Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

06/12/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors to gain initial access to government servers. “The vulnerability in

Scaling Security Operations with Automation

06/12/2023 0 Comments 0 tags

In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources often hinder security teams when combatting these threats, making it

Sierra:21 – Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

06/12/2023 0 Comments 0 tags

A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like TinyXML and OpenNDS. Collectively tracked as Sierra:21, the issues expose over 86,000 devices across

New Report: Unveiling the Threat of Malicious Browser Extensions

06/12/2023 0 Comments 0 tags

Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to the browser and can enhance browsing experiences, have become a

Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts

06/12/2023 0 Comments 0 tags

Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks. The service enables threat actors

Russia’s AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany

05/12/2023 0 Comments 0 tags

The Russia-linked influence operation called Doppelganger has targeted Ukrainian, U.S., and German audiences through a combination of inauthentic news sites and social media accounts. These campaigns are designed to amplify

Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack

05/12/2023 0 Comments 0 tags

A new “post-exploitation tampering technique” can be abused by malicious actors to visually deceive a target into believing that their Apple iPhone is running in Lockdown Mode when it’s actually

Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability

05/12/2023 0 Comments 0 tags

Microsoft on Monday said it detected Kremlin-backed nation-state activity exploiting a now-patched critical security flaw in its Outlook email service to gain unauthorized access to victims’ accounts within Exchange servers.

New Threat Actor ‘AeroBlade’ Emerges in Espionage Attack on U.S. Aerospace

05/12/2023 0 Comments 0 tags

A previously undocumented threat actor has been linked to a cyber attack targeting an aerospace organization in the U.S. as part of what’s suspected to be a cyber espionage mission.

15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack

05/12/2023 0 Comments 0 tags

New research has found that over 15,000 Go module repositories on GitHub are vulnerable to an attack called repojacking. “More than 9,000 repositories are vulnerable to repojacking due to GitHub