Category: Uncategorized
-
Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected [email protected] (The Hacker News)
Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for remote code execution. The issue, tracked as CVE-2024-53677, carries a CVSS score of 9.5 out of 10.0, indicating critical severity. The vulnerability shares similarities with another critical bug the project maintainers addressed in December 2023…
-
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware [email protected] (The Hacker News)
A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams call to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Loveria, Jovit Samaniego, and Gabriel Nicoleta said.…
-
Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks [email protected] (The Hacker News)
A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks targeting Pakistan. Cybersecurity company Securonix, which is tracking the activity under the name FLUX#CONSOLE, said it likely starts with a phishing email link or attachment, although it said it couldn’t obtain the original email used…
-
Even Great Companies Get Breached — Find Out Why and How to Stop It [email protected] (The Hacker News)
Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But breaches still happen. So, what’s going wrong? The truth is, that attackers are constantly finding new ways to slip through cracks that often go…
-
Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware [email protected] (The Hacker News)
A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target…
-
5 Practical Techniques for Effective Cyber Threat Hunting [email protected] (The Hacker News)
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up…
-
Are password managers safe for enterprise use?
Post ContentRead More
-
The pros and cons of biometric authentication
Post ContentRead More
-
Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection [email protected] (The Hacker News)
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday. The attacks make use of fake…
-
What is passwordless authentication?
Post ContentRead More