14 Suspected Cybercriminals Arrested Across Africa in Coordinated Crackdown

18/08/2023 0 Comments 0 tags

A coordinated law enforcement operation across 25 African countries has led to the arrest of 14 suspected cybercriminals, INTERPOL announced Friday. The exercise, conducted in partnership with AFRIPOL, enabled investigators to identify

Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions

18/08/2023 0 Comments 0 tags

Google has announced plans to add a new feature in the upcoming version of its Chrome web browser to alert users when an extension they have installed has been removed

New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities

17/08/2023 0 Comments 0 tags

A new, financially motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw in GitLab as part of a cryptojacking and proxyjacking campaign. “The attacker utilized undetected signature-based tools, sophisticated

New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

17/08/2023 0 Comments 0 tags

Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly under the radar and main access to an Apple device even when

China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons

17/08/2023 0 Comments 0 tags

An ongoing cyber attack campaign originating from China is targeting the Southeast Asian gambling sector to deploy Cobalt Strike beacons on compromised systems.  Cybersecurity firm SentinelOne said the tactics, techniques,

NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security

17/08/2023 0 Comments 0 tags

A previously undetected attack method called NoFilter has been found to abuse the Windows Filtering Platform (WFP) to achieve privilege escalation in the Windows operating system. “If an attacker has the ability

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

17/08/2023 0 Comments 0 tags

An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The phishing attacks feature PDF documents with diplomatic lures, some of

Why You Need Continuous Network Monitoring?

17/08/2023 0 Comments 0 tags

Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer sit safely side-by-side on a corporate network, dev teams constantly

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

17/08/2023 0 Comments 0 tags

Multiple critical security flaws have been reported in Ivanti Avalanche, an enterprise mobile device management solution that’s used by 30,000 organizations. The vulnerabilities, collectively tracked as CVE-2023-32560 (CVSS score: 9.8), are stack-based buffer

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

17/08/2023 0 Comments 0 tags

Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part of its OpenSK security keys initiative. “This open-source hardware optimized implementation uses a novel ECC/Dilithium hybrid