Proof of Concept (PoC) exploit has been released for a critical vulnerability in Cisco’s Integrated Management Controller (IMC). This flaw, identified as CVE-2024-20356, allows for command injection and could enable attackers to gain root access to affected systems. Overview of the Vulnerability The vulnerability resides in the web-based management interface of the Cisco Integrated … [Read more...]
Hackers Posing as LastPass Employee to Steal Master Password & Hijack Accounts
In a sophisticated cyber attack, hackers have been discovered impersonating LastPass employees in an elaborate phishing campaign designed to steal users’ master passwords and hijack their accounts. This alarming development was recently highlighted by LastPass on their official blog, shedding light on the dangers posed by the CryptoChameleon phishing kit. The campaign, initially identified … [Read more...]
New Redline Stealer Variant Leverages Lua Bytecode For Stealthiness
Redline Stealer is a powerful information-stealing malware, and hackers often exploit this stealthy stealer to gain unauthorized access to a victim’s sensitive data. Threat actors can steal many sensitive and valuable data by exploiting the Redline Stealer. Threat actors can use The stolen data later for financial gain or other malicious purposes. Cybersecurity researchers at McAfee … [Read more...]
Cisco IMC Command Injection Vulnerability Under Active Attack
An attacker with read-only or higher privileges on a Cisco Integrated Management Controller (IMC) can exploit a command injection vulnerability (CVE-2024-20295) to gain full control (root access) of the underlying operating system. The vulnerability exists due to insufficient validation of user-supplied input on the IMC CLI and there are no workarounds available, but software updates to … [Read more...]
Cerber Linux Ransomware Exploits Atlassian Servers To Take Full Control
Hackers often use Linux ransomware due to its prevalence in server environments. This type of ransomware offers higher potential payouts from organizations with critical data. Cybersecurity analysts at Cado Security Labs recently analyzed the Linux variant of the Cerber ransomware, which is being deployed on Confluence servers via CVE-2023-22518, after receiving recent reports. Unlike … [Read more...]
“Cybercrime Index” Ranks: Russia, Ukraine, and China at the Top
A new “Cybercrime Index” has been introduced, ranking countries based on the threat level posed by cybercriminals. The Index reveals that many countries, led by Russia, Ukraine, and China, are the primary hubs for cybercriminal activities globally. Key Findings from the Study The World Cybercrime Index, developed through a partnership between the University of Oxford, and UNSW, and … [Read more...]
Chrome Security Update: 23 Vulnerabilities Fixed in Latest Release
Google has announced a comprehensive update to the Chrome and Extended Stable channels. The latest release, version 124.0.6367.60/.61 for Windows and Mac and version 124.0.6367.60 for Linux, addresses 23 security vulnerabilities. This update underscores Google’s ongoing commitment to safeguarding users against the evolving landscape of cyber threats. Version and Platform … [Read more...]
R00TK1T Claims that They have Acquired Confidential Data from Nestle
The hacker group known as R00TK1T has announced that it has successfully entered the systems of Nestle, the world’s largest food and beverage company, and acquired confidential data. The claim was made through a social media post, which has since caught the attention of cybersecurity experts and corporate watchdogs. R00TK1T took to social media to declare their latest cyber conquest. … [Read more...]
Kubernetes Clusters Under Attack: Critical OpenMetadata Vulnerabilities Exploited
Microsoft Security recently revealed a sophisticated cyber-attack campaign that targets Kubernetes clusters by exploiting newly discovered vulnerabilities in the OpenMetadata platform. The attackers have set their sights on Kubernetes workloads, leveraging critical vulnerabilities in the OpenMetadata platform to infiltrate and exploit these systems for cryptomining activities. … [Read more...]
Authorities Busted Cybercrime Platform That Steal Passwords & Card Details
International law enforcement agencies have successfully dismantled a notorious cybercrime platform, LabHost, which facilitated criminals in conducting phishing attacks to steal sensitive information such as passwords, addresses, and card details from unsuspecting victims worldwide. This collaborative effort underscores the increasing global commitment to combating cybercrime and … [Read more...]
Cisco Unveils Hypershield: AI-Powered Automated Vulnerability Shield
Cisco introduced its latest innovation, Cisco Hypershield, marking a significant milestone in the evolution of cybersecurity. Described as the most consequential security product in the company’s history, Hypershield is a cloud-native, AI-powered solution designed to enhance the security of AI-scale data centers. This new technology is integrated directly into the network’s fabric, … [Read more...]
Cisco IOS SNMP Implementation Flaw Trigger Remote Attacks
In a recent security advisory, Cisco disclosed a significant vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature within its IOS and IOS XE Software. This flaw could potentially allow an unauthenticated, remote attacker to bypass ACLs and perform SNMP polling on devices that were configured to deny such … [Read more...]
Poisoned Google Ads Targeting Infra Teams with Weaponized IP Scanners
Security researchers uncovered a sophisticated malvertising campaign targeting IT professionals, particularly those in security and network administration roles. The threat actor behind this attack has been leveraging Google Ads to distribute trojanized versions of popular IP scanning and IT management software. Attack Chain The attack begins with the threat actor registering multiple … [Read more...]
Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a leading firewall solution, Xiid Corporation reminds organizations that Xiid SealedTunnel customers remain secure. This latest vulnerability, currently unpatched and rated 10/10 on the CVSS (Common Vulnerability Scoring System), highlights the limitations of traditional security approaches. Xiid … [Read more...]
5 Sandbox Tools for Phishing Analysis in 2024
There is a wide variety of solutions one can use to investigate phishing attacks. Yet, in most cases, analysts can do with just one, a malware analysis sandbox. Thanks to its combination of static and dynamic capabilities, a sandbox is well-equipped to tackle the most complex phishing threats out there. Check out these five sandbox tools you can use in your work. Interactivity For … [Read more...]
Tor Browser 13.0 Released: What’s New
Tor Browser 13.0.14 has been released, bringing essential security updates to the popular privacy-focused web browser. This latest version includes updates to the underlying Firefox browser and several bug fixes and improvements. Critical Updates in Tor Browser 13.0.14 Updated Tor to 0.4.8.11: The Tor network software has been updated to the latest stable version, 0.4.8.11, which … [Read more...]
“Mobile NotPetya”!! Surge in Zero-click Vulnerabilities, Conditions Favour
The cybersecurity community is sounding the alarm about the growing risk of a “mobile NotPetya” event – a self-propagating mobile malware outbreak that could have devastating consequences. Over the past year, the alarming increase in the discovery and exploitation of zero-click vulnerabilities in mobile operating systems drives this concern. alarming increase in the discovery and … [Read more...]
Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation
Attackers tried to take over the JavaScript project from OpenJS Foundation, which is home to JavaScript projects utilized by billions of websites globally. This is similar to the incident that was recently disclosed and targeted at the open-source XZ Utils tracked as (CVE-2024-3094). The XZ Utils software supply chain breach was the outcome of a highly skilled social engineering … [Read more...]
LeakyCLI: New Vulnerability Exposes Credentials In AWS, Azure & Google Cloud
Multiple Cloud Service providers like Google Cloud, AWS, and Azure have been discovered with a new vulnerability that has been termed “LeakyCLI.” As the name suggests, the Command line interfaces of Google Cloud (Gcloud CLI), AWS (AWSCLI), and Azure (Azure CLI) expose sensitive information in the form of environment variables. This vulnerability was assigned with CVE-2023-36052, and the … [Read more...]
How Secure Is Your Active Directory? 5 Critical Vulnerabilities to Watch Out For
Microsoft’s Active Directory (AD) serves as the central nervous system for your organization’s network. It guards company resources by ensuring that only authorized users have access to any given network and database sections. A well-designed AD structure is a fantastic way to safeguard the company against intended or unintended malicious employee actions and outside attacks that may have … [Read more...]
- 1
- 2
- 3
- …
- 78
- Next Page »