May 5, 2022 Campaign Identified Delivering Fileless Malware using Shellcode in Windows Event Logs A new technique has been observed in the wild for delivering fileless malware on targeted devices and evading detection. According to researchers at Kaspersky, the ... Read more
May 3, 2022 Man Convicted for Phishing Scam Resulting in Theft of $23.5 Million from DoD The losses to phishing scams can be considerable. What starts with a single phishing email can easily result in a costly data breach, malware infection, ... Read more
April 30, 2022 How Password Managers Mitigate the Threat from Phishing The best way to mitigate the threat from phishing is to train employees to be more resilient to phishing attacks, introduce processes to report suspicious ... Read more
April 29, 2022 Bumblebee is the Malware Loader of Choice for Delivering Malicious Payloads A new malware loader dubbed Bumblebee is being used by multiple threat actors to deliver malicious payloads to victims’ devices. According to cybersecurity firm Proofpoint, ... Read more
April 26, 2022 Emotet is Once Again the Biggest Malware Threat In January 2021, the infamous Emotet botnet was shut down following an international law enforcement operation coordinated by Europol and Eurojust. Emotet started life as ... Read more
April 15, 2022 Microsoft Takes Control of ZLoader Botnet Infrastructure Microsoft’s Digital Crimes Unit (DCU) has taken control of 65 domains that were being used as the command-and-control mechanism for the ZLoader botnet. The botnet ... Read more
April 7, 2022 FBI Disrupts the Russia-Linked Cyclops Blink Botnet The massive Cyclops Blink botnet that was being used to target firewall appliances and SOHO networking devices has been neutralized by the U.S. Federal Bureau ... Read more
April 5, 2022 WhatsApp Voicemail Phishing Campaign Distributes Information Stealing Malware A new WhatsApp phishing campaign has been identified by researchers at Armorblox that has been sent to at least 27,655 email addresses. The emails impersonate ... Read more
March 28, 2022 Over 5 Dozen Software Flaws Added to CISA’s Known Exploited Vulnerabilities List The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added 66 vulnerabilities to its Known Exploited Vulnerabilities Catalog that should be given priority when patching, ... Read more
March 22, 2022 Malware Infection at Dental Clinic Operator Affects More Than 1 Million Texans JDC Healthcare Management, which operates more than 70 dental clinics in Texas as Jefferson Dental & Orthodontics, has recently notified the Texas Attorney General about ... Read more
March 18, 2022 Feds Issue Security Alert About MFA Bypass and Vulnerability Exploitation State-sponsored Russian hackers have bypassed multi-factor authentication and exploited the PrintNightmare vulnerability in an attack on a non-governmental organization (NGO), according to a recent security ... Read more
March 3, 2022 Phishing Campaign Capitalizes on Ukrainian Crisis A new phishing campaign has been detected that piggybacks on the current crisis in Ukraine to trick people into divulging their credentials. Emails are being ... Read more
March 1, 2022 Warnings Issued About Hermetic Wiper with Worm-like Capabilities A destructive new malware dubbed Hermetic Wiper is being used in cyberattacks in Ukraine and there are fears that there could be spill over into ... Read more
February 28, 2022 TrickBot Trojan Retired as Developers Switch to Stealthier Malware The TrickBot Trojan has been a major malware threat for the past 6 years but appears to have now been retired. The main developers of ... Read more
February 17, 2022 2021 Was a Record-breaking Year for Vulnerability Disclosures Risk Based Security has released its 2021 vulnerability report which shows 2021 was a record-breaking year for vulnerability disclosures. 28,695 flaws were disclosed in 2021, ... Read more
February 8, 2022 Next-Gen Phishing Kits Used to Bypass Multifactor Authentication Proofpoint has revealed cyber threat actors are now using a new class of phishing kit that is allowing them to bypass multi-factor authentication (MFA). Multi-factor authentication ... Read more
February 2, 2022 SEO Poisoning to Distribute Malware Disguised as Legitimate Software Installers Mandiant has identified a campaign that uses fake software installers for free productivity apps such as Zoom, Team Viewer, and Visual Studio to distribute Batloader, ... Read more
February 1, 2022 Banking Trojan Masquerades as Android Password Security App A password security app that is available through the Google Play Store that has been downloaded more than 10,000 times is actually a malware dropper ... Read more
February 1, 2022 8 Vulnerabilities Added to CISA’s Known Exploited Vulnerabilities Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has added a further 8 actively exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. These 8 vulnerabilities are ... Read more
January 18, 2022 DHL Was the Most Imitated Brand in Phishing Campaigns in Q4, 2021 A recent report from the cybersecurity firm Check Point has revealed DHL was the most impersonated brand in phishing attacks in Q4, 2021, overtaking Microsoft. ... Read more
January 11, 2022 Purple Fox Malware Being Delivered Disguised as a Telegram Installer Threat actors often add malware to software installers, so it is no surprise that researchers at Minerva Labs have discovered installers for legitimate software being ... Read more
December 31, 2021 Redline Malware Used to Steal Passwords from Browsers and Corporate VPNs Redline malware is now the most commonly used information stealer and is being used in attacks on businesses and consumers. Redline malware first appeared in ... Read more
December 29, 2021 New RCE Vulnerability Patched in Log4j Version 2.17.1 Another remote code execution vulnerability has been identified in the Log4j Java-based logging utility, this time in version 2.17.0. Several vulnerabilities in Log4j have been ... Read more
December 24, 2021 Log4J Vulnerability Scanning Tool Released by CISA The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a scanner that can be used to identify web services affected by the two recently ... Read more
December 23, 2021 3 Million Websites Vulnerable to Critical Vulnerability in All in One SEO WordPress Plugin Two vulnerabilities have been identified in the All in One SEO plugin for WordPress, that could be chained and exploited allowing a full site takeover. ... Read more
December 16, 2021 APT Actors and Access Brokers Actively Exploiting Log4j Zero-day Microsoft has issued a warning that multiple threat actors have been scanning for systems that have not had the Log4j zero-day vulnerability (CVE-2021-44228) patched and ... Read more
December 13, 2021 Actively Exploited Log4Shell Vulnerability in Apache Log4j is as Bad as it Gets A recently discovered vulnerability in the Apache Log4j Java-based logging library is widely considered to be one of the most dangerous vulnerabilities ever to be ... Read more
December 6, 2021 COVID-19 Omicron Phishing Scam Targets UK Residents Offering Free NHS Omicron PCR Test An COVID-19 Omicron phishing campaign has been detected that spoofs the UK’s National Health Service and attempts to get individuals to disclose sensitive personally identifiable ... Read more
December 3, 2021 Warning Issued About Active Exploitation of Critical Zoho ManageEngine ServiceDesk Plus Vulnerability At least one APT actor is exploiting a critical vulnerability in the IT helpdesk and asset management solution, Zoho ManageEngine ServiceDesk Plus, according to a ... Read more
November 30, 2021 Vaccine Manufacturers Targeted with Metamorphic Tardigrade Malware The biomanufacturing sector has been warned about targeted attacks involving Tardigrade malware – a sophisticated metamorphic variant of the SmokeLoader backdoor. Tardigrade malware is known ... Read more