Western Digital Confirms Customer Data Stolen by Hackers in March Breach

08/05/2023 0 Comments 0 tags

Digital storage giant Western Digital confirmed that an “unauthorized third party” gained access to its systems and stole personal information belonging to the company’s online store customers. “This information included

How to Set Up a Threat Hunting and Threat Intelligence Program

08/05/2023 0 Comments 0 tags

Threat hunting is an essential component of your cybersecurity strategy. Whether you’re getting started or in an advanced state, this article will help you ramp up your threat intelligence program.

SideCopy Using Action RAT and AllaKore RAT to infiltrate Indian Organizations

08/05/2023 0 Comments 0 tags

The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging themes related to the Indian military research organization as part of an ongoing phishing campaign. This involves using a ZIP

Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

08/05/2023 0 Comments 0 tags

Are you concerned about ransomware attacks? You’re not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there’s

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

08/05/2023 0 Comments 0 tags

An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of

New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks

07/05/2023 0 Comments 0 tags

Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security flaw. The issue, assigned the identifier CVE-2023-30777, relates to

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

07/05/2023 0 Comments 0 tags

An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. “The attack is based on a

New Android Malware ‘FluHorse’ Targeting East Asian Markets with Deceptive Tactics

05/05/2023 0 Comments 0 tags

Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development

Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts

05/05/2023 0 Comments 0 tags

Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools for businesses to optimize their website performance and services for a global audience. However, as

N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks

05/05/2023 0 Comments 0 tags

The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as part of an ongoing global campaign. “[ReconShark] is actively delivered to specifically targeted individuals