Ukrainian Hacker Suspected to be Behind “Free Download Manager” Malware Attack

22/09/2023 0 Comments 0 tags

The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that led to its website being used to distribute malicious Linux software. “It appears

Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

22/09/2023 0 Comments 0 tags

A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware.

China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers

22/09/2023 0 Comments 0 tags

China’s Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei’s servers, stealing critical data, and implanting backdoors since 2009, amid mounting geopolitical tensions between the two

The Rise of the Malicious App

22/09/2023 0 Comments 0 tags

Security teams are familiar with threats emanating from third-party applications that employees add to improve their productivity. These apps are inherently designed to deliver functionality to users by connecting to

Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge

22/09/2023 0 Comments 0 tags

The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2023, witnessing a 600x jump between September 12 and 19, 2023. “This increase in P2PInfect traffic

Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents

22/09/2023 0 Comments 0 tags

A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation providers in the Middle East, Western Europe, and the South Asian subcontinent. Notably,

Think Your MFA and PAM Solutions Protect You? Think Again

19/09/2023 0 Comments 0 tags

When you roll out a security product, you assume it will fulfill its purpose. Unfortunately, however, this often turns out not to be the case. A new report, produced by

New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services

19/09/2023 0 Comments 0 tags

A novel cloud-native cryptojacking operation has set its eyes on uncommon Amazon Web Services (AWS) offerings such as AWS Amplify, AWS Fargate, and Amazon SageMaker to illicitly mine cryptocurrency. The

Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT Malware

19/09/2023 0 Comments 0 tags

The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to distribute the CapraRAT mobile remote access trojan (RAT), demonstrating the continued evolution of the activity.

Nearly 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability

19/09/2023 0 Comments 0 tags

New research has found that close to 12,000 internet-exposed Juniper firewall devices are vulnerable to a recently disclosed remote code execution flaw. VulnCheck, which discovered a new exploit for CVE-2023-36845, said it