CISA Flags 8 Actively Exploited Flaws in Samsung and D-Link Devices

03/07/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a set of eight flaws to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. This includes six shortcomings

Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto Wallets

03/07/2023 0 Comments 0 tags

In yet another sign of a lucrative crimeware-as-a-service (CaaS) ecosystem, cybersecurity researchers have discovered a new Windows-based information stealer called Meduza Stealer that’s actively being developed by its author to evade detection

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

03/07/2023 0 Comments 0 tags

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application. “Malicious actors used malvertising to distribute a piece of

Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin Accounts

01/07/2023 0 Comments 0 tags

As many as 200,000 WordPress websites are at risk of ongoing attacks exploiting a critical unpatched security vulnerability in the Ultimate Member plugin. The flaw, tracked as CVE-2023-3460 (CVSS score:

Beware: New ‘Rustbucket’ Malware Variant Targeting macOS Users

01/07/2023 0 Comments 0 tags

Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes with improved capabilities to establish persistence and avoid detection by security software. “This

Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks

30/06/2023 0 Comments 0 tags

Charming Kitten, the nation-state actor affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC), has been attributed to a bespoke spear-phishing campaign that delivers an updated version of a fully-featured PowerShell

3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage

30/06/2023 0 Comments 0 tags

In today’s fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way organizations operate. From chatbots to generative AI models, these SaaS-based applications offer numerous

WhatsApp Upgrades Proxy Feature Against Internet Shutdowns

30/06/2023 0 Comments 0 tags

Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of content that can be shared in conversations. This includes the ability to send

Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign

30/06/2023 0 Comments 0 tags

An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into a proxy network. “This is an active campaign in which the attacker leverages SSH for

MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?

30/06/2023 0 Comments 0 tags

MITRE has released its annual list of the Top 25 “most dangerous software weaknesses” for the year 2023. “These weaknesses lead to serious vulnerabilities in software,” the U.S. Cybersecurity and