Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

01/06/2023 0 Comments 0 tags

Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root access to bypass security enforcements and perform arbitrary actions on

6 Steps to Effectively Threat Hunting: Safeguard Critical Assets and Fight Cybercrime

01/06/2023 0 Comments 0 tags

Finding threat actors before they find you is key to beefing up your cyber defenses. How to do that efficiently and effectively is no small task – but with a

Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks

01/06/2023 0 Comments 0 tags

The threat actor known as Dark Pink has been linked to five new attacks aimed at various entities in Belgium, Brunei, Indonesia, Thailand, and Vietnam between February 2022 and April 2023. This

RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks

01/06/2023 0 Comments 0 tags

The threat actors behind RomCom RAT are leveraging a network of fake websites advertising rogue versions of popular software at least since July 2022 to infiltrate targets. Cybersecurity firm Trend Micro is

CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security

30/05/2023 0 Comments 0 tags

Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass systems designed to distinguish legitimate users from bot traffic. “Because cybercriminals are keen on breaking

Implementing Risk-Based Vulnerability Discovery and Remediation

30/05/2023 0 Comments 0 tags

In this day and age, vulnerabilities in software and systems pose a considerable danger to businesses, which is why it is essential to have an efficient vulnerability management program in

Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users

30/05/2023 0 Comments 0 tags

A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of a sophisticated malware campaign. The malware is distributed via social media and

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

30/05/2023 0 Comments 0 tags

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user authentication and seize control of the devices. The approach, dubbed BrutePrint, bypasses

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

30/05/2023 0 Comments 0 tags

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm ESET said it identified over 240,000 detections of the crypter in its

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

30/05/2023 0 Comments 0 tags

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others,