Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps

20/10/2023 0 Comments 0 tags

The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network Computing (VNC) apps as lures to target the defense industry and nuclear engineers

Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw

20/10/2023 0 Comments 0 tags

A number of state-back threat actors from Russia and China have been observed exploiting a recent security flaw in the WinRAR archiver tool for Windows as part of their operations.

Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity Flaw

20/10/2023 0 Comments 0 tags

North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically breach vulnerable servers, according to Microsoft. The attacks, which entail the exploitation of CVE-2023-42793 (CVSS score:

Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber Campaign

20/10/2023 0 Comments 0 tags

The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as part of an eight-month-long campaign. The attack led to the theft of files and passwords

Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware

20/10/2023 0 Comments 0 tags

Google has announced an update to its Play Protect with support for real-time scanning at the code level to tackle novel malicious apps prior to downloading and installing them on

Vulnerability Scanning: How Often Should I Scan?

20/10/2023 0 Comments 0 tags

The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organizations are starting to recognize the importance

Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies

20/10/2023 0 Comments 0 tags

An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen Eastern European companies in the oil and gas sector and defense industry

SpyNote: Beware of This Android Trojan that Records Audio and Phone Calls

18/10/2023 0 Comments 0 tags

The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features. Typically spread via SMS phishing campaigns, attack chains involving the spyware trick potential victims into installing

Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign

18/10/2023 0 Comments 0 tags

Pro-Russian hacking groups have exploited a recently disclosed security vulnerability in the WinRAR archiving utility as part of a phishing campaign designed to harvest credentials from compromised systems. “The attack

Warning: Unpatched Cisco Zero-Day Vulnerability Actively Targeted in the Wild

18/10/2023 0 Comments 0 tags

Cisco has warned of a critical, unpatched security flaw impacting IOS XE software that’s under active exploitation in the wild. Rooted in the web UI feature, the zero-day vulnerability is