Google TAG Warns of Russian Hackers Conducting Phishing Attacks in Ukraine

19/04/2023 0 Comments 0 tags

Elite hackers associated with Russia’s military intelligence service have been linked to large-volume phishing campaigns aimed at hundreds of users in Ukraine to extract intelligence and influence public discourse related to the

Google Chrome Hit by Second Zero-Day Attack – Urgent Patch Update Released

19/04/2023 0 Comments 0 tags

Google on Tuesday rolled out emergency fixes to address another actively exploited high-severity zero-day flaw in its Chrome web browser. The flaw, tracked as CVE-2023-2136, is described as a case of integer overflow in Skia, an

Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies

19/04/2023 0 Comments 0 tags

The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used by Indian government agencies as a ruse to deliver a new Linux backdoor called

U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage

19/04/2023 0 Comments 0 tags

U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws in networking equipment from Cisco to conduct reconnaissance and deploy malware against targets. The intrusions, per the

Uncovering (and Understanding) the Hidden Risks of SaaS Apps

19/04/2023 0 Comments 0 tags

Recent data breaches across CircleCI, LastPass, and Okta underscore a common theme: The enterprise SaaS stacks connected to these industry-leading apps can be at serious risk for compromise. CircleCI, for

Iranian Government-Backed Hackers Targeting U.S. Energy and Transit Systems

19/04/2023 0 Comments 0 tags

An Iranian government-backed actor known as Mint Sandstorm has been linked to attacks aimed at critical infrastructure in the U.S. between late 2021 to mid-2022. “This Mint Sandstorm subgroup is technically and

Critical Flaws in vm2 JavaScript Library Can Lead to Remote Code Execution

19/04/2023 0 Comments 0 tags

A fresh round of patches has been made available for the vm2 JavaScript library to address two critical flaws that could be exploited to break out of the sandbox protections.

YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader

18/04/2023 0 Comments 0 tags

Cybersecurity researchers have detailed the inner workings of a highly evasive loader named “in2al5d p3in4er” (read: invalid printer) that’s used to deliver the Aurora information stealer malware. “The in2al5d p3in4er

Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access

18/04/2023 0 Comments 0 tags

The Iranian threat actor known as MuddyWater is continuing its time-tested tradition of relying on legitimate remote administration tools to commandeer targeted systems. While the nation-state group has previously employed ScreenConnect,

DFIR via XDR: How to expedite your investigations with a DFIRent approach

18/04/2023 0 Comments 0 tags

Rapid technological evolution requires security that is resilient, up to date and adaptable. In this article, we will cover the transformation in the field of DFIR (digital forensics and incident