50 Threat Hunting Hypothesis ExamplesThreat hunting is a proactive and critical aspect of cybersecurity that involves searching for signs of malicious activity on your organization’s networks...
Month: March 2023
Booking.com account takeover flaw shows possible pitfalls in OAuth implementations
Booking.com account takeover flaw shows possible pitfalls in OAuth implementationsBooking.com, one of the world's largest online travel agencies, recently patched a vulnerability in its implementation of...
Software liability reform is liable to push us off a cliff
Software liability reform is liable to push us off a cliffLike “SBOMs will solve everything,” there is a regular cry to reform software liability, specifically in...
Gitpod flaw shows cloud-based development environments need security assessments
Gitpod flaw shows cloud-based development environments need security assessmentsResearchers from cloud security firm Snyk recently discovered a vulnerability that would have allowed attackers to perform full...
White House releases an ambitious National Cybersecurity Strategy
White House releases an ambitious National Cybersecurity StrategyThe White House released its long-anticipated National Cybersecurity Strategy, a comprehensive document that offers fundamental changes in how the...
6 reasons why your anti-phishing strategy isn’t working
6 reasons why your anti-phishing strategy isn’t workingPhishing attempts are typically like fishing in a barrel — given enough time, a bad actor is 100% likely...
Blackbaud penalized $3M for not disclosing the full scope of ransomware attack
Blackbaud penalized $3M for not disclosing the full scope of ransomware attackSoftware firm Blackbaud has agreed to pay a $3 million penalty for failing to disclose...
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast Asia
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast AsiaThe recently identified Dark Pink advanced persistent threat (APT) group is likely behind a fresh...
5 signs you’ve fallen for a scam – and what to do next
5 signs you’ve fallen for a scam – and what to do nextHere’s how to know you have fallen victim to a scam – and what...
Blackbaud Settles $3m Charge Over Ransomware Attack
Blackbaud Settles $3m Charge Over Ransomware AttackSEC claims company filed misleading disclosuresRead MoreSEC claims company filed misleading disclosures
Investment Fraud is Now Biggest Cybercrime Earner
Investment Fraud is Now Biggest Cybercrime EarnerCategory surged 127% year-on-year, says FBIRead MoreCategory surged 127% year-on-year, says FBI
Final Three Sentenced in £70m Money Laundering Case
Final Three Sentenced in £70m Money Laundering CaseLondon-based group also illegally obtained COVID relief fundsRead MoreLondon-based group also illegally obtained COVID relief funds
Unlocking the Benefits and Trade-Offs of Agentless Cloud Security
Unlocking the Benefits and Trade-Offs of Agentless Cloud SecurityAgentless cloud security solutions were among the most talked-about topics during the Cloud & Cyber Security Expo, set...
Infostealers Spread Via AI-Generated YouTube Videos
Infostealers Spread Via AI-Generated YouTube VideosInfostealers observed to be delivered via these videos included Vidar, RedLine and RaccoonRead MoreInfostealers observed to be delivered via these videos...
Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities
Dark Pink APT Group Deploys KamiKakaBot Against South Asian EntitiesThe relationship between Europe and ASEAN countries is being exploited with social engineering luresRead MoreThe relationship between...
Remote Code Execution and Camera Access Flaws Found in Smart Intercoms
Remote Code Execution and Camera Access Flaws Found in Smart Intercoms13 vulnerabilities were found in the E11 smart intercom devices by Chinese manufacturer AkuvoxRead More13 vulnerabilities...
The risk of pasting confidential company data into ChatGPT
The risk of pasting confidential company data into ChatGPTExperts warn that employees are providing sensitive corporate data to the popular artificial intelligence chatbot model ChatGPT. Researchers...
CISA adds Plex Media Server bug, exploited in LastPass attack, to Known Exploited Vulnerabilities Catalog
CISA adds Plex Media Server bug, exploited in LastPass attack, to Known Exploited Vulnerabilities CatalogUS CISA added remote code execution vulnerability in Plex Media Server to...
Dark Pink APT targets Govt entities in South Asia
Dark Pink APT targets Govt entities in South AsiaResearchers reported that Dark Pink APT employed a malware dubbed KamiKakaBot against Southeast Asian targets. In February 2023,...
Golang-Based Botnet GoBruteforcer targets web servers
Golang-Based Botnet GoBruteforcer targets web serversA recently discovered Golang-based botnet, dubbed GoBruteforcer, is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services Researchers from Palo...
Air-Gapped Computers Vulnerable to Data Stealing Through Internal Speakers
Air-Gapped Computers Vulnerable to Data Stealing Through Internal SpeakersSouth Korean researchers presented a new covert channel attack named CASPER. It uses internal speakers to leak data...
Fake Job Proposals Used to Deploy Malware – Security Researchers Targeted
Fake Job Proposals Used to Deploy Malware – Security Researchers TargetedNorth Korean based threat actors are believed to be actively seeking security researchers and media outlets with...
The Dark Side of Eurovision 2023: How Scammers Are Targeting Fans
The Dark Side of Eurovision 2023: How Scammers Are Targeting FansTickets for the Eurovision Song Contest in Liverpool sold out in less than an hour on...
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers Threat actors tracked as 8220 Gang have been observed leveraging a...
Emotet Returns, Now Adopts Binary Padding for Evasion
Emotet Returns, Now Adopts Binary Padding for EvasionFollowing a three-month hiatus, Emotet spam activities resumed in March 2023, when a botnet known as Epoch 4 began...
SYS01 stealer targets Facebook business accounts and browser credentials
SYS01 stealer targets Facebook business accounts and browser credentialsThe SYS01 infection chain uses DLL sideloading to steal information. Learn how to protect your business from this...
How internet-facing webcams could put your organization at risk
How internet-facing webcams could put your organization at riskBy exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them...
New Hiatus malware campaign targets routers
New Hiatus malware campaign targets routersA new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn which...
STALKER 2 game developer hacked by Russian hacktivists, data stolen
STALKER 2 game developer hacked by Russian hacktivists, data stolenGSC Game World, the developer of the highly-anticipated 'STALKER 2: Heart of Chornobyl' game, warned their systems...
Hackers steal $197 million in crypto in Euler Finance attack
Hackers steal $197 million in crypto in Euler Finance attackLending protocol Euler Finance was hit by a cryptocurrency flash loan attack on Sunday, with the threat...





























