Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs

02/02/2024 0 Comments 0 tags

Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

01/02/2024 0 Comments 0 tags

Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. “The campaign deploys a benign container generated using the Commando project,” Cado security researchers

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

01/02/2024 0 Comments 0 tags

The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. “The vulnerability

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

01/02/2024 0 Comments 0 tags

Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly a year

Why the Right Metrics Matter When it Comes to Vulnerability Management

01/02/2024 0 Comments 0 tags

How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you tell how well you’re doing, progressing, or

U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers

01/02/2024 0 Comments 0 tags

The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small office and home office (SOHO) routers hijacked by a China-linked state-sponsored threat

Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

01/02/2024 0 Comments 0 tags

Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity targeting Ivanti Connect Secure VPN and

RunC Flaws Enable Container Escapes, Granting Attackers Host Access

01/02/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage follow-on attacks.

CISA Warns of Active Exploitation of Critical Vulnerability in iOS, iPadOS, and macOS

01/02/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of

Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation

31/01/2024 0 Comments 0 tags

Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one of which is said to have come under targeted exploitation in the wild.