Eldorado Ransomware Attacks Windows and Linux
July 8, 2024
Eldorado, a burgeoning ransomware-as-a-service (RaaS) organization, offers locker variations for encrypting files on Windows and Linux systems. Eldorado initially emerged on March 16, 2024, when an affiliate program advertisement was placed on the ransomware site RAMP, according to Group-IB,…
0 Comments5 Minutes
Understanding Cloud Managed IT Services
July 5, 2024
Cloud managed IT services have revolutionized how companies handle their IT needs. By shifting the responsibility of IT management to cloud-based providers, businesses can focus more on core activities and less on the technical complexities of their infrastructure. What are Cloud Managed IT…
0 Comments8 Minutes
Managed Detection and Response (MDR): What is it?
Managed Detection And Response
July 4, 2024
Understanding Managed Detection and Response When it comes to securing your business, there’s something hackers and criminals hate: Managed Detection and Response (MDR). This robust cybersecurity solution not only shields your digital assets but also actively hunts and eliminates threats.…
0 Comments13 Minutes
Major Operation Takes Down 600 Cybercrime Servers
July 4, 2024
A concerted law enforcement operation dubbed MORPHEUS has taken down nearly 600 servers used by cybercriminals as part of an attack infrastructure linked to Cobalt Strike. Europol reported that the crackdown targeted older, unauthorized versions of the Cobalt Strike red teaming architecture between…
0 Comments6 Minutes
MSHTML Vulnerability Fuels MerkSpy Attack
July 3, 2024
Unknown threat actors have been leveraging a now-patched security vulnerability in Microsoft MSHTML to deploy the spying program MerkSpy as part of a campaign primarily targeting users in Canada, India, Poland, and the United States. “MerkSpy is designed to clandestinely monitor user…
0 Comments4 Minutes
Critical OpenSSH Flaw Discovered
July 2, 2024
The OpenSSH maintainers have recently issued security upgrades to address a severe security vulnerability that could potentially lead to unauthorized remote code execution with root privileges in Linux systems based on the glibc library. The vulnerability, known as regreSSHion, has been designated…
0 Comments6 Minutes
Risks of AI Training on Your Data
June 28, 2024
While some SaaS hazards are obvious and transparent, others are hidden in plain sight, and both pose major risks to your firm. According to Wing’s data, 99.7% of enterprises use AI-enabled technologies. These AI-powered solutions are crucial, delivering seamless experiences across…
0 Comments7 Minutes
SnailLoad Attack Spies via Network Latency
June 28, 2024
A group of security researchers from Graz University of Technology demonstrated a new side-channel attack called SnailLoad, which can be used to remotely infer a user’s web activities. “SnailLoad exploits a bottleneck present on all Internet connections,” the researchers wrote in…
0 Comments5 Minutes
Cybercriminals Targets Microsoft Console Files
June 25, 2024
Malicious actors are now employing a novel attack method in real-world scenarios, utilizing specially crafted Microsoft Management Console (MSC) files to enable full code execution. By exploiting vulnerabilities within the Microsoft Management Console (MMC), these actors effectively circumvent…
0 Comments4 Minutes
Google Launches Project Naptime for AI Security Discovery
June 24, 2024
Google has created a new framework called Project Naptime, which allows a large language model (LLM) to conduct vulnerability research and enhance automated discovery methods. According to Google Project Zero researchers Sergei Glazunov and Mark Brand, the Naptime architecture revolves around the…
0 Comments3 Minutes