We recently noticed a month-long AvosLocker promotion during a client engagement. Cobalt Strike, Sliver, and various commercial network scanners were among the tools used by the attackers. Two VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell served as…
Latest posts - Page 54
Magecraft campaign sheds light on the scale of the ongoing campaign
A Magecart skimming campaign, recently discovered, was traced back to an earlier attack in November 2021. Two malware domains have been tracked for hosting credit card skimmer code in the light of the Magecart campaign. It appears these domains are…
Flagstar reveals details of a cyberattack that was directed at it
Flagstar Bank is informing 1.5 million customers of a data breach wherein hackers acquired data. The cyberattack happened in December last year. Flagstar, a Michigan-based financial services provider and one of the largest banks in the United States, has total…
The Android-stealing BRATA malware is becoming a persistent threat
The threat actor responsible for the BRATA banking trojan has refined their tactics and enhanced the malware with data-stealing capabilities. Cleafy, an Italian mobile security company, has been tracking BRATA activity and has noticed changes in the most recent campaigns…
2022 SaaS Security Survey Report: 7 Key Findings
Learn about the emerging threats to SaaS security and how different firms are addressing them. In partnership with CSA, the 2022 SaaS Security Survey Report explores the state of SaaS security as seen by CISOs and security professionals in today’s…
WordPress sites updated automatically to fix a critical Plugin flaw
WordPress websites using a popular plugin named Ninha Forums have been automatically updated to fix a critical flaw, and the flaw has been widely exploited in the wild. The problem comes from code injection and is rated 9.8 out of…
MetaMask, Phantom warn about a flaw that can steal your crypto wallets
According to MetaMask and Phantom, a new ‘Demonic’ vulnerability might disclose a crypto wallet’s secret recovery phrase, allowing attackers to steal NFTs and bitcoin contained within it. Seeds, also known as recovery phrases, are a collection of words that serve…
A data breach at Kaiser Permanente has exposed about 70K medical records
An email compromise incident in April allowed attackers to obtain access to confidential user credentials. On April 5, Kaiser Permanente had a data breach as a result of an email hack, which could have exposed the medical records of roughly…
A Microsoft Office 365 feature can help Ransomware hackers to hack Cloud files
A “dangerous piece of functionality” has been uncovered in Microsoft 365 suite that can be exploited by attackers to ransom files stored on SharePoint and OneDrive and attack cloud infrastructure. The cloud ransomware attack can start file-encrypting malware to “encrypt…
The new Syslogk Linux rootkit employs magic packets to activate the backdoor
Syslogk, a new Linux rootkit malware that uses specially designed “magic packets” to awaken a dormant backdoor on the system, is being utilised in assaults to mask dangerous activities. The malware is now in active development, and its creators appear…