Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

15/10/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates. French cybersecurity company HarfangLab, which detected the activity at the

WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

15/10/2024 0 Comments 0 tags

The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow logged-in users to access forms submitted by others on a

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

14/10/2024 0 Comments 0 tags

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions. That’s according to findings

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

14/10/2024 0 Comments 0 tags

The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on “shift-left” practices—securing

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

14/10/2024 0 Comments 0 tags

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)

14/10/2024 0 Comments 0 tags

Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me, you NEED to be in the loop this time. We’ve

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

14/10/2024 0 Comments 0 tags

Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos said it has been tracking

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

13/10/2024 0 Comments 0 tags

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E.

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

12/10/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly manipulating digital asset markets as part of a widespread fraud

GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

11/10/2024 0 Comments 0 tags

A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos