Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

05/04/2024 0 Comments 0 tags

Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

05/04/2024 0 Comments 0 tags

Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack

From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

05/04/2024 0 Comments 0 tags

Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened,

CISO Perspectives on Complying with Cybersecurity Regulations

05/04/2024 0 Comments 0 tags

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

04/04/2024 0 Comments 0 tags

An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. “The phishing emails use a unique vehicle incident lure

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

04/04/2024 0 Comments 0 tags

A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

04/04/2024 0 Comments 0 tags

New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks. The technique has been codenamed HTTP/2 CONTINUATION Flood by security researcher Bartek

Considerations for Operational Technology Cybersecurity

04/04/2024 0 Comments 0 tags

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly

Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

04/04/2024 0 Comments 0 tags

Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws

Attack Surface Management vs. Vulnerability Management

03/04/2024 0 Comments 0 tags

Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they’re not the same. The main difference between attack surface management and vulnerability management is