Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating App

01/11/2023 0 Comments 0 tags

The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android spyware campaign targeting Arabic-speaking users with a counterfeit dating app designed to

N. Korean Lazarus Group Targets Software Vendor Using Known Flaws

28/10/2023 0 Comments 0 tags

The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor was compromised through the exploitation of known security flaws in another high-profile software.

F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution

27/10/2023 0 Comments 0 tags

F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution. The issue, rooted in the configuration utility component, has been assigned

Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

27/10/2023 0 Comments 0 tags

Google has announced that it’s expanding its Vulnerability Rewards Program (VRP) to reward researchers for finding attack scenarios tailored to generative artificial intelligence (AI) systems in an effort to bolster AI

How to Keep Your Business Running in a Contested Environment

27/10/2023 0 Comments 0 tags

When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it’s essential for them to establish comprehensive plans for preparation, mitigation, and response to potential

The Rise of S3 Ransomware: How to Identify and Combat It

26/10/2023 0 Comments 0 tags

In today’s digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the backbone of data storage for many major corporations.  Despite S3 being a

Critical OAuth Flaws Uncovered in Grammarly, Vidio, and Bukalapak Platforms

26/10/2023 0 Comments 0 tags

Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online services such as Grammarly, Vidio, and Bukalapak, building upon previous shortcomings uncovered in Booking[.]com and Expo.

Nation State Hackers Exploiting Zero-Day in Roundcube Webmail Software

26/10/2023 0 Comments 0 tags

The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail software on October 11, 2023, to harvest email messages from victims’ accounts. “Winter Vivern has

YoroTrooper: Researchers Warn of Kazakhstan’s Stealthy Cyber Espionage Group

26/10/2023 0 Comments 0 tags

A relatively new threat actor known as YoroTrooper is likely made up of operators originating from Kazakhstan. The assessment, which comes from Cisco Talos, is based on their fluency in Kazakh and

Critical Flaw in NextGen’s Mirth Connect Could Expose Healthcare Data

26/10/2023 0 Comments 0 tags

Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to update to the latest version following the discovery of an unauthenticated remote code execution vulnerability.