Anatomy of an Attack

20/08/2024 0 Comments 0 tags

In today’s rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves

Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

20/08/2024 0 Comments 0 tags

A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an unnamed university in Taiwan. “The most notable feature of this backdoor is that

Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America

20/08/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted entities and individuals in Colombia, Ecuador, Chile, Panama, and other Latin American nations.

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

20/08/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its Known Exploited Vulnerabilities (KEV) catalog, following its exploitation in ransomware attacks. The

Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information

20/08/2024 0 Comments 0 tags

Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that have been found susceptible to leaking sensitive customer information. “A potential issue in NetSuite’s

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

19/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. “These attacks are opportunistic in nature, targeting users seeking popular business software,”

New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

19/08/2024 0 Comments 0 tags

A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT and Mimikatz. The Cyberint Research Team, which discovered the malware,

Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group

19/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of potential FIN7 activity “indicate communications inbound to FIN7 infrastructure from

Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group

19/08/2024 0 Comments 0 tags

A newly patched security flaw in Microsoft Windows was exploited as a zero-day by Lazarus Group, a prolific state-sponsored actor affiliated with North Korea. The security vulnerability, tracked as CVE-2024-38193

Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks

19/08/2024 0 Comments 0 tags

Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. “Attackers can use Xeon