Category: hacking attacks

Unmasking the New and Improved Atomic Stealer Malware: Trends, Tricks and Defensive Tactics

Unmasking the New and Improved Atomic Stealer Malware: Trends, Tricks and Defensive Tactics

New Malvertising Campaign Spreading Updated Atomic Stealer Malware A new malvertising campaign is spreading an updated version of the macOS stealer malware, Atomic Stealer. Atomic Stealer, first seen in April 2023, is an off-the-shelf Golang malware costing a whopping $1,000 per month. New variants of the malware have been seen since its inception, with improved

Read More
“Rise of vCISO Services: Predicted 5-Fold Increase by 2024 and its Impact on MSPs and MSSPs”

“Rise of vCISO Services: Predicted 5-Fold Increase by 2024 and its Impact on MSPs and MSSPs”

Soaring Skywards: vCISO Services Rise by Almost 5 Fold by End 2024 By 2024, a substantial increase in the number of Managed Services Providers (MSPs) and Managed Security Services Providers (MSSPs) offering virtual Chief Information Security Officer (vCISO) services is anticipated. This growth reflects the escalating demand for specialized cybersecurity expertise in business environments. This

Read More

“Enhancing Apache SuperSet Security: Details on New Patches and Version 2.1.1 Update”

Apache SuperSet Security Gets a Boost with New Patches Main Points: Two new vulnerabilities in Apache SuperSet have been patched. These vulnerabilities (CVE-2023-39265 and CVE-2023-37941) could allow remote code execution by attackers. The update, version 2.1.1, addresses these security breaches by securing Superset’s metadata database. New Patches Head off Security Threats Don’t we all love

Read More
“Unveiling Pandora: The Uninvited TV Guest Exploiting Android Devices”

“Unveiling Pandora: The Uninvited TV Guest Exploiting Android Devices”

Relax with Pandora? More like Wreak Havoc with Pandora A new strain of Mirai botnet known as Pandora is infiltrating affordable Android-based TV sets and TV boxes. Pandora is part of a botnet conducting distributed denial-of-service (DDoS) security attacks. Doctor Web reveals that either malicious firmware updates or the installation of pirated video content might

Read More
“Storm-0558 Strikes: How a Chinese Threat Actor Circumvented Microsoft’s Security”

“Storm-0558 Strikes: How a Chinese Threat Actor Circumvented Microsoft’s Security”

The Great Cache Heist: Chinese-Based Threat Storm-0558 Acquires Microsoft’s Inactive Consumer Signing Key Main points: – China-based threat actor known as Storm-0558 acquired an inactive consumer signing key, compromising Microsoft’s system. – The compromise allowed Storm-0558 to access debugging environment containing a crash dump from April 2021. – The attack was facilitated by the compromise

Read More
“Android Security Update: Google Battles High-Risk Zero-Day Bug with New Patches”

“Android Security Update: Google Battles High-Risk Zero-Day Bug with New Patches”

Google Drops New Android Security Patches; Targets Pesky Zero-Day Bug – Google releases monthly security update for Android, including fixes for a zero-day vulnerability. – The vulnerability, classified as CVE-2023-35674, is a high-risk privilege escalation problem impacting the Android Framework. – Google suggests that CVE-2023-35674 may be under targeted exploitation. Monthly Security Patches Roll Out

Read More
Unraveling APT34: A Fresh Look at Their Intricate SideTwist Phishing Attack Strategy

Unraveling APT34: A Fresh Look at Their Intricate SideTwist Phishing Attack Strategy

A Sneaky SideTwist from APT34 APT34, the notorious Iranian threat actor, has been associated with a new phishing attack that aids in deploying a backdoor variant known as SideTwist. The attack technology applied by APT34 is considered highly advanced, indicates NSFOCUS Security Labs. The bad actor is capable of designing unique intrusion tactics for diverse

Read More
“Inside the Role of CISOs: Navigating Digital Threats and Driving Business Innovation”

“Inside the Role of CISOs: Navigating Digital Threats and Driving Business Innovation”

CISOs: The New Masters of the Tech Universe As the digital landscape complexifies, the role of the Chief Information Security Officer (CISO) is becoming increasingly central to businesses’ success. CISOs are tasked with managing digital threats, fostering innovation, and maintaining business continuity. Insights from three notable CISOs reveal their experiences and strategies in the field.

Read More
“Unveiling the Nine Security Flaws in Schweitzer Engineering Labs’ Power Management Products”

“Unveiling the Nine Security Flaws in Schweitzer Engineering Labs’ Power Management Products”

Breakdown of Schweitzer Engineering Labs’ Security Flaws Main Points Nine security flaws were identified in electrical power management products made by Schweitzer Engineering Laboratories (SEL). The most critical of these could potentially allow Remote Code Execution (RCE) on an engineering workstation. The issues are tracked as CVE-2023-34392 and CVE-2023-31168 as per Nozomi Networks’ report. Detailed

Read More
Unmasking the Hidden Phishing Empire Targeting Microsoft 365 Business Users

Unmasking the Hidden Phishing Empire Targeting Microsoft 365 Business Users

Unveiling the Secret Phishing Empire Attacking Microsoft 365 Business Emails An unknown “phishing empire” has been attacking Microsoft 365 business email accounts for the past six years. The cybercriminal created a secretive marketplace called W3LL Store for a closed community of at least 500 threat actors. These threat actors could buy a customized phishing kit

Read More
0

Your Cart Is Empty

No products in the cart.