North Korean IT Workers Extort Western Firms

North Korean IT Workers Extort Western Firms

North Korean IT Workers, who have been known to secure jobs in Western companies under false identities, are stepping up their tactics. Previously focused on stealing intellectual property, they are now extorting their employers by demanding ransoms to prevent the release of stolen data. This new…


0 Comments5 Minutes

Cicada3301 Ransomware: Inside the Affiliate Scheme

Cicada3301 Ransomware: Inside the Affiliate Scheme

Cybersecurity experts have recently accessed the affiliate panel of Cicada3301, a new ransomware-as-a-service (RaaS) operation. This access has allowed them to gain more information about the platform, which is still in its early development phase. You might be interested in: 7 Data Breach…


0 Comments4 Minutes

Hackers Exploit EDRSilencer to Evade Security

Hackers Exploit EDRSilencer to Evade Security

Trend Micro has identified that cyber attackers are attempting to use the open-source tool EDRSilencer in their operations. They're repurposing it to avoid being spotted by security systems. You might be interested in: 7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month What is…


0 Comments3 Minutes

Malware Campaign Deploys DarkVision RAT via PureCrypter

Malware Campaign Deploys DarkVision RAT via PureCrypter

Cybersecurity researchers have recently identified a new malware campaign that is actively spreading a remote access trojan (RAT) known as DarkVision RAT. The malicious actors behind this campaign are utilizing a malware loader called PureCrypter to deliver the RAT to unsuspecting victims. This…


0 Comments9 Minutes

7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month

7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month

Celebrating Cybersecurity Awareness Month! Hi everyone, I’m Dan Duran, and since it’s Cybersecurity Awareness Month, I want to shine a light on some of the biggest hacks in history. These stories not only reveal how vulnerable we can be but also teach essential security concepts every developer and…


0 Comments6 Minutes

Fortinet Flaw Triggers CISA Alert, Patches from Cisco, Palo Alto

On Wednesday, the United States Cybersecurity and Infrastructure Security Agency (CISA) flagged a major security vulnerability affecting Fortinet devices by adding it to the Known Exploited Vulnerabilities (KEV) database. This action was taken due to confirmed instances of the vulnerability being…


0 Comments5 Minutes

Ivanti CSA Vulnerabilities in Active Exploitation

Ivanti CSA Vulnerabilities in Active Exploitation

Ivanti has alerted its customers to three new security flaws affecting its Cloud Service Appliance (CSA). These vulnerabilities are now being actively exploited by attackers. You might be interested in: Serious Security Flaw in WordPress LiteSpeed Cache Plugin The Utah-based software company…


0 Comments4 Minutes

Facebook Data Ads Face E.U. Restrictions

E.U. Limits Meta’s Facebook Ads Data

A Big Change for Meta Platforms In a major decision, the highest court in Europe has ruled that Meta Platforms, the company behind Facebook, must limit how it uses personal data for targeted ads. Even if users have agreed to share their information, Meta now faces restrictions on how they can…


0 Comments4 Minutes

Serious Security Flaw in WordPress LiteSpeed Cache Plugin

Serious Security Flaw in WordPress LiteSpeed Cache Plugin

Overview of the LiteSpeed Cache Plugin Issue A serious security flaw has been found in the LiteSpeed Cache plugin for WordPress, which could allow hackers to run harmful JavaScript code under certain conditions. This vulnerability, labeled as CVE-2024-47374, has a CVSS score of 7.2 and is…


0 Comments4 Minutes

700K DrayTek Routers Vulnerable to Hacks

700K DrayTek Routers Vulnerable to Hacks

Recent investigations have uncovered over a dozen vulnerabilities in household and enterprise routers made by DrayTek. These flaws could be exploited by attackers to take control of vulnerable routers and gain access to enterprise networks. You might be interested in: MediaTek Wi-Fi Chips Hacked –…


0 Comments4 Minutes