Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users

21/05/2024 0 Comments 0 tags

A new attack campaign dubbed CLOUD#REVERSER has been observed leveraging legitimate cloud storage services like Google Drive and Dropbox to stage malicious payloads. “The VBScript and PowerShell scripts in the CLOUD#REVERSER inherently

SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure

21/05/2024 0 Comments 0 tags

The persistent threat actors behind the SolarMarker information-stealing malware have established a multi-tiered infrastructure to complicate law enforcement takedown efforts, new findings from Recorded Future show. “The core of SolarMarker’s operations is

Five Core Tenets Of Highly Effective DevSecOps Practices

21/05/2024 0 Comments 0 tags

One of the enduring challenges of building modern applications is to make them more secure without disrupting high-velocity DevOps processes or degrading the developer experience. Today’s cyber threat landscape is

Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox

21/05/2024 0 Comments 0 tags

A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by threat actors to achieve arbitrary code execution. Tracked as CVE-2024-34359 (CVSS score: 9.7), the flaw has been

Streamlining IT Security Compliance Using the Wazuh FIM Capability

21/05/2024 0 Comments 0 tags

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning

Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

21/05/2024 0 Comments 0 tags

 Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the second half of the year, as it announced a slew of new security

NextGen Healthcare Mirth Connect Under Attack – CISA Issues Urgent Warning

21/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaw,

“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit

21/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denial-of-service (DoS), information disclosure, or remote

Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

20/05/2024 0 Comments 0 tags

An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind destructive wiping attacks targeting Albania and Israel under the personas Homeland Justice

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

20/05/2024 0 Comments 0 tags

Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT,