Global Police Operation Disrupts ‘LabHost’ Phishing Service, Over 30 Arrested Worldwide

18/04/2024 0 Comments 0 tags

As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime service called LabHost that has been used by criminal actors to steal personal credentials from

How to Conduct Advanced Static Analysis in a Malware Sandbox

18/04/2024 0 Comments 0 tags

Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in

New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks

18/04/2024 0 Comments 0 tags

A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest extraction and parsing procedure. The malware is “notable for

Recover from Ransomware in 5 Minutes—We will Teach You How!

18/04/2024 0 Comments 0 tags

Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near

Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor

18/04/2024 0 Comments 0 tags

A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell. “The threat actor registered multiple look-alike

Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

18/04/2024 0 Comments 0 tags

Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That’s according to the Microsoft Threat Intelligence

Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks

17/04/2024 0 Comments 0 tags

A previously undocumented “flexible” backdoor called Kapeka has been “sporadically” observed in cyber attacks targeting Eastern Europe, including Estonia and Ukraine, since at least mid-2022. The findings come from Finnish cybersecurity firm

Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign

17/04/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new campaign that’s exploiting a recently disclosed security flaw in Fortinet FortiClient EMS devices to deliver ScreenConnect and Metasploit Powerfun payloads. The activity entails the

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

17/04/2024 0 Comments 0 tags

Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence

GenAI: A New Headache for SaaS Security Teams

17/04/2024 0 Comments 0 tags

The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to