Category: Uncategorized
-
CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker toRead More
-
IT risk assessment template (with free download)
Post ContentRead More
-
CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages [email protected] (The Hacker News)
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense sectors with Dark Crystal RAT (aka DCRat). The campaign, detected earlier this month, has been found to target both employees of enterprises of the defense-industrial complex and individual representatives of the Defense Forces of Ukraine. The activity…
-
How to sideload iOS apps and why it’s dangerous
Post ContentRead More
-
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners [email protected] (The Hacker News)
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote attackers to run arbitrary code. Cybersecurity companyRead…
-
Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia [email protected] (The Hacker News)
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing over 200,000 messages from September 2023 to September 2024, was published by a Telegram user @ExploitWhispers last month. According to an analysis of the messages…
-
Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen [email protected] (The Hacker News)
In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcomingRead…
-
The Microsoft patch management guide for admins
Post ContentRead More
-
ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers [email protected] (The Hacker News)
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress…
-
5 Identity Threat Detection & Response Must-Haves for Super SaaS Security [email protected] (The Hacker News)
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaS-reliant organizations big and smallRead More