Iran State-Sponsored Hackers Intelligence Operations Using Fake Job Offers
30
Aug
2024

Iran State-Sponsored Hackers Intelligence Operations Using Fake Job Offers

Mandiant has discovered one of the unusual Iranian counterintelligence activities that focuses on prospective agents of foreign intelligence services, especially…

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites
30
Aug
2024

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis…

Naveen Goud
30
Aug
2024

Palo Alto Networks Linked to Malware Spread

Palo Alto Networks is currently being misused as a cover for malware distribution. Although the California-based cybersecurity company is not…

Malicious npm Packages
30
Aug
2024

North Korean Hackers Target Developers with Malicious npm Packages

Aug 30, 2024Ravie LakshmananCryptocurrency / Malware Threat actors with ties to North Korea have been observed publishing a set of…

A Tool For Easier Incident Reporting
30
Aug
2024

A Tool For Easier Incident Reporting

The Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of its new CISA Services Portal, which includes an updated…

RansomHub
30
Aug
2024

RansomHub Attacks Hit Over 200 Organizations, FBI Warns

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and…

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa
30
Aug
2024

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa Pierluigi Paganini August 30, 2024 Russia-linked…

Jenkins RCE Vulnerability
30
Aug
2024

Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents

A critical vulnerability has been identified in Jenkins, a widely used automation server. If exploited further, this vulnerability allows attackers…

Naveen Goud
30
Aug
2024

How Ransomware Is Evolving into a Geopolitical Weapon

In recent years, ransomware attacks have evolved from mere cyber-criminal activities into sophisticated tools of geopolitical maneuvering. As the digital…

What is an Access Control Lists (ACLs)?
30
Aug
2024

What is Access Control List?

Access Control Lists (ACLs) are fundamental to network security and management. They are critical in determining who or what can…

Sinon: Open-source automatic generative burn-in for Windows deception hosts
30
Aug
2024

Sinon: Open-source automatic generative burn-in for Windows deception hosts

Sinon is an open-source, modular tool for the automatic burn-in of Windows-based deception hosts. It aims to reduce the difficulty…

VirusTotal for Threat Research
30
Aug
2024

VirusTotal for Threat Research – A Comprehensive Guide 2024

VirusTotal is an essential tool for cybersecurity professionals. It offers a comprehensive platform for analyzing files, URLs, domains, and IP…