RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks

10/07/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

10/07/2024 0 Comments 0 tags

Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured Jenkins Script Console instances to further criminal activities such as cryptocurrency mining. “Misconfigurations such as improperly set

HUMINT: Diving Deep into the Dark Web

09/07/2024 0 Comments 0 tags

Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components: Clear Web – Web assets that can be viewed through public search

GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel

09/07/2024 0 Comments 0 tags

Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android data-gathering tool called GuardZoo. The campaign, believed to have commenced as early

Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation

09/07/2024 0 Comments 0 tags

Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have released a joint advisory about a China-linked cyber espionage group called APT40, warning

Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories

09/07/2024 0 Comments 0 tags

Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what appears to be an instance of a “complex and persistent” supply chain

New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems

08/07/2024 0 Comments 0 tags

An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on Windows and Linux systems. Eldorado first appeared on March 16, 2024, when an advertisement for

5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy

08/07/2024 0 Comments 0 tags

Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late June 2024 – barely raise public eyebrows anymore.  Yet businesses, and the

Experts Warn of Mekotio Banking Trojan Targeting Latin American Countries

08/07/2024 0 Comments 0 tags

Financial institutions in Latin America are being threatened by a banking trojan called Mekotio (aka Melcoz). That’s according to findings from Trend Micro, which said it recently observed a surge

Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service

08/07/2024 0 Comments 0 tags

Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs open-source, self-hosted Git service that could enable an authenticated attacker to breach susceptible instances, steal or