How to Interpret the 2023 MITRE ATT&CK Evaluation Results

22/09/2023 0 Comments 0 tags

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

22/09/2023 0 Comments 0 tags

An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users in Brazil and Mexico. “The BBTok banker has a dedicated functionality

Do You Really Trust Your Web Application Supply Chain?

22/09/2023 0 Comments 0 tags

Well, you shouldn’t. It may already be hiding vulnerabilities. It’s the modular nature of modern web applications that has made them so effective. They can call on dozens of third-party

Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

22/09/2023 0 Comments 0 tags

Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could result in privilege escalation and information disclosure. The four security vulnerabilities, tracked from CVE-2023-40931 through

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace

22/09/2023 0 Comments 0 tags

Finnish law enforcement authorities have announced the takedown of PIILOPUOTI, a dark web marketplace that specialized in illegal narcotics trade since May 2022. “The site operated as a hidden service

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RAT

22/09/2023 0 Comments 0 tags

A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub with an aim to infect users who downloaded the code with Venom RAT

Ukrainian Hacker Suspected to be Behind “Free Download Manager” Malware Attack

22/09/2023 0 Comments 0 tags

The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that led to its website being used to distribute malicious Linux software. “It appears

Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

22/09/2023 0 Comments 0 tags

A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware.

China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers

22/09/2023 0 Comments 0 tags

China’s Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei’s servers, stealing critical data, and implanting backdoors since 2009, amid mounting geopolitical tensions between the two

The Rise of the Malicious App

22/09/2023 0 Comments 0 tags

Security teams are familiar with threats emanating from third-party applications that employees add to improve their productivity. These apps are inherently designed to deliver functionality to users by connecting to