Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks

29/11/2024 0 Comments 0 tags

Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including one that it said has been exploited in the wild.

Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

29/11/2024 0 Comments 0 tags

Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to steal Microsoft 365 account credentials. “This campaign employs an AitM

U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency

29/11/2024 0 Comments 0 tags

A 59-year-old U.S. citizen who immigrated from the People’s Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the

Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP

28/11/2024 0 Comments 0 tags

Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated

The Future of Serverless Security in 2025: From Logs to Runtime Protection

28/11/2024 0 Comments 0 tags

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

28/11/2024 0 Comments 0 tags

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. “Cybercriminals have

XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

28/11/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

28/11/2024 0 Comments 0 tags

U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These

Critical Flaw in ProjectSend Under Active Exploitation Against Public-Facing Servers

27/11/2024 0 Comments 0 tags

A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the wild, according to findings from VulnCheck. The vulnerability, originally patched over a

Latest Multi-Stage Attack Scenarios with Real-World Examples

27/11/2024 0 Comments 0 tags

Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first