NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security

17/08/2023 0 Comments 0 tags

A previously undetected attack method called NoFilter has been found to abuse the Windows Filtering Platform (WFP) to achieve privilege escalation in the Windows operating system. “If an attacker has the ability

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

17/08/2023 0 Comments 0 tags

An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The phishing attacks feature PDF documents with diplomatic lures, some of

Why You Need Continuous Network Monitoring?

17/08/2023 0 Comments 0 tags

Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer sit safely side-by-side on a corporate network, dev teams constantly

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

17/08/2023 0 Comments 0 tags

Multiple critical security flaws have been reported in Ivanti Avalanche, an enterprise mobile device management solution that’s used by 30,000 organizations. The vulnerabilities, collectively tracked as CVE-2023-32560 (CVSS score: 9.8), are stack-based buffer

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

17/08/2023 0 Comments 0 tags

Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part of its OpenSK security keys initiative. “This open-source hardware optimized implementation uses a novel ECC/Dilithium hybrid

Guide: How Google Workspace-based Organizations can leverage Chrome to improve Security

17/08/2023 0 Comments 0 tags

More and more organizations are choosing Google Workspace as their default employee toolset of choice. But despite the productivity advantages, this organizational action also incurs a new security debt. Security

Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

17/08/2023 0 Comments 0 tags

Active flaws in the PowerShell Gallery could be weaponized by threat actors to pull off supply chain attacks against the registry’s users. “These flaws make typosquatting attacks inevitable in this

What’s the State of Credential theft in 2023?

17/08/2023 0 Comments 0 tags

At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data

CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks

17/08/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence

Nearly 2,000 Citrix NetScaler Instances Hacked via Critical Vulnerability

16/08/2023 0 Comments 0 tags

Nearly 2,000 Citrix NetScaler instances have been compromised with a backdoor by weaponizing a recently disclosed critical security vulnerability as part of a large-scale attack. “An adversary appears to have