Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords

11/10/2023 0 Comments 0 tags

Passwords are at the core of securing access to an organization’s data. However, they also come with security vulnerabilities that stem from their inconvenience. With a growing list of credentials

U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability

11/10/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-21608 (CVSS

Over 17,000 WordPress Sites Compromised by Balada Injector in September 2023

11/10/2023 0 Comments 0 tags

More than 17,000 WordPress websites have been compromised in the month of September 2023 with malware known as Balada Injector, nearly twice the number of detections in August. Of these, 9,000

Microsoft Warns of Nation-State Hackers Exploiting Critical Atlassian Confluence Vulnerability

11/10/2023 0 Comments 0 tags

Microsoft has linked the exploitation of a recently disclosed critical flaw in Atlassian Confluence Data Center and Server to a nation-state actor it tracks as Storm-0062 (aka DarkShadow or Oro0lxy). The tech

Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits

11/10/2023 0 Comments 0 tags

Microsoft has released its Patch Tuesday updates for October 2023, addressing a total of 103 flaws in its software, two of which have come under active exploitation in the wild. Of the

Webinar: How vCISOs Can Navigating the Complex World of AI and LLM Security

11/10/2023 0 Comments 0 tags

In today’s rapidly evolving technological landscape, the integration of Artificial Intelligence (AI) and Large Language Models (LLMs) has become ubiquitous across various industries. This wave of innovation promises improved efficiency

Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms

11/10/2023 0 Comments 0 tags

Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign that leverages a popular adversary-in-the-middle (AiTM) phishing toolkit named EvilProxy to conduct credential harvesting and account takeover attacks.

PEACHPIT: Massive Ad Fraud Botnet Powered by Millions of Hacked Android and iOS

11/10/2023 0 Comments 0 tags

An ad fraud botnet dubbed PEACHPIT leveraged an army of hundreds of thousands of Android and iOS devices to generate illicit profits for the threat actors behind the scheme. The botnet is

Citrix Devices Under Attack: NetScaler Flaw Exploited to Capture User Credentials

11/10/2023 0 Comments 0 tags

A recently disclosed critical flaw in Citrix NetScaler ADC and Gateway devices is being exploited by threat actors to conduct a credential harvesting campaign. IBM X-Force, which uncovered the activity

libcue Library Flaw Opens GNOME Linux Systems Vulnerable to RCE Attacks

11/10/2023 0 Comments 0 tags

A new security flaw has been disclosed in the libcue library impacting GNOME Linux systems that could be exploited to achieve remote code execution (RCE) on affected hosts. Tracked as CVE-2023-43641 (CVSS