CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

27/03/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities added are as follows

Malicious NuGet Package Linked to Industrial Espionage Targets Developers

27/03/2024 0 Comments 0 tags

Threat hunters have identified a suspicious package in the NuGet package manager that’s likely designed to target developers working with tools made by a Chinese firm that specializes in industrial- and digital

U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation

27/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Monday unsealed indictments against seven Chinese nationals for their involvement in a hacking group that targeted U.S. and foreign critics, journalists, businesses, and

Crafting Shields: Defending Minecraft Servers Against DDoS Attacks

27/03/2024 0 Comments 0 tags

Minecraft, with over 500 million registered users and 166 million monthly players, faces significant risks from distributed denial-of-service (DDoS) attacks, threatening server functionality, player experience, and the game’s reputation. Despite

Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others

26/03/2024 0 Comments 0 tags

Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the GitHub organization account associated with Top.gg, a Discord bot discovery site. “The threat

Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account

26/03/2024 0 Comments 0 tags

In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

25/03/2024 0 Comments 0 tags

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

25/03/2024 0 Comments 0 tags

The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

24/03/2024 0 Comments 0 tags

The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware

German Police Seize ‘Nemesis Market’ in Major International Darknet Raid

24/03/2024 0 Comments 0 tags

German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA)