Visual Studio is a powerful integrated development environment from Microsoft and it’s primarily used for developing apps on the “.NET framework.” It supports various programming languages which include “C#,” “VB.NET,” and “C++.” The Cyble Research and Intelligence Labs recently identified that hackers have turned the Visual Studio code into a remote access tool. Researchers … [Read more...]
New Perfctl Malware Attacking Millions of Linux Servers
A sophisticated and elusive malware known as “Perfctl,” has been discovered targeting millions of Linux servers worldwide. Researchers at Aqua Nautilus have shed light on this malware, which has been actively exploiting over 20,000 types of misconfigurations in Linux servers over the past 3-4 years. The Perfctl malware is particularly persistent and employs several advanced techniques to … [Read more...]
How To Collect Malware Indicators Of Compromise In The ANY.RUN Sandbox
Indicators of Compromise (IOCs) are critical forensic artifacts that cybersecurity researchers use to “detect,” “investigate,” and “mitigate” security threats. As these digital clues contain “suspicious IP addresses,” “malware signatures,” or “unusual system behavior patterns.” So, all these elements are used by researchers to identify and respond to cyberattacks. The interactive … [Read more...]
Here is How Analysts Use Telegram API to Intercept Data Exfiltrated by Malware
Threat actors are increasingly relying on Telegram and Discord apps for data exfiltration. Analysts at ANY.RUN shared a detailed guide to intercepting data stolen by malware from infected machines via these apps. The researchers outlined each step of the process and provided actionable tips that can be useful in threat investigations. Collecting Threat Actors’ Chat ID and Bot Token To start … [Read more...]
Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals
Doppler, the leading platform in secrets management, today announces the launch of Change Requests, a new feature providing engineering teams with a secure, auditable approval process for managing and controlling secret changes across environments. Designed to enhance security, compliance, and team collaboration, Change Requests gives organizations the tools to mitigate the potential risks from … [Read more...]
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where they shared their findings on how malicious browser extensions are bypassing Google’s latest standard for building chrome extensions: Manifest V3 (MV3)’s security features, putting millions of users and businesses at risk. SquareX’s research team publicly … [Read more...]
Webinar Announcement: Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack Surface Management (ASM) can help organizations proactively detect and mitigate cyber threats. The webinar will feature a Criminal IP ASM Live Demo, providing a comprehensive view of attack surface visibility. As cyber threats continue to evolve, businesses must strengthen … [Read more...]
Nigerian Hackers Sentenced for Business Email Compromise Targeting Businesses in U.S
Oludayo Kolawole John Adeagbo, a dual citizen of Nigeria and the United Kingdom has been sentenced to seven years for his involvement in a sophisticated business email compromise (BEC) scheme. The scheme targeted various entities in the United States, resulting in attempted thefts of over $3 million. A Complex Scheme Unveiled According to Justice Gov reports, Adeagbo, also known as … [Read more...]
Record Breaking 3.8 Tbps DDoS attack With Packet rate of 340 million Pps
Cloudflare has successfully mitigated the largest Distributed Denial of Service (DDoS) attack ever recorded, peaking at a staggering 3.8 terabits per second (Tbps) with a packet rate of 340 million packets per second (Pps). This attack marks a significant milestone in the ongoing battle against cyber threats, highlighting both the challenges and advancements in cybersecurity. A mitigated … [Read more...]
ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats
ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify and analyze emerging cyber threats. This upgrade underscores ANY.RUN’s commitment to providing comprehensive threat intelligence solutions, empowering users to navigate the ever evolving landscape of cyber threats. About Threat Intelligence Lookup The main page of ANY.RUN TI … [Read more...]
Chrome Security Vulnerabilities Let Attackers Execute Arbitrary Code
Google has released a critical security update for its Chrome browser, addressing multiple high-severity vulnerabilities that could potentially allow attackers to execute arbitrary code on users’ systems. The latest stable channel update, version 129.0.6668.89/.90 for Windows and Mac and 129.0.6668.89 for Linux, is being rolled out to users worldwide. Analyse Any Suspicious Links Using … [Read more...]
Arc Browser Announces Bug Bounty Program Following RCE Vulnerability
The Browser Company has launched a Bug Bounty Program for its Arc Browser following the discovery and swift resolution of a remote code execution (RCE) vulnerability. CEO Josh made the announcement, emphasizing the company’s commitment to transparency and proactive security measures. CVE-2024-45489: A Swift Response The vulnerability, CVE-2024-45489, was reported on August 25 and … [Read more...]
PoC Exploit Released for Microsoft Office 0-day Flaw – CVE-2024-38200
Security researchers have released a proof-of-concept (PoC) exploit for the recently disclosed Microsoft Office vulnerability CVE-2024-38200, which could allow attackers to capture users’ NTLMv2 hashes. This high-severity flaw affects multiple versions of Microsoft Office, including Office 2016, Office 2019, Office LTSC 2021, and Microsoft 365 Apps for Enterprise. The vulnerability, … [Read more...]
14 DrayTek Routers Vulnerabilities Let Hackers Hijack 700K Devices Remotely
Researchers have identified fourteen new vulnerabilities in DrayTek Vigor routers, including a critical remote code execution flaw rated 10 out of 10 on the CVSS severity scale. DrayTek, a Taiwanese networking equipment maker, offers advanced routers with VPN, firewalls, and bandwidth management for residential and business use. Widely deployed in industries like healthcare, retail, and … [Read more...]
Ivanti Endpoint Manager Vulnerability Public Exploit is Now Used in Cyber Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability to its Known Exploited Vulnerabilities Catalog. Cybercriminals have used public exploits in recent attacks targeting Ivanti endpoints. Ivanti is a U.S.-based IT software company that provides enterprise software solutions for managing IT assets, IT service management, and cybersecurity. … [Read more...]
Cisco Small Business Routers Vulnerabilities Allow Attacker Exploits It Remotely
In a recent security advisory, Cisco has disclosed multiple vulnerabilities affecting its Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers. Additionally, Cisco has issued a security advisory regarding a critical vulnerability in its Nexus Dashboard Fabric Controller (NDFC). These vulnerabilities could allow an authenticated, remote attacker to elevate … [Read more...]
Cisco Nexus Vulnerability Let Attackers Launch Command Injection Attack
Cisco has issued a security advisory regarding a critical vulnerability in its Nexus Dashboard Fabric Controller (NDFC). This flaw could allow an authenticated, low-privileged, remote attacker to perform a command injection attack on affected devices. The vulnerability arises from improper user authorization and insufficient validation of command arguments. Details of the … [Read more...]
Tor Browser 13.5.6 Released – What’s New!
The Tor Browser 13.5.6 has been released with crucial security updates for Firefox and several enhancements and bug fixes across all platforms. Notably, NoScript has been updated to version 11.4.40, and issues such as download spam prevention affecting browser extensions have been resolved (bug tor-browser#42832). Bug Fixes: tor-browser#42832: Resolved an issue where download spam … [Read more...]
Red Barrels IT Systems Breached by Nitrogen Ransomware Group
Montreal-based video game developer Red Barrels, known for its critically acclaimed Outlast series, has recently experienced a significant cybersecurity breach. The attack, attributed to the Nitrogen Ransomware Group, has reportedly compromised 1.8 terabytes of sensitive data, including game source codes and confidential information. Red Barrels confirmed the breach in an official … [Read more...]
Mario Duarte, Former Snowflake Cybersecurity Leader, Joins Aembit as CISO to Tackle Non-Human Identities
Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly head of security at Snowflake, joins Aembit with a deep commitment to address pressing gaps in non-human identity security. Duarte’s journey in cybersecurity began with a passion for penetration testing, sparked by the 1980s cult classic film … [Read more...]
- 1
- 2
- 3
- …
- 143
- Next Page »