Researchers Detail Severe “Super FabriXss” Vulnerability in Microsoft Azure SFX

30/03/2023 0 Comments 0 tags

Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code execution. Tracked as CVE-2023-23383 (CVSS score: 8.2), the issue has been dubbed

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

30/03/2023 0 Comments 0 tags

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor called KEYPLUG. “RedGolf is a particularly prolific Chinese state-sponsored threat actor group

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

30/03/2023 0 Comments 0 tags

A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11 Wi-Fi protocol standard, impacting a wide range of devices running

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

30/03/2023 0 Comments 0 tags

A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials from API keys and secrets from popular cloud service providers. “The spread

Cyberstorage: Leveraging the Multi-Cloud to Combat Data Exfiltration

30/03/2023 0 Comments 0 tags

Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy for data management. “Multi-cloud by design,” and its companion the supercloud, is an

3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users

30/03/2023 0 Comments 0 tags

3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be an active supply chain attack that’s using digitally

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

29/03/2023 0 Comments 0 tags

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google’s Threat Analysis Group (TAG) has revealed. The

Smart Mobility has a Blindspot When it Comes to API Security

29/03/2023 0 Comments 0 tags

The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this increased reliance on APIs has

How to Build a Research Lab for Reverse Engineering — 4 Ways

29/03/2023 0 Comments 0 tags

Malware analysis is an essential part of security researcher’s work. But working with malicious samples can be dangerous — it requires specialized tools to record their activity, and a secure

Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups

29/03/2023 0 Comments 0 tags

An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French cybersecurity firm ExaTrack, which found three samples of the previously