Cybercrime Group ‘Muddled Libra’ Targets BPO Sector with Advanced Social Engineering

23/06/2023 0 Comments 0 tags

A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO) industry with persistent attacks that leverage advanced social engineering ploys to gain initial access. “The attack style defining

Zero-Day Alert: Apple Releases Patches for Actively Exploited Flaws in iOS, macOS, and Safari

22/06/2023 0 Comments 0 tags

Apple on Wednesday released a slew of updates for iOS, iPadOS, macOS, watchOS, and Safari browser to address a set of flaws it said were actively exploited in the wild. This includes

Critical Flaw Found in WordPress Plugin for WooCommerce Used by 30,000 Websites

22/06/2023 0 Comments 0 tags

A critical security flaw has been disclosed in the WordPress “Abandoned Cart Lite for WooCommerce” plugin that’s installed on more than 30,000 websites. “This vulnerability makes it possible for an attacker to

Unveiling the Unseen: Identifying Data Exfiltration with Machine Learning

22/06/2023 0 Comments 0 tags

Why Data Exfiltration Detection is Paramount? The world is witnessing an exponential rise in ransomware and data theft employed to extort companies. At the same time, the industry faces numerous

Camaro Dragon Hackers Strike with USB-Driven Self-Propagating Malware

22/06/2023 0 Comments 0 tags

The Chinese cyber espionage actor known as Camaro Dragon has been observed leveraging a new strain of self-propagating malware that spreads through compromised USB drives. “While their primary focus has traditionally been

Alert: Million of GitHub Repositories Likely Vulnerable to RepoJacking Attack

22/06/2023 0 Comments 0 tags

Millions of software repositories on GitHub are likely vulnerable to an attack called RepoJacking, a new study has revealed. This includes repositories from organizations such as Google, Lyft, and several

Generative-AI apps & ChatGPT: Potential risks and mitigation strategies

22/06/2023 0 Comments 0 tags

Losing sleep over Generative-AI apps? You’re not alone or wrong. According to the Astrix Security Research Group, mid size organizations already have, on average, 54 Generative-AI integrations to core systems

MULTI#STORM Campaign Targets India and U.S. with Remote Access Trojans

22/06/2023 0 Comments 0 tags

A new phishing campaign codenamed MULTI#STORM has set its sights on India and the U.S. by leveraging JavaScript files to deliver remote access trojans on compromised systems. “The attack chain ends with

Alert! Hackers Exploiting Critical Vulnerability in VMware’s Aria Operations Networks

22/06/2023 0 Comments 0 tags

VMware has flagged that a recently patched critical command injection vulnerability in Aria Operations for Networks (formerly vRealize Network Insight) has come under active exploitation in the wild. The flaw,

New Condi Malware Hijacking TP-Link Wi-Fi Routers for DDoS Botnet Attacks

22/06/2023 0 Comments 0 tags

A new malware called Condi has been observed exploiting a security vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers to rope the devices into a distributed denial-of-service (DDoS) botnet. Fortinet FortiGuard Labs said the