Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems

05/08/2023 0 Comments 0 tags

Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. “Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by

MDR: Empowering Organizations with Enhanced Security

05/08/2023 0 Comments 0 tags

Managed Detection and Response (MDR) has emerged as a crucial solution for organizations looking to bolster their security measures. MDR allows businesses to outsource the management of Endpoint Detection and

Webinar – Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges

04/08/2023 0 Comments 0 tags

Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security and identity teams face inherent obstacles during the PAM journey,

NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack

04/08/2023 0 Comments 0 tags

A married couple from New York City has pleaded guilty to money laundering charges in connection with the 2016 hack of cryptocurrency stock exchange Bitfinex, resulting in the theft of

Malicious npm Packages Found Exfiltrating Sensitive Data from Developers

04/08/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate sensitive developer information. Software supply chain firm Phylum, which first

Major Cybersecurity Agencies Collaborate to Unveil 2022’s Most Exploited Vulnerabilities

04/08/2023 0 Comments 0 tags

A four-year-old critical security flaw impacting Fortinet FortiOS SSL has emerged as one of the most routinely and frequently exploited vulnerabilities in 2022. “In 2022, malicious cyber actors exploited older

Hundreds of Citrix NetScaler ADC and Gateway Servers Hacked in Major Cyber Attack

03/08/2023 0 Comments 0 tags

Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to deploy web shells, according to the Shadowserver Foundation. The non-profit said the attacks take advantage of CVE-2023-3519, a

New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3

03/08/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a new version of malware called Rilide that targets Chromium-based web browsers to steal sensitive data and steal cryptocurrency. “It exhibits a higher level of sophistication through modular

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

03/08/2023 0 Comments 0 tags

Threat actors are leveraging a technique called versioning to evade Google Play Store’s malware detections and target Android users. “Campaigns using versioning commonly target users’ credentials, data, and finances,” Google

A Penetration Testing Buyer’s Guide for IT Security Teams

03/08/2023 0 Comments 0 tags

The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data that, if compromised, could result in severe financial and reputational