Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics

24/09/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon as part of a cyber espionage campaign. “Deadglyph’s architecture is unusual as

Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable

22/09/2023 0 Comments 0 tags

Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS, watchOS, and Safari, taking the total tally of zero-day bugs

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server

22/09/2023 0 Comments 0 tags

Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software

Iranian Nation-State Actor OilRig Targets Israeli Organizations

22/09/2023 0 Comments 0 tags

Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian nation-state actor known as OilRig in 2021 and 2022. The campaigns, dubbed Outer Space and Juicy Mix, entailed

How to Interpret the 2023 MITRE ATT&CK Evaluation Results

22/09/2023 0 Comments 0 tags

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

22/09/2023 0 Comments 0 tags

An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users in Brazil and Mexico. “The BBTok banker has a dedicated functionality

Do You Really Trust Your Web Application Supply Chain?

22/09/2023 0 Comments 0 tags

Well, you shouldn’t. It may already be hiding vulnerabilities. It’s the modular nature of modern web applications that has made them so effective. They can call on dozens of third-party

Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

22/09/2023 0 Comments 0 tags

Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could result in privilege escalation and information disclosure. The four security vulnerabilities, tracked from CVE-2023-40931 through

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace

22/09/2023 0 Comments 0 tags

Finnish law enforcement authorities have announced the takedown of PIILOPUOTI, a dark web marketplace that specialized in illegal narcotics trade since May 2022. “The site operated as a hidden service

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RAT

22/09/2023 0 Comments 0 tags

A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub with an aim to infect users who downloaded the code with Venom RAT