APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

02/08/2024 0 Comments 0 tags

A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing lure to deliver a modular Windows backdoor called HeadLace. “The

Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal

02/08/2024 0 Comments 0 tags

Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These systems can become very complex and difficult to maintain. They

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication

02/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS) as a command-and-control (C2) mechanism. The newly identified malware strain

Webinar: Discover the All-in-One Cybersecurity Solution for SMBs

02/08/2024 0 Comments 0 tags

In today’s digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer resources. Managed service providers (MSPs) are struggling to keep up

U.S. Releases High-Profile Russian Hackers in Diplomatic Prisoner Exchange

02/08/2024 0 Comments 0 tags

In a historic prisoner exchange between Belarus, Germany, Norway, Russia, Slovenia, and the U.S., two Russian nationals serving time for cybercrime activities have been freed and repatriated to their country.

Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware

02/08/2024 0 Comments 0 tags

Cybersecurity companies are warning about an uptick in the abuse of Clouflare’s TryCloudflare free service for malware delivery. The activity, documented by both eSentire and Proofpoint, entails the use of

Over 1 Million Domains at Risk of ‘Sitting Ducks’ Domain Hijacking Technique

01/08/2024 0 Comments 0 tags

Over a million domains are susceptible to takeover by malicious actors by means of what has been called a Sitting Ducks attack. The powerful attack vector, which exploits weaknesses in

Hackers Distributing Malicious Python Packages via Popular Developer Q&A Platform

01/08/2024 0 Comments 0 tags

In yet another sign that threat actors are always looking out for new ways to trick users into downloading malware, it has come to light that the question-and-answer (Q&A) platform

New Android Banking Trojan BingoMod Steals Money, Wipes Devices

01/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a new Android remote access trojan (RAT) called BingoMod that not only performs fraudulent money transfers from the compromised devices but also wipes them in an

Obfuscation: There Are Two Sides To Everything

01/08/2024 0 Comments 0 tags

How to detect and prevent attackers from using these various techniques Obfuscation is an important technique for protecting software that also carries risks, especially when used by malware authors. In