IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

09/03/2023 0 Comments 0 tags

A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise networks belonging to several media and entertainment sector organizations across the world. The

New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access

09/03/2023 0 Comments 0 tags

Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that could enable a threat actor to take control of affected systems. The issue,

New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic

09/03/2023 0 Comments 0 tags

The infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt to carry out cryptojacking operations. According to Fortinet FortiGuard Labs, the attack chain

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

09/03/2023 0 Comments 0 tags

A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to code execution on targeted systems. The flaws, tracked as CVE-2023-27898 and CVE-2023-27905, impact

Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments

08/03/2023 0 Comments 0 tags

High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor known as Sharp Panda since late last year. The intrusions

Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity

08/03/2023 0 Comments 0 tags

The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity in South Korea twice within a span of a year. While the

Syxsense Platform: Unified Security and Endpoint Management

08/03/2023 0 Comments 0 tags

As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize to handle endpoint security and management. This can leave gaps

CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems

08/03/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below –

Why Healthcare Can’t Afford to Ignore Digital Identity

07/03/2023 0 Comments 0 tags

Investing in digital identity can improve security, increase clinical productivity, and boost healthcare’s bottom line. — by Gus Malezis, CEO of Imprivata Digitalization has created immeasurable opportunities for businesses over the past

Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps

07/03/2023 0 Comments 0 tags

A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage campaign targeting Indian and Pakistani Android users with a backdoor called CapraRAT. “Transparent