Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

20/01/2024 0 Comments 0 tags

An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been linked to the abuse of a critical vulnerability in

Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack

20/01/2024 0 Comments 0 tags

Microsoft on Friday revealed that it was the target of a nation-state attack on its corporate systems that resulted in the theft of emails and attachments from senior executives and

Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware

20/01/2024 0 Comments 0 tags

The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to deliver known malware families such as WasabiSeed and Screenshotter. The campaign, observed earlier

CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits

20/01/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws in Ivanti

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

20/01/2024 0 Comments 0 tags

Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected machines. “These applications are being hosted on Chinese pirating websites

Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators

20/01/2024 0 Comments 0 tags

In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency. It’s the lifeblood of any organization in today’s interconnected and digital world. Thus,

Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

20/01/2024 0 Comments 0 tags

A malicious package uploaded to the npm registry has been found deploying a sophisticated remote access trojan on compromised Windows machines. The package, named “oscompatible,” was published on January 9,

U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

19/01/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core to its Known Exploited Vulnerabilities (KEV) catalog, stating

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

18/01/2024 0 Comments 0 tags

Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well as the 9Hits Viewer software as part of

Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware

18/01/2024 0 Comments 0 tags

The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ever custom malware written in the Rust programming language.