Stealing AWS Keys
07
Nov
2024

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

Nov 07, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI)…

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait
07
Nov
2024

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

Nov 07, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage The China-aligned threat actor known as MirrorFace has been observed targeting a…

SteelFox and Rhadamanthys Malware
07
Nov
2024

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys…

Multiple Vulnerabilities in HPE Aruba Access Points Let Attackers Execute Remote Code
07
Nov
2024

Multiple Vulnerabilities in HPE Aruba Access Points Let Attackers Execute Remote Code

Multiple critical vulnerabilities have been identified in HPE Aruba Access Points, potentially allowing attackers to execute remote code and compromise…

5 Most Common Malware Techniques in 2024
07
Nov
2024

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more…

Expanding Capabilities and Attack Surfaces
07
Nov
2024

Expanding Capabilities and Attack Surfaces

AI and APIs have a symbiotic relationship. APIs power AI by providing the necessary data and functionality, while AI enhances…

Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms
07
Nov
2024

Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms

Cisco has disclosed multiple vulnerabilities impacting its Identity Services Engine (ISE) software. These vulnerabilities could allow authenticated, remote attackers to…

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418)
07
Nov
2024

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418)

Cisco has fixed a critical command injection vulnerability (CVE-2024-20418) affecting its Ultra-Reliable Wireless Backhaul (URWB) Access Points that can be…

Hackers Abuse DocuSign API to Send Genuine Looking Invoices
07
Nov
2024

Hackers Abuse DocuSign API to Send Genuine Looking Invoices

Cybercriminals have started leveraging DocuSign’s API to send fraudulent invoices that appear shockingly authentic. Unlike traditional phishing schemes that rely…

Zywave enhances Cyber Quoting to provide insight into coverage limit adequacy and potential loss gaps
07
Nov
2024

Zywave enhances Cyber Quoting to provide insight into coverage limit adequacy and potential loss gaps

Zywave announced an enhancement to its Cyber Quoting solution with the addition of embedded benchmarking. Brokers can now leverage industry…

Operation Synergia II disrupted +22,000 malicious IPs
07
Nov
2024

Operation Synergia II disrupted +22,000 malicious IPs

INTERPOL: Operation Synergia II disrupted +22,000 malicious IPs Pierluigi Paganini November 06, 2024 A global law enforcement operation called Operation…

North Korean Hackers Employing New Tactic To Acquire Remote Jobs
07
Nov
2024

North Korean Hackers Employing New Tactic To Acquire Remote Jobs

Hackers increasingly target remote workers by exploiting vulnerabilities arising from the shift to telecommuting. They use tactics like “voice phishing”…