New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

25/01/2024 0 Comments 0 tags

A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to deliver additional payloads onto compromised hosts for follow-on exploitation. Arctic Wolf Labs, which discovered the

Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach

25/01/2024 0 Comments 0 tags

Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett Packard Enterprise’s (HPE) cloud email environment to exfiltrate mailbox data. “The threat actor accessed and

Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

24/01/2024 0 Comments 0 tags

The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm security-related processes on compromised Windows hosts, joining the

The Unknown Risks of The Software Supply Chain: A Deep-Dive

24/01/2024 0 Comments 0 tags

In a world where more & more organizations are adopting open-source components as foundational blocks in their application’s infrastructure, it’s difficult to consider traditional SCAs as complete protection mechanisms against

U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach

24/01/2024 0 Comments 0 tags

Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for his alleged role in the 2022 ransomware attack against health insurance provider Medibank.

What is Nudge Security and How Does it Work?

24/01/2024 0 Comments 0 tags

In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and wherever they need. While this has

Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters

24/01/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with a Google account to take control of a Kubernetes cluster.

Patch Your GoAnywhere MFT Immediately – Critical Flaw Lets Anyone Be Admin

24/01/2024 0 Comments 0 tags

A critical security flaw has been disclosed in Fortra’s GoAnywhere Managed File Transfer (MFT) software that could be abused to create a new administrator user. Tracked as CVE-2024-0204, the issue carries

VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates

24/01/2024 0 Comments 0 tags

The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive “criminal affiliate program,” new findings from Infoblox

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

24/01/2024 0 Comments 0 tags

Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were installed. The