New Attack Technique Exploits Microsoft Management Console Files

25/06/2024 0 Comments 0 tags

Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC)

New Cyberthreat ‘Boolka’ Deploying BMANAGER Trojan via SQLi Attacks

25/06/2024 0 Comments 0 tags

A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan codenamed BMANAGER. “The threat actor behind this campaign has been

How to Cut Costs with a Browser Security Platform

25/06/2024 0 Comments 0 tags

Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk – the browser. Network and endpoint solutions are limited in their ability

Wikileaks’ Julian Assange Released from U.K. Prison, Heads to Australia

25/06/2024 0 Comments 0 tags

WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five years in a maximum security prison at Belmarsh for what

4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree

25/06/2024 0 Comments 0 tags

Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in a series of computer intrusions that caused over $71 million

Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts

25/06/2024 0 Comments 0 tags

Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with the aim of performing arbitrary actions. “The injected malware attempts

Google Introduces Project Naptime for AI-Powered Vulnerability Research

24/06/2024 0 Comments 0 tags

Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry out vulnerability research with an aim to improve automated discovery

Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool

24/06/2024 0 Comments 0 tags

Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform that could be exploited to achieve remote code execution. Tracked as CVE-2024-37032, the

Ease the Burden with AI-Driven Threat Intelligence Reporting

24/06/2024 0 Comments 0 tags

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors

RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

24/06/2024 0 Comments 0 tags

A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic organizations in Taiwan between November 2023 and April 2024. Recorded