Iran-Linked UNC1549 Hackers Target Middle East Aerospace & Defense Sectors

29/02/2024 0 Comments 0 tags

An Iran-nexus threat actor known as UNC1549 has been attributed with medium confidence to a new set of attacks targeting aerospace, aviation, and defense industries in the Middle East, including Israel and

Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28’s MooBot Threat

28/02/2024 0 Comments 0 tags

In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other countries are urging users of Ubiquiti EdgeRouter to take protective measures, weeks after a botnet comprising

Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub

27/02/2024 0 Comments 0 tags

An “intricately designed” remote access trojan (RAT) called Xeno RAT has been made available on GitHub, making it available to other actors at no extra cost. Written in C# and compatible with

WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk

27/02/2024 0 Comments 0 tags

A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable unauthenticated users to escalate their privileges. Tracked as CVE-2023-40000, the vulnerability was addressed in October

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

27/02/2024 0 Comments 0 tags

A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more than 200,000 active installations. The vulnerability, tracked as CVE-2024-1071, carries a CVSS score of

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

27/02/2024 0 Comments 0 tags

Cybersecurity researchers have found that it’s possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models submitted by users and result in supply chain attacks. “It’s

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

27/02/2024 0 Comments 0 tags

Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving tactics of the Russian state-sponsored threat actor known as APT29. The hacking outfit, also

From Alert to Action: How to Speed Up Your SOC Investigations

27/02/2024 0 Comments 0 tags

Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can significantly enhance their ability to do so. Let’s find out

Banking Trojans Target Latin America and Europe Through Google Cloud Run

27/02/2024 0 Comments 0 tags

Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking trojans such as Astaroth (aka Guildma), Mekotio, and Ousaban (aka Javali) to

Three Tips to Protect Your Secrets from AI Accidents

27/02/2024 0 Comments 0 tags

Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For Large Language Models,” reaching a 1.0 document in August and a 1.1