4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

28/05/2024 0 Comments 0 tags

You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are essential to the functioning of your organization. If anything happens

Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

28/05/2024 0 Comments 0 tags

The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and co-opt them

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

28/05/2024 0 Comments 0 tags

Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri

TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

28/05/2024 0 Comments 0 tags

A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

27/05/2024 0 Comments 0 tags

Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that’s behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. “Their primary motivation is to steal

Report: The Dark Side of Phishing Protection

27/05/2024 0 Comments 0 tags

The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

27/05/2024 0 Comments 0 tags

Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

27/05/2024 0 Comments 0 tags

The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. “This cluster

Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

25/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. “Exploitation

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

24/05/2024 0 Comments 0 tags

The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the actor creating