Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery

09/05/2024 0 Comments 0 tags

Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous Mirai botnet. That’s according to findings from Juniper Threat Labs, which said the vulnerabilities CVE-2023-46805 and

New Guide: How to Scale Your vCISO Services Profitably

09/05/2024 0 Comments 0 tags

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a full-time CISO. A vCISO can answer this need by offering on-demand access

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

09/05/2024 0 Comments 0 tags

Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. “The campaign sent emails with content intended to arouse the

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

09/05/2024 0 Comments 0 tags

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

08/05/2024 0 Comments 0 tags

A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability

Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

08/05/2024 0 Comments 0 tags

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. “These enhancements aim to increase the malware’s stealthiness, thereby

The Fundamentals of Cloud Security Stress Testing

08/05/2024 0 Comments 0 tags

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to

New Spectre-Style ‘Pathfinder’ Attack Targets Intel CPU, Leak Encryption Keys and Data

08/05/2024 0 Comments 0 tags

Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard (AES) algorithm. The techniques have been collectively dubbed Pathfinder by a

A SaaS Security Challenge: Getting Permissions All in One Place 

08/05/2024 0 Comments 0 tags

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

07/05/2024 0 Comments 0 tags

The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to