Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny

25/04/2024 0 Comments 0 tags

Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox

State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

25/04/2024 0 Comments 0 tags

A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it

U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks

24/04/2024 0 Comments 0 tags

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary

Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike

24/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop

Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users

24/04/2024 0 Comments 0 tags

Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of

eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners

24/04/2024 0 Comments 0 tags

A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting

CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers

24/04/2024 0 Comments 0 tags

A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity

Apache Cordova App Harness Targeted in Dependency Confusion Attack

23/04/2024 0 Comments 0 tags

Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

23/04/2024 0 Comments 0 tags

In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to

Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

23/04/2024 0 Comments 0 tags

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry and