WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities

20/05/2023 0 Comments 0 tags

Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in

Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware

20/05/2023 0 Comments 0 tags

Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites as part of a BATLOADER campaign designed to

Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware

20/05/2023 0 Comments 0 tags

Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat. The packages – named nodejs-encrypt-agent and nodejs-cookie-proxy-agent – were

Dr. Active Directory vs. Mr. Exposed Attack Surface: Who’ll Win This Fight?

20/05/2023 0 Comments 0 tags

Active Directory (AD) is among the oldest pieces of software still used in the production environment and can be found in most organizations today. This is despite the fact that

Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024

20/05/2023 0 Comments 0 tags

Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it slowly works its way to deprecate support for third-party cookies in Chrome browser. To that

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

17/05/2023 0 Comments 0 tags

A hacking group dubbed OilAlpha with suspected ties to Yemen’s Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. “OilAlpha used encrypted

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover

17/05/2023 0 Comments 0 tags

A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party remote management tools within compromised environments. Google-owned Mandiant attributed the activity to

Identifying a Patch Management Solution: Overview of Key Criteria

17/05/2023 0 Comments 0 tags

Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or patched – to fix bugs, address vulnerabilities, and update key features

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

17/05/2023 0 Comments 0 tags

The second generation version of Belkin’s Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that could be weaponized by a threat actor to inject arbitrary

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered

17/05/2023 0 Comments 0 tags

Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP