler application delivery control (ADC) and Gateway appliances to obtain initial access to target

ClearFake Campaign Expands to Target Mac Systems with Atomic Stealer

22/11/2023 0 Comments 0 tags

The macOS information stealer known as Atomic is now being delivered to target via a bogus web browser update chain tracked as ClearFake. “This may very well be the first

AI Solutions Are the New Shadow IT

22/11/2023 0 Comments 0 tags

Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot.  Employees

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

22/11/2023 0 Comments 0 tags

North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

21/11/2023 0 Comments 0 tags

The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

21/11/2023 0 Comments 0 tags

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data. “Using

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits

21/11/2023 0 Comments 0 tags

The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits. “Once Kinsing infects a system, it deploys

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

21/11/2023 0 Comments 0 tags

Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in

New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks

21/11/2023 0 Comments 0 tags

A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest data from several email clients and nearly 40 web browsers. “ZPAQ