In Q3 2022, researchers at Cisco Talos Incident Response (CTIR) released their quarterly report on incident response trends. Trends in ransomware, phishing, and BEC are among the key findings. Key Takeaways from Incident Response Trends in Q3 2022 The Quarterly…
Latest posts - Page 28
Drinik Android virus targets users of Indian banks
In order to steal victims’ personal information and login credentials, a new variant of the Drinik Android malware targets users of 18 Indian banks while disguising itself as the nation’s official tax management app. Drinik Android virus targets users of…
Researchers Revealed 80 ShadowPad Malware C2 Servers.
Since September 2021, up to 85 command-and-control (C2) servers have been identified as being used by the ShadowPad malware. Along with infrastructure being founded as recently as October 16, 2022. The Threat Analysis Unit (TAU) at VMware examined three ShadowPad…
Personal information of Medibank clients compromised by cyberattack
The threat actor responsible for a cyberattack on Medibank, an Australian health insurance provider, acknowledged having access to at least 4 million members’ personal data. Personal information of Medibank clients compromised by a cyberattack. Despite Medibank’s initial claim that there…
Pre-ransomware behavior is the raspberry robin worm.
Microsoft has identified recent activity that suggests the Raspberry Robin worm is a component of a large and intricate ecosystem of malware, with connections to other malware families. And additional infection vectors outside of its original USB drive distribution. These…
Ukrainian hacker charged by the US for involvement in the Raccoon Stealer Malware Service
An American court has filed charges against a 26-year-old Ukrainian national for his alleged involvement in the Raccoon Stealer malware-as-a-service (MaaS) enterprise. On March 4, 2022, Mark Sokolovsky allegedly left Ukraine in a Porsche Cayenne. He was apprehended by Dutch…
Jira Align vulnerabilities allow getting super admin rights
The researcher says that it was theoretically conceivable to move laterally or upward beyond the instance. Jira Align vulnerabilities allow getting super admin rights. A security researcher cautions that a pair of Jira Align security flaws might, in the “worst-case…
DAIXIN Team ransomware, US agencies issue warning
The DAIXIN Team, a new ransomware and data exfiltration gang that has been focusing on US healthcare, has been the subject of a joint alert from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and…
Fortinet products have a serious authentication issue.
Customers are being urged by Fortinet to repair a serious authentication bypass flaw that has already been used in the wild. Fortinet products contain a serious authentication issue. The networking company corrected the CVE-2022-40684 vulnerability earlier this month in its…
SQLite Database Library Reported a 22-Year-Old Vulnerability
The SQLite database library has a high-severity vulnerability that was introduced as part of a code update that dates all the way back to October 2000. And might allow attackers to crash or take control of programmes. SQLite Database Library…