Trojanized PyCharm Software Version Delivered via Google Search Ads

01/11/2023 0 Comments 0 tags

A new malvertising campaign has been observed capitalizing on a compromised website to promote spurious versions of PyCharm on Google search results by leveraging Dynamic Search Ads. “Unbeknownst to the site owner,

Atlassian Warns of New Critical Confluence Vulnerability Threatening Data Loss

01/11/2023 0 Comments 0 tags

Atlassian has warned of a critical security flaw in Confluence Data Center and Server that could result in “significant data loss if exploited by an unauthenticated attacker.” Tracked as CVE-2023-22518, the

PentestPad: Platform for Pentest Teams

01/11/2023 0 Comments 0 tags

In the ever-evolving cybersecurity landscape, the game-changers are those who adapt and innovate swiftly. Pen test solutions not only supercharge productivity but also provide a crucial layer of objectivity, ensuring

Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

01/11/2023 0 Comments 0 tags

Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet package manager using a lesser-known method for malware deployment. Software supply chain security firm ReversingLabs described

Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating App

01/11/2023 0 Comments 0 tags

The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android spyware campaign targeting Arabic-speaking users with a counterfeit dating app designed to

N. Korean Lazarus Group Targets Software Vendor Using Known Flaws

28/10/2023 0 Comments 0 tags

The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor was compromised through the exploitation of known security flaws in another high-profile software.

F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution

27/10/2023 0 Comments 0 tags

F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution. The issue, rooted in the configuration utility component, has been assigned

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

27/10/2023 0 Comments 0 tags

Google has announced that it’s expanding its Vulnerability Rewards Program (VRP) to reward researchers for finding attack scenarios tailored to generative artificial intelligence (AI) systems in an effort to bolster AI

How to Keep Your Business Running in a Contested Environment

27/10/2023 0 Comments 0 tags

When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it’s essential for them to establish comprehensive plans for preparation, mitigation, and response to potential

The Rise of S3 Ransomware: How to Identify and Combat It

26/10/2023 0 Comments 0 tags

In today’s digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the backbone of data storage for many major corporations.  Despite S3 being a