LottieFiles Issues Warning About Compromised “lottie-player” npm Package

31/10/2024 0 Comments 0 tags

LottieFiles has revealed that its npm package “lottie-player” was compromised as part of a supply chain attack, prompting it to release an updated version of the library. “On October 30th

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

31/10/2024 0 Comments 0 tags

In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as “the new perimeter”, the identity stands between safe data management and

LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites

31/10/2024 0 Comments 0 tags

A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The

North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

30/10/2024 0 Comments 0 tags

Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and

Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware

30/10/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta’s advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. “The hackers behind the campaign use trusted

Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information

30/10/2024 0 Comments 0 tags

A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made

Embarking on a Compliance Journey? Here’s How Intruder Can Help

30/10/2024 0 Comments 0 tags

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria

Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code

30/10/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims’ crypto

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

29/10/2024 0 Comments 0 tags

The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

29/10/2024 5 Comments 0 tags

Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When