PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks

11/07/2024 0 Comments 0 tags

Multiple threat actors have been observed exploiting a recently disclosed security flaw in PHP to deliver remote access trojans, cryptocurrency miners, and distributed denial-of-service (DDoS) botnets. The vulnerability in question

GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Jobs

11/07/2024 0 Comments 0 tags

GitLab has shipped another round of updates to close out security flaws in its software development platform, including a critical bug that allows an attacker to run pipeline jobs as

New Ransomware Group Exploiting Veeam Backup Software Vulnerability

10/07/2024 0 Comments 0 tags

A now-patched security flaw in Veeam Backup & Replication software is being exploited by a nascent ransomware operation known as EstateRansomware. Singapore-headquartered Group-IB, which discovered the threat actor in early

True Protection or False Promise? The Ultimate ITDR Shortlisting Guide

10/07/2024 0 Comments 0 tags

It’s the age of identity security. The explosion of driven ransomware attacks has made CISOs and security teams realize that identity protection lags 20 years behind their endpoints and networks.

Smash-and-Grab Extortion

10/07/2024 0 Comments 0 tags

The Problem The “2024 Attack Intelligence Report” from the staff at Rapid7 [1] is a well-researched, well-written report that is worthy of careful study. Some key takeaways are:  53% of

Microsoft’s July Update Patches 143 Flaws, Including Two Actively Exploited

10/07/2024 0 Comments 0 tags

Microsoft has released patches to address a total of 143 security flaws as part of its monthly security updates, two of which have come under active exploitation in the wild.

Google Adds Passkeys to Advanced Protection Program for High-Risk Users

10/07/2024 0 Comments 0 tags

Google on Wednesday announced that it’s making available passkeys for high-risk users to enroll in its Advanced Protection Program (APP). “Users traditionally needed a physical security key for APP —

Crypto Analysts Expose HuiOne Guarantee’s $11 Billion Cybercrime Transactions

10/07/2024 0 Comments 0 tags

Cryptocurrency analysts have shed light on an online marketplace called HuiOne Guarantee that’s widely used by cybercriminals in Southeast Asia, particularly those linked to pig butchering scams. “Merchants on the

ViperSoftX Malware Disguises as eBooks on Torrents to Spread Stealthy Attacks

10/07/2024 0 Comments 0 tags

The sophisticated malware known as ViperSoftX has been observed being distributed as eBooks over torrents. “A notable aspect of the current variant of ViperSoftX is that it uses the Common

New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk

10/07/2024 0 Comments 0 tags

Select versions of the OpenSSH secure networking suite are susceptible to a new vulnerability that can trigger remote code execution (RCE). The vulnerability, tracked as CVE-2024-6409 (CVSS score: 7.0), is