Perfecting the Defense-in-Depth Strategy with Automation

26/01/2024 0 Comments 0 tags

Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this medieval wisdom still echoes in cybersecurity. Like castles with

Malicious Ads on Google Target Chinese Users with Fake Messaging Apps

26/01/2024 0 Comments 0 tags

Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as part of an ongoing malvertising campaign. “The threat actor is abusing Google advertiser accounts

Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree

26/01/2024 0 Comments 0 tags

40-year-old Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his role in creating and distributing the TrickBot malware, the U.S. Department of

Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

26/01/2024 0 Comments 0 tags

Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products that could permit an unauthenticated, remote attacker to execute arbitrary code on

SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks

26/01/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on the command-and-control (C2) server workings of a known malware family called SystemBC. “SystemBC can be purchased on underground marketplaces and is supplied in an archive

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!

26/01/2024 0 Comments 0 tags

The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security flaws, including a critical bug that, if successfully exploited, could result in

LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks

26/01/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks. The findings come from Japanese company ITOCHU Cyber & Intelligence, which said the malware “has been updated

Cyber Threat Landscape: 7 Key Findings and Upcoming Trends for 2024

26/01/2024 0 Comments 0 tags

The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from the platform’s surveillance of the Surface, Deep, and Dark Web

China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

26/01/2024 0 Comments 0 tags

A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software to deliver a sophisticated implant named NSPX30.

Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs

26/01/2024 0 Comments 0 tags

Microsoft on Thursday said the Russian state-sponsored threat actors responsible for a cyber attack on its systems in late November 2023 have been targeting other organizations and that it’s currently beginning to