Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam

31/03/2023 0 Comments 0 tags

The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members of a cybercriminal gang that set up phishing sites to target European users.

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response

31/03/2023 0 Comments 0 tags

Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to minimize damage. They also aim to avoid follow on attacks or future related

3CX Supply Chain Attack — Here’s What We Know So Far

31/03/2023 0 Comments 0 tags

Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows and macOS are affected by a supply chain attack. The version numbers include 18.12.407 and

Researchers Detail Severe “Super FabriXss” Vulnerability in Microsoft Azure SFX

30/03/2023 0 Comments 0 tags

Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code execution. Tracked as CVE-2023-23383 (CVSS score: 8.2), the issue has been dubbed

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

30/03/2023 0 Comments 0 tags

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor called KEYPLUG. “RedGolf is a particularly prolific Chinese state-sponsored threat actor group

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

30/03/2023 0 Comments 0 tags

A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11 Wi-Fi protocol standard, impacting a wide range of devices running

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

30/03/2023 0 Comments 0 tags

A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials from API keys and secrets from popular cloud service providers. “The spread

Cyberstorage: Leveraging the Multi-Cloud to Combat Data Exfiltration

30/03/2023 0 Comments 0 tags

Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy for data management. “Multi-cloud by design,” and its companion the supercloud, is an

3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users

30/03/2023 0 Comments 0 tags

3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on what appears to be an active supply chain attack that’s using digitally

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

29/03/2023 0 Comments 0 tags

A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and iOS devices, Google’s Threat Analysis Group (TAG) has revealed. The