Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa
30
Aug
2024

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa Pierluigi Paganini August 30, 2024 Russia-linked…

Jenkins RCE Vulnerability
30
Aug
2024

Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents

A critical vulnerability has been identified in Jenkins, a widely used automation server. If exploited further, this vulnerability allows attackers…

Naveen Goud
30
Aug
2024

How Ransomware Is Evolving into a Geopolitical Weapon

In recent years, ransomware attacks have evolved from mere cyber-criminal activities into sophisticated tools of geopolitical maneuvering. As the digital…

What is an Access Control Lists (ACLs)?
30
Aug
2024

What is Access Control List?

Access Control Lists (ACLs) are fundamental to network security and management. They are critical in determining who or what can…

Sinon: Open-source automatic generative burn-in for Windows deception hosts
30
Aug
2024

Sinon: Open-source automatic generative burn-in for Windows deception hosts

Sinon is an open-source, modular tool for the automatic burn-in of Windows-based deception hosts. It aims to reduce the difficulty…

VirusTotal for Threat Research
30
Aug
2024

VirusTotal for Threat Research – A Comprehensive Guide 2024

VirusTotal is an essential tool for cybersecurity professionals. It offers a comprehensive platform for analyzing files, URLs, domains, and IP…

A macro look at the most pressing cybersecurity risks
30
Aug
2024

A macro look at the most pressing cybersecurity risks

Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks…

Cyber threats that shaped the first half of 2024
30
Aug
2024

Cyber threats that shaped the first half of 2024

Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five…

Rocinante Malware Taking Over The Android Device Remotely
30
Aug
2024

Rocinante Malware Taking Over The Android Device Remotely

The ever-evolving malware landscape is evolving at an alarming rate, as a multitude of new strains have already been noticed….

New infosec products of the week: August 30, 2024
30
Aug
2024

New infosec products of the week: August 30, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Dragos, Fortinet, HYCU, and…

Massive Mirai Botnet Exploited AVTECH Cameras Zero-Day
30
Aug
2024

Massive Mirai Botnet Exploited AVTECH Cameras Zero-Day

Researchers have discovered a botnet campaign that is exploiting several vulnerabilities, including a zero-day vulnerability (CVE-2024-7029) in AVTECH closed-circuit television…

Iran-Linked Peach Sandstorm Group Deploys Tickler Malware
30
Aug
2024

Iran-Linked Peach Sandstorm Group Deploys Tickler Malware

Researchers have uncovered a new wave of activity by the Iranian state-sponsored threat actor known as Peach Sandstorm. Between April…