Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer

12/06/2023 0 Comments 0 tags

Security researchers have warned about an “easily exploitable” flaw in the Microsoft Visual Studio installer that could be abused by a malicious actor to impersonate a legitimate publisher and distribute

New Critical MOVEit Transfer SQL Injection Vulnerabilities Discovered – Patch Now!

11/06/2023 0 Comments 0 tags

Progress Software, the company behind the MOVEit Transfer application, has released patches to address brand new SQL injection vulnerabilities affecting the file transfer solution that could enable the theft of

New SPECTRALVIPER Backdoor Targeting Vietnamese Public Companies

11/06/2023 0 Comments 0 tags

Vietnamese public companies have been targeted as part of an ongoing campaign that deploys a novel backdoor called SPECTRALVIPER. “SPECTRALVIPER is a heavily obfuscated, previously undisclosed, x64 backdoor that brings PE

5 Reasons Why Access Management is the Key to Securing the Modern Workplace

09/06/2023 0 Comments 0 tags

The way we work has undergone a dramatic transformation in recent years. We now operate within digital ecosystems, where remote work and the reliance on a multitude of digital tools

Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions

09/06/2023 0 Comments 0 tags

The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early 2020. “It is a crimeware group that targets bank customers and cryptocurrency

Microsoft Uncovers Banking AitM Phishing and BEC Attacks Targeting Financial Giants

09/06/2023 0 Comments 0 tags

Banking and financial services organizations are the targets of a new multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) attack, Microsoft has revealed. “The attack originated from a compromised

Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

09/06/2023 0 Comments 0 tags

A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa. “Stealth Soldier malware is an undocumented backdoor that primarily operates

RAMP'ing Up Community-Based Cybersecurity Education and Workforce Development

08/06/2023 0 Comments 0 tags

CYBERSECURITY EDUCATION AND WORKFORCE DEVELOPMENT FUNDING OPPORTUNITY Today at the annual NICE Conference & Expo, Rodney Petersen, the Director of NICE, announced a new Notice of Funding Opportunity (NOFO) from

How to Improve Your API Security Posture

08/06/2023 0 Comments 0 tags

APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn’t come without major risks. Hackers can exploit

Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021

08/06/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software’s