Hackers Abusing Cloudflare Tunnels for Covert Communications

08/08/2023 0 Comments 0 tags

New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert communication channels from compromised hosts and retain persistent access. “Cloudflared is functionally very similar to ngrok,”

QakBot Malware Operators Expand C2 Network with 15 New Servers

08/08/2023 0 Comments 0 tags

The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The findings are a continuation of the malware’s

New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs

07/08/2023 0 Comments 0 tags

A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with the goal of delivering a remote access trojan (RAT) capable

FBI Alert: Crypto Scammers are Masquerading as NFT Developers

07/08/2023 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as legitimate non-fungible token (NFT) developers to steal cryptocurrency and other digital assets from unsuspecting users. In

New SkidMap Linux Malware Variant Targeting Vulnerable Redis Servers

07/08/2023 0 Comments 0 tags

Vulnerable Redis services have been targeted by a “new, improved, dangerous” variant of a malware called SkidMap that’s engineered to target a wide range of Linux distributions. “The malicious nature of this

New ‘Deep Learning Attack’ Deciphers Laptop Keystrokes with 95% Accuracy

07/08/2023 0 Comments 0 tags

A group of academics has devised a “deep learning-based acoustic side-channel attack” that can be used to classify laptop keystrokes that are recorded using a nearby phone with 95% accuracy.

Enhancing Security Operations Using Wazuh: Open Source XDR and SIEM

07/08/2023 0 Comments 0 tags

In today’s interconnected world, evolving security solutions to meet growing demand is more critical than ever. Collaboration across multiple solutions for intelligence gathering and information sharing is indispensable. The idea

North Korean Hackers Targets Russian Missile Engineering Firm

07/08/2023 0 Comments 0 tags

Two different North Korean nation-state actors have been linked to a cyber intrusion against the major Russian missile engineering company NPO Mashinostroyeniya. Cybersecurity firm SentinelOne said it identified “two instances of North

Researchers Uncover New High-Severity Vulnerability in PaperCut Software

05/08/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a new high-severity security flaw in PaperCut print management software for Windows that could result in remote code execution under specific circumstances. Tracked as CVE-2023-39143 (CVSS score: 8.4),

Microsoft Addresses Critical Power Platform Flaw After Delays and Criticism

05/08/2023 0 Comments 0 tags

Microsoft on Friday disclosed that it has addressed a critical security flaw impacting Power Platform, but not before it came under criticism for its failure to swiftly act on it.