How SSL Misconfigurations Impact Your Attack Surface

02/04/2025 0 Comments 0 tags

When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity, and visibility to attackers as well as users make

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

02/04/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials. “Outlaw is a Linux malware that

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers

02/04/2025 0 Comments 0 tags

Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National Institute of Standards and Technology

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

02/04/2025 0 Comments 0 tags

The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name)

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

02/04/2025 0 Comments 0 tags

Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems. “Hijack Loader released

Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform

01/04/2025 0 Comments 0 tags

On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign

01/04/2025 0 Comments 0 tags

Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners. Cloud security firm Wiz said the activity is a variant of

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing

01/04/2025 0 Comments 0 tags

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android. Lucid’s

New Case Study: Global Retailer Overshares CSRF Tokens with Facebook

01/04/2025 0 Comments 0 tags

Are your security tokens truly secure? Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations.

China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

01/04/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and