DDoS Botnets Hijacking Zyxel Devices to Launch Devastating Attacks

21/07/2023 0 Comments 0 tags

Several distributed denial-of-service (DDoS) botnets have been observed exploiting a critical flaw in Zyxel devices that came to light in April 2023 to gain remote control of vulnerable systems. “Through

Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action

21/07/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on Thursday warning that the newly disclosed critical security flaw in Citrix NetScaler Application Delivery Controller (ADC) and Gateway

A Few More Reasons Why RDP is Insecure (Surprise!)

21/07/2023 0 Comments 0 tags

If it seems like Remote Desktop Protocol (RDP) has been around forever, it’s because it has (at least compared to the many technologies that rise and fall within just a

Turla’s New DeliveryCheck Backdoor Breaches Ukrainian Defense Sector

21/07/2023 0 Comments 0 tags

The defense sector in Ukraine and Eastern Europe has been targeted by a novel .NET-based backdoor called DeliveryCheck (aka CAPIBAR or GAMEDAY) that’s capable of delivering next-stage payloads. The Microsoft threat intelligence

Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks

21/07/2023 0 Comments 0 tags

Two more security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software that, if successfully exploited, could allow threat actors to remotely commandeer vulnerable servers and deploy

Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks

21/07/2023 0 Comments 0 tags

Mallox ransomware activities in 2023 have witnessed a 174% increase when compared to the previous year, new findings from Palo Alto Networks Unit 42 reveal. “Mallox ransomware, like many other

Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities

21/07/2023 0 Comments 0 tags

Multiple security flaws have been disclosed in Apache OpenMeetings, a web conferencing solution, that could be potentially exploited by malicious actors to seize control of admin accounts and run malicious

North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack

21/07/2023 0 Comments 0 tags

An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered evidence pointing to the involvement of North Korean state-sponsored groups, in a style that’s reminiscent

New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems

20/07/2023 0 Comments 0 tags

Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that targets vulnerable Redis instances for follow-on exploitation. “P2PInfect exploits Redis servers running on both Linux and Windows Operating

Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats

20/07/2023 0 Comments 0 tags

Microsoft on Wednesday announced that it’s expanding cloud logging capabilities to help organizations investigate cybersecurity incidents and gain more visibility after facing criticism in the wake of a recent espionage attack