The ClickFix attack tactic seems to be gaining traction among threat actors. ​The original article found on darkreading Read More
OAuth Attacks Target Microsoft 365, GitHub
In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites. ​The original […]
Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit
The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber […]
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a […]
RansomHub Taps FakeUpdates to Target US Government Sector
A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan […]
How ‘Open Innovation’ Can Help Solve Problems Faster, Better & Cheaper
Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives […]
Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira CredentialsÂ
Luxury automotive manufacturer Jaguar Land Rover (JLR) has become the latest victim of the rapidly emerging HELLCAT ransomware group, with sensitive internal documents and employee […]
AI Operator Agents Assisting Hackers To Write Malicious Code
AI-powered agents are evolving rapidly, offering enhanced capabilities to automate routine tasks, but researchers have discovered these same tools can be weaponized by malicious actors. […]
New C++ Based IIS Malware With Numerous Functionalities Mimics cmd.exe To Stay Undetected
Security researchers have uncovered a sophisticated malware strain targeting Microsoft’s Internet Information Services (IIS) web servers, leveraging C++ to deploy advanced evasion techniques and payload […]
New Steganographic Malware Attack via JPG File Delivers Multiple Password Stealing Malwares
A newly identified steganographic malware operation has emerged, using JPEG image files as a covert delivery mechanism for multiple password-stealing malware strains. Security researchers have […]