November 25, 2021 New JavaScript Malware Delivers Multiple Rats and Info Stealers A new JavaScript malware dubbed RATDispenser is being used to deliver at least 8 different Remote Access Trojans (RATs), information stealers, and keyloggers. According to ... Read more
November 23, 2021 PoC Exploit Released for High Severity Microsoft Exchange Server RCE Flaw A proof-of-concept exploit for a high-severity post-auth vulnerability in Microsoft Exchange Server 2016 and Exchange Server 2019 has been made public. The flaw, tracked as ... Read more
November 19, 2021 APT Actor Actively Exploiting Zero-day Vulnerability in FatPipe MPVPN Devices The Federal Bureau of Investigation (FBI) has warned users of FatPipe MPVPN devices that an Advanced Persistent Threat (APT) actor is exploiting a zero-day vulnerability ... Read more
November 17, 2021 The Emotet Botnet is Back: TrickBot Infrastructure Being Used to Rebuild the Botnet The infrastructure of the Emotet botnet was taken down in a Europol/Eurojust coordinated law enforcement operation in January 2021. Since the takedown it has been ... Read more
November 8, 2021 Zoho Password Management Flaw Exploited by APT Actors to Deploy Web Shell, Trojan, and Info Stealer Security researchers at Palo Alto Networks have identified a global espionage campaign that exploited a known vulnerability in the Zoho password management and single-sign-on platform, ... Read more
November 2, 2021 Amazon SES Token Stolen and Used to Send Phishing Emails from Kaspersky.com Email Accounts A phishing campaign has been identified that abused a legitimate access token of a third-party contractor to send phishing emails from legitimate Kaspersky.com email accounts. ... Read more
October 25, 2021 NHS Vaccination Proof Phishing Campaign Rife in the UK Cybercriminals have stepped up their efforts to scam Brits according to new research, with one of the most common scams offering fake proof of COVID-19 ... Read more
October 14, 2021 Phishing Campaign Uses Mathematical Symbols to Fool Email Security Solutions Analysts at email security firm INKY have identified a new phishing campaign that uses mathematical symbols in spoofed corporate logos in an attempt to fool ... Read more
October 12, 2021 Microsoft Fixes 74 Vulnerabilities on October Patch Tuesday, Including 1 Actively Exploited 0Day October 2021 Patch Tuesday has seen Microsoft release fixes for 74 vulnerabilities across its product range with an additional 7 fixes for issues with Microsoft ... Read more
October 12, 2021 Apple Releases Emergency Update to Fix Another Actively Exploited iOS Zero-day Apple has released a patch to fix a zero-day vulnerability in iOS 15 and iPadOS 15 that is being actively exploited in the wild. The ... Read more
October 5, 2021 9 out of 10 Malware Delivered via HTTPS Encrypted Connections The latest Internet Security Report from WatchGuard Technologies has confirmed the majority of malware infections occur via HTTPS encrypted connections, which demonstrates the importance of ... Read more
September 23, 2021 Microsoft Discovers Large-scale Phishing-as-a-Service Operation Microsoft has discovered a major phishing-as-a-service operation that it says is behind many phishing attacks on businesses over the past 3 years. Phishing is one ... Read more
September 23, 2021 macOS Finder Zero Day Vulnerability Allows Remote Code Execution A currently unpatched zero-day vulnerability in the macOS Finder system can be exploited using a malicious email attachment to remotely execute arbitrary code. The vulnerability ... Read more
September 17, 2021 CISA and FBI Warn of Nation State Hackers Exploiting Critical Zoho Vulnerability A critical vulnerability affecting the Zoho single-sign-on and password management solution is being actively exploited by advanced persistent threat (APT) groups and has been since ... Read more
August 31, 2021 CISA: Address Microsoft Azure Cosmos DB Vulnerability Now The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging all public and private sector organizations to address a recently discovered vulnerability in the Jupyter ... Read more
August 19, 2021 Phishing Costs Large U.S. Companies $14.8 Million a Year The cost of phishing attacks has risen fourfold over the past 6 according to the 2021 Cost of Phishing Report published by Proofpoint. Large companies ... Read more
July 30, 2021 Have You Patched These 30 Frequently Exploited Vulnerabilities? A joint cybersecurity advisory has been published by CISA, the FBI, the Australian Cyber Security Center, and the UK’s National Cyber Security Center about the ... Read more
July 21, 2021 Hundreds of Millions of Windows Computers Have 16-Year Old Printer Driver Vulnerability A high severity privilege escalation vulnerability has been identified in HP printer drivers, which are also used by Samsung and Xerox. Exploitation of the flaw ... Read more
July 21, 2021 Fortinet Issues Patch to Correct Critical RCE Vulnerability in FortiManager and FortiAnalyzer A critical remote code execution use-after-free vulnerability has been identified that affects Fortinet’s FortiManager and FortiAnalyzer network management solutions. If exploited, a non-authenticated remote attacker ... Read more
July 20, 2021 MosaicLoader Malware Downloader Distributed Via Internet Ads for Cracked Software Bitdefender security researchers have identified a new malware variant dubbed MosaicLoader, which is being distributed in a worldwide campaign disguised as cracked software. The malware ... Read more
July 13, 2021 Patches Released to Fix 3 Actively Exploited Flaws and 9 Zero Days on July 2021 Patch Tuesday July 2021 Patch Tuesday has seen Microsoft release patches to fix 116 vulnerabilities across its range of products: 12 critical flaws, 3 actively exploited vulnerabilities, ... Read more
July 9, 2021 Fake Kaseya Updates Used in Phishing Campaign to Deliver Cobalt Strike Backdoors A phishing campaign has been detected by Malwarebytes Threat Intelligence researchers which targets managed service provider customers of Kaseya. The emails claim to provide a ... Read more
July 2, 2021 PoC Exploit Released for Unpatched Windows Print Spooler RCE Vulnerability A critical Windows Print Spooler remote code execution vulnerability has been identified, a Proof of Concept (PoC) exploit for which has been leaked online. The ... Read more
June 22, 2021 COVID-19 Vaccination Lure Used in Phishing Campaign Distributing the Agent Tesla RAT A new phishing campaign has been detected that is being used to distribute the Agent Tesla Remote Access Trojan (RAT). The phishing campaign was identified ... Read more
June 11, 2021 SonicWall VPN Vulnerability Exploited in Attacks on Legacy SRA Appliances Researchers at CrowdStrike have confirmed cyber threat actors exploiting a SonicWall VPN vulnerability to attack Secure Remote Access (SRA) 4600 devices. The vulnerability, tracked as ... Read more
June 10, 2021 Alleged TrickBot Malware Developer Facing Decades in Jail The U.S. Department of Justice has announced a Latvian malware developer has been arraigned on a 19-count indictment for her role in the creation and ... Read more
June 9, 2021 New Malware Discovered Targeting Windows Containers to Plant Backdoors in Kubernetes Clusters A new malware variant has been discovered that is believed to be the first to target Windows containers. The malware, discovered by Daniel Prizmant of ... Read more
June 8, 2021 Critical VMware vCenter Server Vulnerability Under Active Exploitation The critical VMware vCenter Server vulnerability CVE-2021-21985 is being actively exploited in the wild. There have been several successful exploits of the 9.8/10 severity vulnerability ... Read more
June 2, 2021 FBI Warns of APT Groups Exploiting Fortinet Vulnerabilities The Federal Bureau of Investigation (FBI) has issued a Flash Alert warning of the continued exploitation of Fortinet Fortigate vulnerabilities by Advanced Persistent Threat (APT) ... Read more
May 28, 2021 VMware Patches Critical Vulnerability in vCenter Server A patch has been released to fix a critical severity vulnerability in VMware’s virtualization management platform, vCenter Server. The vulnerability could be remotely exploited by ... Read more