Critical Zero-Days in Atera Windows Installers Expose Users to Privilege Escalation Attacks

24/07/2023 0 Comments 0 tags

Zero-day vulnerabilities in Windows Installers for the Atera remote monitoring and management software could act as a springboard to launch privilege escalation attacks. The flaws, discovered by Mandiant on February

Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol

24/07/2023 0 Comments 0 tags

Google has announced that it intends to add support for Message Layer Security (MLS) to its Messages service for Android and open source implementation of the specification. “Most modern consumer

How to Protect Patients and Their Privacy in Your SaaS Apps

24/07/2023 0 Comments 0 tags

The healthcare industry is under a constant barrage of cyberattacks. It has traditionally been one of the most frequently targeted industries, and things haven’t changed in 2023. The U.S. Government’s

New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection

24/07/2023 0 Comments 0 tags

Details have emerged about a now-patched flaw in OpenSSH that could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions. “This vulnerability allows a remote

Banking Sector Targeted in Open-Source Software Supply Chain Attacks

24/07/2023 0 Comments 0 tags

Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the banking sector. “These attacks showcased advanced techniques, including targeting specific

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands

22/07/2023 0 Comments 0 tags

Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

21/07/2023 0 Comments 0 tags

The recent attack against Microsoft’s email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a broader scope than previously thought. According to cloud security company Wiz,

HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software

21/07/2023 0 Comments 0 tags

A new variant of AsyncRAT malware dubbed HotRat is being distributed via free, pirated versions of popular software and utilities such as video games, image and sound editing software, and Microsoft Office. “HotRat malware

Local Governments Targeted for Ransomware – How to Prevent Falling Victim

21/07/2023 0 Comments 0 tags

Regardless of the country, local government is essential in most citizens’ lives. It provides many day-to-day services and handles various issues. Therefore, their effects can be far-reaching and deeply felt

Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities

21/07/2023 0 Comments 0 tags

A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised