Alert! Hackers Exploiting Critical Vulnerability in VMware’s Aria Operations Networks

22/06/2023 0 Comments 0 tags

VMware has flagged that a recently patched critical command injection vulnerability in Aria Operations for Networks (formerly vRealize Network Insight) has come under active exploitation in the wild. The flaw,

New Condi Malware Hijacking TP-Link Wi-Fi Routers for DDoS Botnet Attacks

22/06/2023 0 Comments 0 tags

A new malware called Condi has been observed exploiting a security vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers to rope the devices into a distributed denial-of-service (DDoS) botnet. Fortinet FortiGuard Labs said the

Chinese Hacker Group ‘Flea’ Targets American Ministries with Graphican Backdoor

22/06/2023 0 Comments 0 tags

Foreign affairs ministries in the Americas have been targeted by a Chinese state-sponsored actor named Flea as part of a recent campaign that spanned from late 2022 to early 2023. The cyber

Critical ‘nOAuth’ Flaw in Microsoft Azure AD Enabled Complete Account Takeover

22/06/2023 0 Comments 0 tags

A security shortcoming in Microsoft Azure Active Directory (AD) Open Authorization (OAuth) process could have been exploited to achieve full account takeover, researchers said. California-based identity and access management service

Startup Security Tactics: Friction Surveys

22/06/2023 0 Comments 0 tags

When we do quarterly planning, my team categorizes our goals within four evergreen outcomes: Reduce the risk of information security incidents Increase trust in Vanta’s information security program Reduce the friction

New Report Exposes Operation Triangulation’s Spyware Implant Targeting iOS Devices

22/06/2023 0 Comments 0 tags

More details have emerged about the spyware implant that’s delivered to iOS devices as part of a campaign called Operation Triangulation. Kaspersky, which discovered the operation after becoming one of the targets

ScarCruft Hackers Exploit Ably Service for Stealthy Wiretapping Attacks

22/06/2023 0 Comments 0 tags

The North Korean threat actor known as ScarCruft has been observed using an information-stealing malware with previous undocumented wiretapping features as well as a backdoor developed using Golang that exploits

Introducing AI-guided Remediation for IaC Security / KICS

21/06/2023 0 Comments 0 tags

While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices, the speed and flexibility that IaC provides can also introduce

Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems

21/06/2023 0 Comments 0 tags

Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. “As of now, these samples are still largely

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions

21/06/2023 0 Comments 0 tags

A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and over 70 web browser extensions. First advertised on April 25, 2023, for