Microsoft’s March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws

13/03/2024 0 Comments 0 tags

Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including two critical issues impacting Windows Hyper-V that could lead to denial-of-service (DoS) and remote code

Watch Out: These PyPI Python Packages Can Drain Your Crypto Wallets

12/03/2024 0 Comments 0 tags

Threat hunters have discovered a set of seven packages on the Python Package Index (PyPI) repository that are designed to steal BIP39 mnemonic phrases used for recovering private keys of a cryptocurrency

CTEM 101 – Go Beyond Vulnerability Management with Continuous Threat Exposure Management

12/03/2024 0 Comments 0 tags

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for

South Korean Citizen Detained in Russia on Cyber Espionage Charges

12/03/2024 0 Comments 0 tags

Russia has detained a South Korean national for the first time on cyber espionage charges and transferred from Vladivostok to Moscow for further investigation. The development was first reported by Russian news

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

12/03/2024 0 Comments 0 tags

A new malware campaign is leveraging a high-severity security flaw in the Popup Builder plugin for WordPress to inject malicious JavaScript code. According to Sucuri, the campaign has infected more than

New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics

11/03/2024 0 Comments 0 tags

Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing PDF attachments. “This intricate attack involves the PDF downloading a ZIP file

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

11/03/2024 0 Comments 0 tags

The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from GuidePoint Security, which responded

Data Leakage Prevention in the Age of Cloud Computing: A New Approach

11/03/2024 0 Comments 0 tags

As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

11/03/2024 0 Comments 0 tags

A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities into its arsenal in order to opportunistically breach edge devices and public-facing services and deploy malware on compromised

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

11/03/2024 0 Comments 0 tags

Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially