Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

28/04/2024 0 Comments 0 tags

Identity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale” of credential stuffing attacks aimed at online services. These unprecedented attacks, observed

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

27/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which

Bogus npm Packages Used to Trick Software Developers into Installing Malware

27/04/2024 0 Comments 0 tags

An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick them into downloading a Python backdoor. Cybersecurity firm Securonix is

Severe Flaws Disclosed in Brocade SANnav SAN Management Software

26/04/2024 0 Comments 0 tags

Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher

New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates

26/04/2024 0 Comments 0 tags

Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. “Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware,”

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

26/04/2024 0 Comments 0 tags

Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that has come under active exploitation. The vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), could be weaponized to obtain unauthenticated remote

10 Critical Endpoint Security Tips You Should Know

26/04/2024 0 Comments 0 tags

In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers’ favorite targets.  According to the IDC, 70% of

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

26/04/2024 0 Comments 0 tags

Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries a CVSS score

North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

25/04/2024 0 Comments 0 tags

The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, “aside from standard RAT functionality, change

Network Threats: A Step-by-Step Attack Demonstration

25/04/2024 0 Comments 0 tags

Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense