threat actors
CISA Alert Calls Out Operating System Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the Federal Bureau of Investigations (FBI) has jointly issued a Secure by Design Alert in response to threat actor campaigns that exploit ...
Security Boulevard
Report Details Reemergence of Lockbit 3.0 Ransomware Syndicate
An analysis of ransomware attacks claimed to have been perpetrated by cybercriminal syndicates that was published today by NCC Group, a provider of managed security services, finds LockBit 3.0 has reemerged to ...
Security Boulevard
Alert: Palo Alto Networks Prey to RedTail Malware Exploits
Wajahat Raja | | Advanced Evasion Techniques, Akamai Security, cryptocurrency mining, Cryptojacking, CVE-2024-3400, Cyber Threats, Cybersecurity Alert, Cybersecurity News, enterprise cybersecurity, Firewall Exploit, Malware Detection, Nation-State Cyber Attacks, Network Security, Palo Alto Networks, PAN-OS Vulnerability, Private Mining Pools, RedTail Malware, security updates, Supply chain cyberattacks, threat actors, XMRig miner
In a recent development, threat actors behind the RedTail cryptojacking mining malware have expanded their arsenal by exploiting a newly disclosed IT infrastructure security flaw in Palo Alto Networks firewall exploit. This ...
Barcelona Cybersecurity Congress: The Bad Guys Are Winning
The bad guys are winning. That’s the glum takeaway from the just concluded Barcelona Cybersecurity Congress that saw some 11,000 cybersecurity experts from more than 100 countries in attendance. There’s a long ...
Security Boulevard
MadMxShell Malware: Google Ads Malvertising Campaign Alert
Wajahat Raja | | Backdoor malware, Cybersecurity Measures, Cybersecurity News, DLL side-loading, dns tunneling, Endpoint Protection, Google Ads malvertising, MadMxShell malware, Malicious JavaScript, threat actors, Typosquatting domains
In a recent discovery, a malicious campaign has surfaced, employing Google Ads to distribute a newly identified backdoor malware called MadMxShell. This campaign is orchestrated through a network of deceptive domains resembling ...
Google Chrome DBSC Protection Tested Against Cookie Attacks
Wajahat Raja | | Authentication, Browser Security, Cookie Theft, cryptography, Cybersecurity, Cybersecurity News, Device-Bound Session Credentials (DBSC), Google Chrome, malware protection, Public Key Infrastructure (PKI), Session Security, threat actors, Trusted Platform Module (TPM), Web Standards, Zero Day Attacks
In light of cookie stealing attacks and to ensure Chrome browser protection, Google has recently piloted its new Chrome DBSC. The device-bound session credentials (DBSC) are aimed at protecting users against cookie ...
LayerSlider Plugin Flaw Exposes 1M Sites To SQL Injections
Wajahat Raja | | CVE-2024-2879, Cybersecurity, Cybersecurity News, Data breach, exploitation, LayerSlider Plugin, patch management, security flaw, sql injection, threat actors, vulnerability, vulnerability assessment, Website Protection, Website Security, wordpress security
Recent media reports have revealed a crucial LayerSlider plugin flaw. According to these reports, this flaw has exposed numerous WordPress sites to SQL attacks and infections. If exploited, the flaw allows users ...
CISA SharePoint Vulnerability Warning: RCE Flaw Exploited
Wajahat Raja | | Attack sequence, Authentication protocols, cisa, Common Vulnerability Scoring System (CVSS), CVE-2023-24955, Cyber Threats, Cybersecurity Measures, Cybersecurity News, Cybersecurity updates, federal agencies, Known Exploited Vulnerabilities (KEV), Microsoft, Network Security, patch management, Proactive defense, Remote Code Execution (RCE), Security Strategies, sharepoint, threat actors, Vulnerability warning
In light of recent cyber threats, a CISA SharePoint vulnerability warning has been issued. According to media reports, threat actors are exploiting the remote code execution flaw to launch arbitrary code, which ...
Evasive Panda Cyber Attacks: Threat Actor Targets Tibetans
Wajahat Raja | | Advanced persistent threat (APT), China-linked Hackers, cyber attacks, Cyber Espionage, Cybersecurity, Cybersecurity News, ESET, Evasive Panda, malicious code, Malware Tactics, MgBot, Monlam Festival, Nightdoor Backdoor, Supply Chain Attacks, threat actors, Tibetans, watering hole attacks
Cybersecurity experts at ESET have come across a malicious campaign that targets Tibetans in many countries by leveraging the website of a religious gathering. Evasive Panda cyber attacks are associated with a ...
Python Snake Info Stealer Spreading Via Facebook Messages
Wajahat Raja | | credential theft, cyber attacks, cyber defense, cyber threat intelligence, Cyber threat landscape, Cybereason, Cybersecurity, Cybersecurity Measures, Cybersecurity News, Data breaches, Facebook Messages, GitLab, Information Stealing, Malicious Scripts, Malware, Proactive Security, PyInstaller, Python Snake Info Stealer, threat actors, Web Browsers
As per recent reports, threat actors are increasingly leveraging Facebook messages to distribute the Python Snake Info Stealer malware. Researchers have noticed that threat actors are using three variants of the information ...