Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

12/03/2024 0 Comments 0 tags

A new malware campaign is leveraging a high-severity security flaw in the Popup Builder plugin for WordPress to inject malicious JavaScript code. According to Sucuri, the campaign has infected more than

South Korean Citizen Detained in Russia on Cyber Espionage Charges

12/03/2024 0 Comments 0 tags

Russia has detained a South Korean national for the first time on cyber espionage charges and transferred from Vladivostok to Moscow for further investigation. The development was first reported by Russian news

New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics

11/03/2024 0 Comments 0 tags

Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing PDF attachments. “This intricate attack involves the PDF downloading a ZIP file

Data Leakage Prevention in the Age of Cloud Computing: A New Approach

11/03/2024 0 Comments 0 tags

As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

11/03/2024 0 Comments 0 tags

The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from GuidePoint Security, which responded

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

11/03/2024 0 Comments 0 tags

Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

11/03/2024 0 Comments 0 tags

A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities into its arsenal in order to opportunistically breach edge devices and public-facing services and deploy malware on compromised

Secrets Sensei: Conquering Secrets Management Challenges

09/03/2024 0 Comments 0 tags

In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We’re all familiar with

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

09/03/2024 0 Comments 0 tags

Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

09/03/2024 0 Comments 0 tags

Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed “large company” to connect to their infrastructure. While a number of