Unraveling Real-Life Attack Paths – Key Lessons Learned

20/10/2023 0 Comments 0 tags

In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments. They don’t just target single weaknesses; they’re on the hunt for combinations of

Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign

20/10/2023 0 Comments 0 tags

A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold attempt to illicitly mine cryptocurrency and breach cloud environments. Dubbed Qubitstrike by

Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware

20/10/2023 0 Comments 0 tags

Google has announced an update to its Play Protect with support for real-time scanning at the code level to tackle novel malicious apps prior to downloading and installing them on

Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber Campaign

20/10/2023 0 Comments 0 tags

The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as part of an eight-month-long campaign. The attack led to the theft of files and passwords

Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies

20/10/2023 0 Comments 0 tags

An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen Eastern European companies in the oil and gas sector and defense industry

Vulnerability Scanning: How Often Should I Scan?

20/10/2023 0 Comments 0 tags

The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organizations are starting to recognize the importance

D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack

18/10/2023 0 Comments 0 tags

Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what it said is “low-sensitivity and semi-public information.” “The data was confirmed not from

Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure

18/10/2023 0 Comments 0 tags

In what’s the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show that nation-state hacking groups have entered the fray in leveraging the social platform

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software

18/10/2023 0 Comments 0 tags

Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to achieve arbitrary code execution and take over susceptible systems. The vulnerabilities, tracked as CVE-2023-37265 and CVE-2023-37266,

Webinar: Locking Down Financial and Accounting Data — Best Data Security Strategies

18/10/2023 0 Comments 0 tags

Financial data is much more than just a collection of numbers; it is a crucial component of any business and a prime target for cybercriminals. It’s important to understand that