Continuous Security Validation with Penetration Testing as a Service (PTaaS)

09/08/2023 0 Comments 0 tags

Validate security continuously across your full stack with Pen Testing as a Service. In today’s modern security operations center (SOC), it’s a battle between the defenders and the cybercriminals. Both

China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign

09/08/2023 0 Comments 0 tags

Hackers associated with China’s Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia, Europe, and North America from 2021 to 2023. Cybersecurity firm

Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs

09/08/2023 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. Called Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569), the novel methods follow the disclosure

LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes

08/08/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could be maliciously abused by threat actors to conduct post-exploitation activities.  “LOLBAS is an attack method that uses

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

08/08/2023 0 Comments 0 tags

An unknown threat actor is using a variant of the Yashma ransomware to target various entities in English-speaking countries, Bulgaria, China, and Vietnam at least since June 4, 2023. Cisco

Understanding Active Directory Attack Paths to Improve Security

08/08/2023 0 Comments 0 tags

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies for all network endpoints. With it,

Hackers Abusing Cloudflare Tunnels for Covert Communications

08/08/2023 0 Comments 0 tags

New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert communication channels from compromised hosts and retain persistent access. “Cloudflared is functionally very similar to ngrok,”

QakBot Malware Operators Expand C2 Network with 15 New Servers

08/08/2023 0 Comments 0 tags

The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The findings are a continuation of the malware’s

New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs

07/08/2023 0 Comments 0 tags

A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with the goal of delivering a remote access trojan (RAT) capable

FBI Alert: Crypto Scammers are Masquerading as NFT Developers

07/08/2023 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as legitimate non-fungible token (NFT) developers to steal cryptocurrency and other digital assets from unsuspecting users. In