New Variant of XLoader macOS Malware Disguised as ‘OfficeNote’ Productivity App

22/08/2023 0 Comments 0 tags

A new variant of an Apple macOS malware called XLoader has surfaced in the wild, masquerading its malicious features under the guise of an office productivity app called “OfficeNote.” “The new version of XLoader

Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates

22/08/2023 0 Comments 0 tags

A previously undocumented threat cluster has been linked to a software supply chain attack targeting organizations primarily located in Hong Kong and other regions in Asia. The Symantec Threat Hunter

CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds

22/08/2023 0 Comments 0 tags

A new State of SaaS Security Posture Management Report from SaaS cybersecurity provider AppOmni indicates that Cybersecurity, IT, and business leaders alike recognize SaaS cybersecurity as an increasingly important part of the cyber threat

Critical Adobe ColdFusion Flaw Added to CISA’s Exploited Vulnerability Catalog

22/08/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability,

Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software

22/08/2023 0 Comments 0 tags

Software services provider Ivanti is warning of a new critical zero-day flaw impacting Ivanti Sentry (formerly MobileIron Sentry) that it said is being actively exploited in the wild, marking an escalation of

This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

21/08/2023 0 Comments 0 tags

Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute proxy requests. According to AT&T

How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes

21/08/2023 0 Comments 0 tags

From a user’s perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation process and gain immediate access to whatever new app or

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

21/08/2023 0 Comments 0 tags

A high-severity security flaw has been disclosed in the WinRAR utility that could be potentially exploited by a threat actor to achieve remote code execution on Windows systems. Tracked as CVE-2023-40477 (CVSS

HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack

21/08/2023 0 Comments 0 tags

The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconnaissance and targeting activity aimed at Taiwan-based organizations and a U.S. military procurement

WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams

19/08/2023 0 Comments 0 tags

Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and redirection toolkit called WoofLocker that’s engineered to conduct tech support scams. The sophisticated traffic redirection scheme was first documented by Malwarebytes in