New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

17/08/2023 0 Comments 0 tags

Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly under the radar and main access to an Apple device even when

New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities

17/08/2023 0 Comments 0 tags

A new, financially motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw in GitLab as part of a cryptojacking and proxyjacking campaign. “The attacker utilized undetected signature-based tools, sophisticated

Why You Need Continuous Network Monitoring?

17/08/2023 0 Comments 0 tags

Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer sit safely side-by-side on a corporate network, dev teams constantly

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

17/08/2023 0 Comments 0 tags

An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The phishing attacks feature PDF documents with diplomatic lures, some of

CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks

17/08/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence

What’s the State of Credential theft in 2023?

17/08/2023 0 Comments 0 tags

At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data

Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

17/08/2023 0 Comments 0 tags

Active flaws in the PowerShell Gallery could be weaponized by threat actors to pull off supply chain attacks against the registry’s users. “These flaws make typosquatting attacks inevitable in this

Guide: How Google Workspace-based Organizations can leverage Chrome to improve Security

17/08/2023 0 Comments 0 tags

More and more organizations are choosing Google Workspace as their default employee toolset of choice. But despite the productivity advantages, this organizational action also incurs a new security debt. Security

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

17/08/2023 0 Comments 0 tags

Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part of its OpenSK security keys initiative. “This open-source hardware optimized implementation uses a novel ECC/Dilithium hybrid

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

17/08/2023 0 Comments 0 tags

Multiple critical security flaws have been reported in Ivanti Avalanche, an enterprise mobile device management solution that’s used by 30,000 organizations. The vulnerabilities, collectively tracked as CVE-2023-32560 (CVSS score: 9.8), are stack-based buffer