Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware

08/09/2023 0 Comments 0 tags

A new malvertising campaign has been observed distributing an updated version of a macOS stealer malware called Atomic Stealer (or AMOS), indicating that it’s being actively maintained by its author. An off-the-shelf

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

07/09/2023 0 Comments 0 tags

Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forging tokens to access Outlook by compromising an engineer’s corporate account. This enabled

Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

06/09/2023 0 Comments 0 tags

Google has rolled out monthly security patches for Android to address a number of flaws, including a zero-day bug that it said may have been exploited in the wild. Tracked

Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant

06/09/2023 0 Comments 0 tags

The Iranian threat actor tracked as APT34 has been linked to a new phishing attack that leads to the deployment of a variant of a backdoor called SideTwist. “APT34 has a

Three CISOs Share How to Run an Effective SOC

06/09/2023 0 Comments 0 tags

The role of the CISO keeps taking center stage as a business enabler: CISOs need to navigate the complex landscape of digital threats while fostering innovation and ensuring business continuity.

9 Alarming Vulnerabilities Uncovered in SEL’s Power Management Products

06/09/2023 0 Comments 0 tags

Nine security flaws have been disclosed in electric power management products made by Schweitzer Engineering Laboratories (SEL). “The most severe of those nine vulnerabilities would allow a threat actor to

New BLISTER Malware Update Fuelling Stealthy Network Infiltration

06/09/2023 0 Comments 0 tags

An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic. “New BLISTER update

New Python Variant of Chaes Malware Targets Banking and Logistics Industries

06/09/2023 0 Comments 0 tags

Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. “It has undergone major overhauls: from being rewritten entirely in Python, which resulted in

Way Too Vulnerable: Join this Webinar to Understand and Strengthen Identity Attack Surface

06/09/2023 0 Comments 0 tags

In today’s digital age, it’s not just about being online but how securely your organization operates online. Regardless of size or industry, every organization heavily depends on digital assets. The

Key Cybersecurity Tools That Can Mitigate the Cost of a Breach

06/09/2023 0 Comments 0 tags

IBM’s 2023 installment of their annual “Cost of a Breach” report has thrown up some interesting trends. Of course, breaches being costly is no longer news at this stage! What’s