Researchers Shed Light on APT31’s Advanced Backdoors and Data Exfiltration Tactics

12/08/2023 0 Comments 0 tags

The Chinese threat actor known as APT31 (aka Bronze Vinewood, Judgement Panda, or Violet Typhoon) has been linked to a set of advanced backdoors that are capable of exfiltrating harvested

New SystemBC Malware Variant Targets Southern African Power Company

12/08/2023 0 Comments 0 tags

An unknown threat actor has been linked to a cyber attack on a power generation company in southern Africa with a new variant of the SystemBC malware called DroxiDat as

16 New CODESYS SDK Flaws Expose OT Environments to Remote Attacks

12/08/2023 0 Comments 0 tags

A set of 16 high-severity security flaws have been disclosed in the CODESYS V3 software development kit (SDK) that could result in remote code execution and denial-of-service under specific conditions, posing risks

CISA Adds Microsoft .NET Vulnerability to KEV Catalog Due to Active Exploitation

12/08/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched security flaw in Microsoft’s .NET and Visual Studio products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of

New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks

12/08/2023 0 Comments 0 tags

Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to deploy a commodity malware called XWorm in victim environments. The novel attack chain, detected by Fortinet FortiGuard Labs on July 13,

New Statc Stealer Malware Emerges: Your Sensitive Data at Risk

10/08/2023 0 Comments 0 tags

A new information malware strain called Statc Stealer has been found infecting devices running Microsoft Windows to siphon sensitive personal and payment information. “Statc Stealer exhibits a broad range of stealing capabilities,

Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization

10/08/2023 0 Comments 0 tags

Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS applications. Additionally, attackers continue to progress their attacks in these environments, not by exploiting

Encryption Flaws in Popular Chinese Language App Put Users’ Typed Data at Risk

10/08/2023 0 Comments 0 tags

A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that could allow a malicious interloper to decipher the text typed

Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives

10/08/2023 0 Comments 0 tags

Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking executives at prominent companies. According to Proofpoint, an ongoing hybrid

Interpol Busts Phishing-as-a-Service Platform ’16Shop,’ Leading to 3 Arrests

10/08/2023 0 Comments 0 tags

Interpol has announced the takedown of a phishing-as-a-service (PhaaS) platform called 16Shop, in addition to the arrests of three individuals in Indonesia and Japan. 16Shop specialized in the sales of