WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

27/02/2024 0 Comments 0 tags

A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more than 200,000 active installations. The vulnerability, tracked as CVE-2024-1071, carries a CVSS score of

From Alert to Action: How to Speed Up Your SOC Investigations

27/02/2024 0 Comments 0 tags

Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can significantly enhance their ability to do so. Let’s find out

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

27/02/2024 0 Comments 0 tags

Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT

8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation

27/02/2024 0 Comments 0 tags

More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio

North Korean Hackers Targeting Developers with Malicious npm Packages

27/02/2024 0 Comments 0 tags

A set of fake npm packages discovered on the Node.js repository has been found to share ties with North Korean state-sponsored actors, new findings from Phylum show. The packages are

Three Tips to Protect Your Secrets from AI Accidents

27/02/2024 0 Comments 0 tags

Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For Large Language Models,” reaching a 1.0 document in August and a 1.1

Banking Trojans Target Latin America and Europe Through Google Cloud Run

27/02/2024 0 Comments 0 tags

Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking trojans such as Astaroth (aka Guildma), Mekotio, and Ousaban (aka Javali) to

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

26/02/2024 0 Comments 0 tags

The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement exercise seized control of its servers. To that end,

Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement

25/02/2024 0 Comments 0 tags

LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, “has engaged with law enforcement,” authorities said. The development comes following

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

24/02/2024 0 Comments 0 tags

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign