Bad.Build Flaw in Google Cloud Build Raises Concerns of Privilege Escalation

20/07/2023 0 Comments 0 tags

Cybersecurity researchers have uncovered a privilege escalation vulnerability in Google Cloud that could enable malicious actors tamper with application images and infect users, leading to supply chain attacks. The issue,

Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations

20/07/2023 0 Comments 0 tags

On April 5, 2023, the FBI and Dutch National Police announced the takedown of Genesis Market, one of the largest dark web marketplaces. The operation, dubbed “Operation Cookie Monster,” resulted in

Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware

20/07/2023 0 Comments 0 tags

The prolific China-linked nation-state actor known as APT41 has been linked to two previously undocumented strains of Android spyware called WyrmSpy and DragonEgg. “Known for its exploitation of web-facing applications

CISA and NSA Issue New Guidance to Strengthen 5G Network Slicing Against Threats

20/07/2023 0 Comments 0 tags

U.S. cybersecurity and intelligence agencies have released a set of recommendations to address security concerns with 5G standalone network slicing and harden them against possible threats. “The threat landscape in 5G is

How to Manage Your Attack Surface?

20/07/2023 0 Comments 0 tags

Attack surfaces are growing faster than security teams can keep up. To stay ahead, you need to know what’s exposed and where attackers are most likely to strike. With cloud

FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks

19/07/2023 0 Comments 0 tags

The financially motivated threat actor known as FIN8 has been observed using a “revamped” version of a backdoor called Sardonic to deliver the BlackCat ransomware. According to the Symantec Threat Hunter Team, part

Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground

19/07/2023 0 Comments 0 tags

Discover stories about threat actors’ latest tactics, techniques, and procedures from Cybersixgill’s threat experts each month. Each story brings you details on emerging underground threats, the threat actors involved, and

VirusTotal Data Leak Exposes Some Registered Customers’ Details

19/07/2023 0 Comments 0 tags

Data associated with a subset of registered customers of VirusTotal, including their names and email addresses, were exposed after an employee inadvertently uploaded the information to the malware scanning platform.

Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware

19/07/2023 0 Comments 0 tags

An unidentified threat actor compromised an application used by multiple entities in Pakistan to deliver ShadowPad, a successor to the PlugX backdoor that’s commonly associated with Chinese hacking crews. Targets included a

Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack Websites

18/07/2023 0 Comments 0 tags

Threat actors are actively exploiting a recently disclosed critical security flaw in the WooCommerce Payments WordPress plugin as part of a massive targeted campaign. The flaw, tracked as CVE-2023-28121 (CVSS score: 9.8),