ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

01/05/2024 0 Comments 0 tags

The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it’s based on, indicating that it’s being actively developed. “The latest version, 2.4.1.0, introduces a feature to

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

01/05/2024 0 Comments 0 tags

A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. “This

Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

30/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

30/04/2024 0 Comments 0 tags

The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. “These guidelines are informed by the whole-of-government effort to assess AI risks

New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024

30/04/2024 0 Comments 0 tags

The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices to comply with new legislation that prohibits them from using default passwords, effective April 29, 2024. “The law, known

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

29/04/2024 0 Comments 0 tags

Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

29/04/2024 0 Comments 0 tags

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

29/04/2024 0 Comments 0 tags

A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

29/04/2024 0 Comments 0 tags

It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic

Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

29/04/2024 0 Comments 0 tags

Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an “adversary