New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users

27/09/2024 0 Comments 0 tags

Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan called DCRat (aka DarkCrystal RAT) by means of a technique known as HTML smuggling. The

Cybersecurity Certifications: The Gateway to Career Advancement

27/09/2024 0 Comments 0 tags

In today’s fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber threats grow increasingly sophisticated, the demand for skilled cybersecurity professionals has never been higher. Whether

Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks

27/09/2024 0 Comments 0 tags

The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise

How to Plan and Prepare for Penetration Testing

27/09/2024 0 Comments 0 tags

As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware

U.S. Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering

27/09/2024 0 Comments 0 tags

The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a Russian national for his alleged involvement in the operation of several money laundering services that

Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers

27/09/2024 0 Comments 0 tags

A critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and

Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

26/09/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware

26/09/2024 0 Comments 0 tags

As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and

EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?

26/09/2024 0 Comments 0 tags

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks

26/09/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE and FPSpy. The activity has been attributed to an adversary tracked as Kimsuky,