Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability

09/05/2023 0 Comments 0 tags

Iranian nation-state groups have now joined financially motivated actors in actively exploiting a critical flaw in PaperCut print management software, Microsoft said. The tech giant’s threat intelligence team said it

New Ransomware Strain ‘CACTUS’ Exploits VPN Flaws to Infiltrate Networks

09/05/2023 0 Comments 0 tags

Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks.

MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web

08/05/2023 0 Comments 0 tags

The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company’s private code signing keys on their dark website. “Confirmed, Intel OEM private

Western Digital Confirms Customer Data Stolen by Hackers in March Breach

08/05/2023 0 Comments 0 tags

Digital storage giant Western Digital confirmed that an “unauthorized third party” gained access to its systems and stole personal information belonging to the company’s online store customers. “This information included

Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

08/05/2023 0 Comments 0 tags

Are you concerned about ransomware attacks? You’re not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there’s

SideCopy Using Action RAT and AllaKore RAT to infiltrate Indian Organizations

08/05/2023 0 Comments 0 tags

The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging themes related to the Indian military research organization as part of an ongoing phishing campaign. This involves using a ZIP

How to Set Up a Threat Hunting and Threat Intelligence Program

08/05/2023 0 Comments 0 tags

Threat hunting is an essential component of your cybersecurity strategy. Whether you’re getting started or in an advanced state, this article will help you ramp up your threat intelligence program.

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

08/05/2023 0 Comments 0 tags

An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

07/05/2023 0 Comments 0 tags

An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. “The attack is based on a

New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks

07/05/2023 0 Comments 0 tags

Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security flaw. The issue, assigned the identifier CVE-2023-30777, relates to