Category: Uncategorized
-
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans [email protected] (The Hacker News)
Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger theRead…
-
Threat intelligence vs. threat hunting: Better together
Post ContentRead More
-
SEC charges 4 companies for downplaying SolarWinds attacks
Post ContentRead More
-
Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers [email protected] (The Hacker News)
Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. “The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server’s local user account to a remote server, potentially allowing…
-
Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks [email protected] (The Hacker News)
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining operations on the Docker host,” researchers Abdelrahman Esmail…
-
A Comprehensive Guide to Finding Service Accounts in Active Directory [email protected] (The Hacker News)
Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory (AD), and explore how Silverfort’s solutions can help…
-
Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies [email protected] (The Hacker News)
Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts. Tracked under the names BlackWidow, IceNova,…
-
Malicious npm Packages Target Developers’ Ethereum Wallets with SSH Backdoor [email protected] (The Hacker News)
Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell (SSH) protocol. The packages attempt to “gain SSH access to the victim’s machine by writing the attacker’s SSH public key in the…
-
How to detect DDoS attacks
Post ContentRead More
-
How AI is making phishing attacks more dangerous
Post ContentRead More