Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites

01/06/2023 0 Comments 0 tags

WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that’s installed on over five million sites. The vulnerability, which was unearthed during an internal security audit,

Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

01/06/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT

01/06/2023 0 Comments 0 tags

Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that’s employed by the North Korean state-sponsored actor known as ScarCruft. “RokRAT is a sophisticated remote access trojan

Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months

01/06/2023 0 Comments 0 tags

Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its Email Security Gateway (ESG) appliances had been abused by threat actors since October 2022 to

RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks

01/06/2023 0 Comments 0 tags

The threat actors behind RomCom RAT are leveraging a network of fake websites advertising rogue versions of popular software at least since July 2022 to infiltrate targets. Cybersecurity firm Trend Micro is

Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks

01/06/2023 0 Comments 0 tags

The threat actor known as Dark Pink has been linked to five new attacks aimed at various entities in Belgium, Brunei, Indonesia, Thailand, and Vietnam between February 2022 and April 2023. This

6 Steps to Effectively Threat Hunting: Safeguard Critical Assets and Fight Cybercrime

01/06/2023 0 Comments 0 tags

Finding threat actors before they find you is key to beefing up your cyber defenses. How to do that efficiently and effectively is no small task – but with a

Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

01/06/2023 0 Comments 0 tags

Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root access to bypass security enforcements and perform arbitrary actions on

Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities

01/06/2023 0 Comments 0 tags

Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized access to sensitive data. Data security firm Varonis dubbed the abandoned, unprotected, and unmonitored

Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices

01/06/2023 0 Comments 0 tags

Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables the UEFI firmware of the devices to drop a Windows executable and retrieve updates in an unsecure format. Firmware