Threat Actor Server Exposed: Nmap, SQLMap & Backdoor for Hacking
20
Jun
2024

Threat Actor Server Exposed: Nmap, SQLMap for Hacking

The Research Team has identified an exposed web server used to target the Taiwanese Freeway Bureau and a local data…

Rust-based Malware
20
Jun
2024

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration

Jun 20, 2024NewsroomThreat Intelligence / Cybercrime A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered…

An unpatched bug allows anyone to impersonate Microsoft corporate email accounts
20
Jun
2024

An unpatched bug allows anyone to impersonate Microsoft corporate email accounts

An unpatched bug allows anyone to impersonate Microsoft corporate email accounts Pierluigi Paganini June 20, 2024 A researcher discovered a…

Fickle Stealer Attacking Windows Machine To Steal Sensitive Data
20
Jun
2024

Fickle Stealer Attacking Windows Machine To Steal Sensitive Data

Hackers often abuse stealers to steal login credentials, financial data, and identity theft data hidden in the infected computer systems….

Verimatrix XTD dashboard enhancements improve mobile app security
20
Jun
2024

Verimatrix XTD dashboard enhancements improve mobile app security

Verimatrix announced major enhancements to its XTD dashboard, providing customers with better visibility into application security risks and more actionable…

Post Office and Fujitsu had tense relationship, but were joined at hip when protecting their brands
20
Jun
2024

Post Office and Fujitsu had tense relationship, but were joined at hip when protecting their brands

The Post Office’s relationship with IT supplier Fujitsu was “tense” in 2010 amid major problems rolling out the online version…

European Union Ups Cybersecurity: Rules & Third-Party Assist
20
Jun
2024

European Union Ups Cybersecurity: Rules & Third-Party Assist

The European Union has introduced two critical regulatory frameworks: the Network and Information Security (NIS) Directive and the Digital Operational…

Fortra Warns of Hard-Coded Password Vulnerability in The Filecatalyst
20
Jun
2024

Fortra Warns of Hard-Coded Password Vulnerability in Filecatalyst

Fortra has issued a critical security advisory regarding a hard-coded password vulnerability in its FileCatalyst software, explicitly affecting the TransferAgent…

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users
20
Jun
2024

Hackers Weaponizing Vortex Meeting Software To Attack macOS Users

Threat actors leverage meeting software applications and tools to penetrate weak security loopholes, infiltrate secure settings and organizations, steal highly…

Diamorphine Rootkit Exploiting Linux Systems In The Wild
20
Jun
2024

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources.  Exploiting…

SquidLoader Malware
20
Jun
2024

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations

Jun 20, 2024NewsroomMalware / Cyber Attack Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via…

CDK Global Cyberattack Cripples Car Sales Across US
20
Jun
2024

CDK Global Cyberattack Cripples Car Sales Across US

CDK Global, a provider of software solutions to auto dealerships across the United States, has fallen victim to a significant…