AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service

31/07/2023 0 Comments 0 tags

More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office (SOHO) routers as part of a multi-year campaign active since at

Webinar: Riding the vCISO Wave: How to Provide vCISO Services

31/07/2023 0 Comments 0 tags

Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses and non-regulated enterprises was expected to grow by a whopping

Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor

31/07/2023 0 Comments 0 tags

Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China as part of a recently observed campaign. The activity, according

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

29/07/2023 0 Comments 0 tags

A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sensitive data stored in pictures. CherryBlos, per Trend Micro, is distributed via bogus

Major Security Flaw Discovered in Metabase BI Software – Urgent Update Required

29/07/2023 0 Comments 0 tags

Users of Metabase, a popular business intelligence and data visualization software package, are being advised to update to the latest version following the discovery of an “extremely severe” flaw that

BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities

29/07/2023 0 Comments 0 tags

The Russian nation-state actor known as BlueBravo has been observed targeting diplomatic entities throughout Eastern Europe with the goal of delivering a new backdoor called GraphicalProton, exemplifying the continuous evolution of the

Hackers Abusing Windows Search Feature to Install Remote Access Trojans

29/07/2023 0 Comments 0 tags

A legitimate Windows search feature is being exploited by unknown malicious actors to download arbitrary payloads from remote servers and compromise targeted systems with remote access trojans such as AsyncRAT

A Data Exfiltration Attack Scenario: The Porsche Experience

29/07/2023 0 Comments 0 tags

As part of Checkmarx’s mission to help organizations develop and deploy secure software, the Security Research team started looking at the security posture of major car manufacturers. Porsche has a well-established Vulnerability

STARK#MULE Targets Koreans with U.S. Military-themed Document Lures

29/07/2023 0 Comments 0 tags

An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures to trick them into running malware on compromised systems. Cybersecurity firm Securonix

IcedID Malware Adapts and Expands Threat with Updated BackConnect Module

29/07/2023 0 Comments 0 tags

The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that’s used for post-compromise activity on hacked systems, new findings from