Category: hacking attacks

Malicious Toolkit Targeting Apple macOS Systems Discovered by Cybersecurity Researchers

Malicious Toolkit Targeting Apple macOS Systems Discovered by Cybersecurity Researchers

Cybersecurity Researchers Find Malicious Toolkit Targeting Apple macOS Systems Introduction Cybersecurity researchers from Bitdefender have recently discovered a malicious toolkit that specifically targets Apple macOS systems. The malicious artifacts are part of a sophisticated toolkit, which has been found to be largely undetected so far. The Details According to Bitdefender researchers Andrei Lapusneanu and Bogdan

Read More
Best Practices for Secure Infrastructure as Code: Mitigating Risks and Maximizing Benefits

Best Practices for Secure Infrastructure as Code: Mitigating Risks and Maximizing Benefits

then processed and executed by automation tools. This helps to streamline the deployment process and ensures consistency across environments. However, misconfigurations in these files can lead to infrastructures that are insecure and unstable. One of the main reasons for these misconfigurations is the lack of knowledge and experience among developers in implementing secure IaC practices.

Read More
Sustained Cyber Attacks Target Middle East and African Governments

Sustained Cyber Attacks Target Middle East and African Governments

affairs.” • Middle Eastern and African governments targeted in cyber-espionage attacks • Attackers using unique credential theft and email exfiltration techniques • Goal is to obtain sensitive information related to politicians, military activities, and foreign affairs According to a recent report, governmental entities in the Middle East and Africa have been facing waves of sustained

Read More
Microsoft’s Azure, Outlook and OneDrive Experience Service Outages Due to Cyberattack

Microsoft’s Azure, Outlook and OneDrive Experience Service Outages Due to Cyberattack

Security concerns arise as Microsoft experiences service outages due to cyberattack Introduction Microsoft suffered from a series of service outages earlier this month on their Azure, Outlook, and OneDrive services. They claim that the origin of the outages was due to a mysterious cluster they call Storm-1359. The Attack – Cluster Storm-1359 The Storm-1359 cluster

Read More
“Uncovering Diicot: New DDoS Attack Payloads Discovered by Researchers”

“Uncovering Diicot: New DDoS Attack Payloads Discovered by Researchers”

the actor pastes an image into their ransom note that shows a police badge from the aforementioned unit, a potential attempt to create a sense of legitimacy or perhaps intimidate victims into paying the ransom.” Who is Diicot and What Have Researchers Discovered? Diicot is a Romanian threat actor that has been discovered to have

Read More
ChamelGang Expands Capabilities with New Linux Malware – ChamelDoH: A DNS-over-HTTPS Backdoor

ChamelGang Expands Capabilities with New Linux Malware – ChamelDoH: A DNS-over-HTTPS Backdoor

ChamelGang Expands Capabilities with New Linux Malware Overview The notorious threat actor, ChamelGang, has been discovered using a new malware to backdoor Linux systems. This expansion of the group’s capabilities has been observed by cybersecurity researchers from Stairwell. ChamelDoH The newly discovered malware is called ChamelDoH and is a C++-based tool for communicating via DNS-over-HTTPS (DoH)

Read More
Adaptation of Threat Actors: Trends and Necessity of Security Assessments

Adaptation of Threat Actors: Trends and Necessity of Security Assessments

adaptation of tactics, techniques, and procedures (TTPs) by threat actors in today’s ever-evolving threat landscape. Adaptation of Threat Actors The report highlights how threat actors are continuously adapting and evolving their tactics to bypass traditional security measures, particularly during the COVID-19 pandemic. Many cybercriminals have shifted their focus to target remote workers, exploiting vulnerabilities in

Read More
“Russian National Charged with Deploying Global LockBit Ransomware Attacks: Legal Consequences and Global Efforts to Combat Cybercrime”

“Russian National Charged with Deploying Global LockBit Ransomware Attacks: Legal Consequences and Global Efforts to Combat Cybercrime”

week and is currently in custody awaiting trial. LockBit Ransomware Attack The U.S. DoJ has charged a Russian national with deploying the LockBit ransomware to targets in the U.S., Asia, Europe, and Africa. Ruslan Magomedovich Astamirov, 20, has been accused of perpetrating five attacks between August 2020 and March 2023. Ransomware Impacting Global Targets Astamirov’s

Read More
“Third Vulnerability Found in Progress Software’s MOVEit Transfer Application, Exploited by Cl0p”

“Third Vulnerability Found in Progress Software’s MOVEit Transfer Application, Exploited by Cl0p”

software company Progress Software has suffered yet another vulnerability in its MOVEit Transfer application. The vulnerability is an SQL injection flaw that could lead to escalated privileges for attackers, giving them potential unauthorized access to the environment. The group known as Cl0p has been using extortion tactics against affected companies. This is the third vulnerability

Read More
New Multi-Stage Malware Loader “DoubleFinger” Delivers Cryptocurrency Stealer “GreetingGhoul” to Targets in Europe, the U.S., and Latin America

New Multi-Stage Malware Loader “DoubleFinger” Delivers Cryptocurrency Stealer “GreetingGhoul” to Targets in Europe, the U.S., and Latin America

New Multi-Stage Malware Loader Delivers Cryptocurrency Stealer GreetingGhoul What’s Happening? A new multi-stage malware loader called DoubleFinger has been discovered delivering a cryptocurrency stealer known as GreetingGhoul. This sophisticated attack targets users in Europe, the U.S., and Latin America. The first stage of DoubleFinger’s loader is executed when the victim opens a malicious PIF attachment

Read More
0

Your Cart Is Empty

No products in the cart.