Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

13/02/2024 0 Comments 0 tags

Incident response (IR) is a race against time. You engage your internal or external team because there’s enough evidence that something bad is happening, but you’re still blind to the

Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11

13/02/2024 0 Comments 0 tags

Microsoft said it’s introducing Sudo for Windows 11 as part of an early preview version to help users execute commands with administrator privileges. “Sudo for Windows is a new way

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

13/02/2024 0 Comments 0 tags

The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an

U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators

11/02/2024 0 Comments 0 tags

The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT) called Warzone RAT. The domains – www.warzone[.]ws and three others

Alert: New Stealthy “RustDoor” Backdoor Targeting Apple macOS Devices

10/02/2024 0 Comments 0 tags

Apple macOS users are the target of a new Rust-based backdoor that has been operating under the radar since November 2023. The backdoor, codenamed RustDoor by Bitdefender, has been found to impersonate an

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

09/02/2024 0 Comments 0 tags

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than

MoqHao Android Malware Evolves with Auto-Execution Capability

09/02/2024 0 Comments 0 tags

Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. “Typical MoqHao requires users to install and launch the

Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA

09/02/2024 0 Comments 0 tags

Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

09/02/2024 0 Comments 0 tags

Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking trojan called Coyote. “This malware utilizes the Squirrel installer for distribution, leveraging Node.js and a

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

09/02/2024 0 Comments 0 tags

Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication. The issue, tracked