Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!

01/04/2023 0 Comments 0 tags

Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder plugin for WordPress. The flaw, described as a case of broken access control,

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

31/03/2023 0 Comments 0 tags

The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S. as part of an ongoing cyber espionage campaign. “TA473 since at

Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam

31/03/2023 0 Comments 0 tags

The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members of a cybercriminal gang that set up phishing sites to target European users.

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response

31/03/2023 0 Comments 0 tags

Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to minimize damage. They also aim to avoid follow on attacks or future related

3CX Supply Chain Attack — Here’s What We Know So Far

31/03/2023 0 Comments 0 tags

Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows and macOS are affected by a supply chain attack. The version numbers include 18.12.407 and

Researchers Detail Severe “Super FabriXss” Vulnerability in Microsoft Azure SFX

30/03/2023 0 Comments 0 tags

Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code execution. Tracked as CVE-2023-23383 (CVSS score: 8.2), the issue has been dubbed

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

30/03/2023 0 Comments 0 tags

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor called KEYPLUG. “RedGolf is a particularly prolific Chinese state-sponsored threat actor group

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

30/03/2023 0 Comments 0 tags

A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11 Wi-Fi protocol standard, impacting a wide range of devices running

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

30/03/2023 0 Comments 0 tags

A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials from API keys and secrets from popular cloud service providers. “The spread

Cyberstorage: Leveraging the Multi-Cloud to Combat Data Exfiltration

30/03/2023 0 Comments 0 tags

Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy for data management. “Multi-cloud by design,” and its companion the supercloud, is an