Quantcast
Channel: do son, Author at Cybersecurity News
Browsing all 1971 articles
Browse latest View live

APT-C-60 Exploits Legitimate Services in Sophisticated Malware Attack...

In August 2024, JPCERT/CC confirmed a targeted attack against a Japanese organization, believed to be the work of the threat group APT-C-60. This advanced campaign utilized legitimate services like...

View Article


International Cybercrime Ring Dismantled: Rydox Marketplace Seized and...

The U.S. Department of Justice announced the takedown of Rydox, a notorious online marketplace for stolen personal information and cybercrime tools. This operation, involving authorities in the U.S.,...

View Article


Secure Email Gateways Fail to Stop Advanced Phishing Campaign Targeting...

A detailed report from Group-IB reveals a sophisticated global phishing campaign targeting employees across 30 companies in 15 jurisdictions. By leveraging trusted domains and dynamic personalization,...

View Article

$5 Million Reward Offered After Indictment of North Korean Cyber Operatives

A federal court in St. Louis, Missouri, has indicted 14 nationals of the Democratic People’s Republic of Korea (DPRK) for a series of long-running conspiracies involving sanctions violations, wire...

View Article

Modular Java Backdoor Emerges in Cleo Exploitation Campaign (CVE-2024-50623)

Rapid7 Labs and its Managed Detection and Response (MDR) team uncovered a sophisticated modular Java-based Remote Access Trojan (RAT) deployed in a multi-stage attack targeting Cleo file transfer...

View Article


High-Profile Organizations in Southeast Asia Hit by Targeted Cyberattacks

The Symantec Threat Hunter Team has uncovered a sophisticated cyber campaign targeting high-profile organizations in Southeast Asia. Among the victims are government ministries in two countries, an air...

View Article

Active Exploitation Observed for CVE-2024-11972 (CVSS 9.8): WordPress Plugin...

A serious vulnerability in the Hunk Companion plugin for WordPress, tracked as CVE-2024-11972 (CVSS 9.8), has been discovered by the WPScan team. This flaw, present in versions below 1.9.0, allows......

View Article

Gamaredon APT Deploys Two Russian Android Spyware Families: BoneSpy and...

Researchers at the Lookout Threat Lab have uncovered two sophisticated Android spyware families, BoneSpy and PlainGnome, attributed to the Russian-aligned Advanced Persistent Threat (APT) group...

View Article


CVE-2024-55633: Apache Superset Vulnerability Exposes Sensitive Data to...

A newly discovered vulnerability in Apache Superset, a popular open-source business intelligence platform, could allow attackers to gain unauthorized write access to sensitive data. Tracked as...

View Article


Citrix NetScaler Under Siege: Significant Increase in Brute Force Attacks...

A significant increase in brute-force attacks targeting outdated and misconfigured Citrix NetScaler devices has been observed in Germany, prompting warnings from cybersecurity experts and...

View Article

PDQ Deploy Vulnerability Exposes Admin Credentials: CERT/CC Issues Advisory

A critical vulnerability in PDQ Deploy, a software deployment service used by system administrators, has been highlighted in a recent advisory by the CERT Coordination Center (CERT/CC). The flaw,...

View Article

Dell Warns of Critical Flaws in Enterprise Products, Including CVE-2024-37143...

Dell has released a critical security update to address multiple vulnerabilities impacting several of its enterprise products, including PowerFlex, InsightIQ, and Data Lakehouse. These vulnerabilities,...

View Article

Abusing Microsoft’s UI Automation Framework: The New Evasion Technique...

Akamai security researcher Tomer Peled has unveiled a novel attack technique exploiting Microsoft’s legacy UI Automation framework, a tool originally designed to enhance computer accessibility. The...

View Article


Over 15,000 Sites at Risk: Woffice WordPress Theme Vulnerabilities Could Lead...

Patchstack has disclosed two critical vulnerabilities in the widely used Woffice WordPress theme, a premium intranet/extranet solution with over 15,000 sales. Developed by Xtendify, the Woffice theme...

View Article

DCOM Upload & Execute: A New Backdoor Technique Unveiled

Deep Instinct Security Researcher Eliran Nissan has uncovered a new and potent lateral movement technique, “DCOM Upload & Execute,” redefining how attackers might exploit Distributed Component...

View Article


Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication

Kaspersky Labs has unveiled research on the return of “The Mask,” also known as Careto, a legendary Advanced Persistent Threat (APT) actor. After a decade-long silence since its last known... The post...

View Article

IOCONTROL Malware: CyberAv3ngers’ Weapon of Choice Targets Critical...

A sophisticated malware strain dubbed “IOCONTROL” has emerged as a significant threat to industrial control systems (ICS) and Internet of Things (IoT) devices, particularly in Israel and the United...

View Article


Critical Microsoft Azure MFA Bypass Exposed: What You Need to Know

Oasis Security’s research team has unveiled a critical vulnerability in Microsoft Azure’s Multi-Factor Authentication (MFA) system, exposing millions of users to potential breaches. The bypass...

View Article

New Android Banking Trojan Targets Indian Users Through Fake Apps

McAfee Labs has revealed the discovery of a new Android banking trojan targeting Indian users, exploiting the country’s dependence on utility and banking apps to steal sensitive financial information....

View Article

CVE-2024-11053 (CVSS 9.1): Curl Vulnerability Exposes User Credentials in...

A recently discovered vulnerability in the popular curl command line tool and library, tracked as CVE-2024-11053 and assigned a CVSS score of 9.1, could lead to the unintended exposure of... The post...

View Article
Browsing all 1971 articles
Browse latest View live