VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates

24/01/2024 0 Comments 0 tags

The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive “criminal affiliate program,” new findings from Infoblox

Patch Your GoAnywhere MFT Immediately – Critical Flaw Lets Anyone Be Admin

24/01/2024 0 Comments 0 tags

A critical security flaw has been disclosed in Fortra’s GoAnywhere Managed File Transfer (MFT) software that could be abused to create a new administrator user. Tracked as CVE-2024-0204, the issue carries

Apple Issues Patch for Critical Zero-Day in iPhones, Macs – Update Now

23/01/2024 0 Comments 0 tags

Apple on Monday released security updates for iOS, iPadOS, macOS, tvOS, and Safari web browser to address a zero-day flaw that has come under active exploitation in the wild. The

FTC Bans InMarket for Selling Precise User Location Without Consent

23/01/2024 0 Comments 0 tags

The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket Media from selling or licensing precise location data. The settlement is part of

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

23/01/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new Java-based “sophisticated” information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts. The malware, named NS-STEALER, is propagated via ZIP archives

52% of Serious Vulnerabilities We Find are Related to Windows 10

23/01/2024 0 Comments 0 tags

We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we found. Digging into the data The dataset we analyze here is representative of a subset

MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

23/01/2024 0 Comments 0 tags

Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to

North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor

23/01/2024 0 Comments 0 tags

Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a new campaign orchestrated by a threat actor known as ScarCruft in December 2023. “ScarCruft has

Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks

22/01/2024 0 Comments 0 tags

Cybersecurity researchers are warning of a “notable increase” in threat actor activity actively exploiting a now-patched flaw in Apache ActiveMQ to deliver the Godzilla web shell on compromised hosts. “The

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

20/01/2024 0 Comments 0 tags

An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been linked to the abuse of a critical vulnerability in