Category: hacking attacks

“Unmasking the Cyber Threats: Nefarious Packages on NPM Registry and Their Hunt by Cybersecurity Researchers”

“Unmasking the Cyber Threats: Nefarious Packages on NPM Registry and Their Hunt by Cybersecurity Researchers”

Malicious Packages Found in NPM Package Registry Key Points: Cybersecurity researchers discover malicious packages on npm package registry. These packages are aimed to exfiltrate developer sensitive info. Phylum identified these packages first on July 31, 2023 with increasing functionality. After being removed, they were then re-uploaded under different names. Malicious Packages Aim to Steal Developer

Read More
“Chronic Cybersecurity Woes: The Persistent Exploitation of a Four-Year-Old Fortinet Flaw in 2022”

“Chronic Cybersecurity Woes: The Persistent Exploitation of a Four-Year-Old Fortinet Flaw in 2022”

Main Points: – A four-year-old critical security flaw affecting Fortinet FortiOS SSL has been identified as one of the most consistently and frequently exploited vulnerabilities in 2022. – Older software vulnerabilities have been more frequently exploited by malicious cyber actors in 2022 than recently disclosed vulnerabilities. – Cybersecurity and intelligence agencies globally are finding that

Read More
Mastering the Mystery: How Versioning Allows Cyber Threats to Circumvent Google Play Store Security

Mastering the Mystery: How Versioning Allows Cyber Threats to Circumvent Google Play Store Security

How Cunning Threat Actors Use the Versioning Magic Trick to Bypass Google Play Store’s Defences Threat actors are using a technique known as versioning to slip past Google Play Store’s security measures targeting Android users. These malicious operations usually aim to steal user credentials, data, and finances, as reported by Google Cybersecurity Action Team (GCAT)

Read More
“Unmasking Rilide: The Stealthy Malware Threat to Chromium Browsers”

“Unmasking Rilide: The Stealthy Malware Threat to Chromium Browsers”

A Sneaky Peeky Browser Pest: Rilide Malware Main Points: – Cybersecurity researchers uncover a new version of Rilide malware that targets Chromium-based web browsers. – The malware displays a high level of sophistication through modular design and code obfuscation. – The Rilide malware has adapted to the Chrome Extension Manifest V3. – It has the

Read More
Navigating the Cyberstorm: Understanding the Rising Complexity and Cost of Cyber Threats

Navigating the Cyberstorm: Understanding the Rising Complexity and Cost of Cyber Threats

<h1> The Increasing Cost and Complexity of Cyber Threats </h1> <ul> <li>Cyber threats are continually evolving in frequency and complexity. </li> <li>Organizations are dealing with more sensitive data, and data breaches can cause severe financial and reputational loss.</li> <li>Cybersecurity Ventures predicts cybercrime costs to reach $8 trillion in 2023, and will skyrocket to $10.5 trillion

Read More
“Microsoft’s Warning: Rising Cyber Threats to Stadium Operations and the Sports World”

“Microsoft’s Warning: Rising Cyber Threats to Stadium Operations and the Sports World”

Summary of Main Points Microsoft alerts the risk malicious hackers pose to stadium operations, The cyber risk-surface of live sporting events is growing rapidly, The data pertaining to athletic performance, competitive advantage, and personal information is an enticing target, Sports teams, major leagues, and global events are under the threat. Warning Whistle from Microsoft on

Read More
“Unmasking Midnight Blizzard: Microsoft Reveals Cyber Threats via Teams Platform”

“Unmasking Midnight Blizzard: Microsoft Reveals Cyber Threats via Teams Platform”

Microsoft Detects Highly Targeted Cyber Attacks via Teams Platform – Microsoft identifies sophisticated attacks via its Teams chats. – The assaults are accredited to a Russian group known as Midnight Blizzard. – This group is also globally recognized under other aliases like APT29, BlueBravo, Cozy Bear, Iron Hemlock, and The Dukes. The Covert Operation of

Read More
“Surviving the Cybersecurity Storm: Understanding the Ivanti EPMM Vulnerability and Its Implications”

“Surviving the Cybersecurity Storm: Understanding the Ivanti EPMM Vulnerability and Its Implications”

# One Man’s Trash is Another Man’s “Breach”: Ivanti EPMM vulnerability Exploited Main points: * Recently, cybersecurity researchers discovered a hack for a vulnerability in older versions of Ivanti Endpoint Manager Mobile (EPMM). * Ivanti has urged all users to update to the latest version of the software. * This vulnerability is known as CVE-2023-35082

Read More
Unraveling the Web: Uncovering the Russian Cyber Adversary’s 94 New Domains

Unraveling the Web: Uncovering the Russian Cyber Adversary’s 94 New Domains

A New Web of Intrigue: Russian Link to 94 New Domains – Russian related cyber adversary tied to 94 new domains. – Group is thought to be actively altering infrastructure due to public disclosures. – Cybersecurity company, Recorded Future, identified the link to a threat actor known as BlueCharlie or alternatively as Blue Callisto or

Read More
“Rise in Unpatchable Industrial Control System Vulnerabilities: A 2023 Overview”

“Rise in Unpatchable Industrial Control System Vulnerabilities: A 2023 Overview”

Industrial Control System Vulnerabilities: A Rising Threat Main Points: First half of 2023 saw a significant rise in unpatchable vulnerabilities impacting industrial control systems (ICSs). 34% of reported vulnerabilities lacked any patch or remediation strategy, marking an increase from last year’s 13%. The data is collected and compiled by SynSaber through the U.S. Cybersecurity and

Read More
0

Your Cart Is Empty

No products in the cart.