LilacSquid’s Cyber Espionage Tactics in IT, Energy, and Pharma
May 30, 2024
Since at least 2021, a data theft campaign involving targeted attacks across multiple industries in the United States (U.S.), Europe, and Asia has been associated with LilacSquid, a threat actor with a history of cyber espionage. In a new technical analysis released today, Cisco Talos analyst…
0 Comments4 Minutes
Check Point Alerts on VPN Zero-Day Attacks
May 29, 2024
Check Point has issued a warning regarding a zero-day vulnerability that is currently being exploited in the wild by threat actors. This vulnerability affects the company’s Network Security gateway devices. Affected products include CloudGuard Network, Quantum Maestro, Quantum Scalable…
0 Comments4 Minutes
WordPress Plugin Hack Steals Credit Card Info from E-Shops
May 28, 2024
WordPress code snippet plugins that are less well-known are being exploited by unknown threat actors to install malicious PHP code on victim websites. This code can harvest credit card information from customers. The campaign, discovered by Sucuri on May 11, 2024, involves the misuse of a WordPress…
0 Comments4 Minutes
New Phishing Techniques: Cloudflare Workers, HTML Smuggling, and GenAI
May 27, 2024
Phishing efforts that exploit Cloudflare Workers to deliver phishing sites have caught the attention of cybersecurity researchers. These sites are used to collect users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, known as…
0 Comments11 Minutes
Chrome Under Attack – Update ASAP
May 24, 2024
Google announced on Thursday that it has released patches to fix a significant security flaw in its Chrome browser, which has been actively exploited. The vulnerability, identified as CVE-2024-5274, is a type confusion bug found in the V8 JavaScript and WebAssembly engine. This issue was reported…
0 Comments3 Minutes
A Vulnerability in Apache Flink Is Being Actively Exploited
May 23, 2024
A Security Vulnerability in Apache Flink Is Being Actively Exploited, Says the CISA The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) list. This update includes a security flaw in Apache Flink, an open-source framework used…
0 Comments4 Minutes
Rockwell’s Call to Disconnect ICS from Internet
May 22, 2024
Rockwell Automation has issued a strong recommendation to its customers to disconnect any industrial control systems (ICS) that are not intended for internet connectivity due to an increase in cyber threats linked to global geopolitical tensions. This measure is essential to protect these systems…
0 Comments4 Minutes
Hackers Exploit Unicode in Cloud Services to Spread Malware
May 21, 2024
A new attack effort called CLOUD#REVERSER has been spotted using legitimate cloud storage services such as Google Drive and Dropbox to stage malicious payloads. “The VBScript and PowerShell scripts in CLOUD#REVERSER inherently involves command-and-control-like activities by using Google…
0 Comments5 Minutes
Google Patches Active Chrome Zero-Day Exploit
May 16, 2024
Google has resolved nine security flaws in its Chrome browser, including a critical zero-day vulnerability that has been actively exploited. This specific vulnerability, identified by the CVE code CVE-2024-4947, arises from a type confusion error within the WebAssembly and JavaScript engines of…
0 Comments3 Minutes
Google Launches AI-Enhanced Security for Android Phones
May 16, 2024
Google has unveiled a number of privacy and security enhancements for Android smartphones, including a sophisticated set of tools designed to protect users’ devices and data in the event of theft. These features are expected to be available through an update to Google Play services for…
0 Comments4 Minutes