admin

Uncovering the Latest BugSleep Backdoor Deployed by Iranian Hackers

The Changing Tactics of the Iranian MuddyWater Threat Actor Iran’s notorious state-sponsored hacking group, MuddyWater, is notorious for its sophisticated cyber-attacks on various targets. In a recent turn of events, cybersecurity firms Check Point and Sekoia have discovered that MuddyWater has modified its tactics by incorporating a novel backdoor into its latest attack campaign. This…

Read More

Uncovering Hidden Threats: Malicious npm Packages Exploiting Image Files

Cybersecurity Threat Unveiled on npm Package Registry Recently, cybersecurity researchers uncovered a troubling discovery on the npm package registry. Two seemingly innocent packages, namely img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy, were found to house hidden backdoor codes. These codes had the alarming capability of executing malicious commands that were initiated from a remote server. Unveiling the Threat The…

Read More

Zakaj izbrati SOC kot storitev?

SOC kot storitev (Security Operations Center as a Service) pomeni zunanje izvajanje upravljanja in spremljanja kibernetskih incidentov ter groženj tretji stranki. Ta model storitve omogoča organizacijam, da izkoristijo strokovnost in infrastrukturo namenskega varnostnega operativnega centra (SOC), ne da bi potrebovali notranje vire ali naložbe v strojno in programsko opremo za kibernetsko varnost. Ključni vidiki SOC…

Read More

Kaspersky’s Departure from the U.S. Market: Exploring the Commerce Department Ban

Russian Security Vendor Kaspersky Exits U.S. Market Amid Ban Russian cybersecurity firm Kaspersky has made a crucial decision to withdraw from the U.S. market following an announcement by the Commerce Department that banned the sale of its software in the country due to national security concerns. This move comes after growing tensions over potential security…

Read More

CISA Alert: Critical RCE Vulnerability in GeoServer GeoTools Software Detected

The U.S. Cybersecurity and Infrastructure Security Agency Alerts about Critical Security Flaw in GeoServer GeoTools The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently come out with a warning about a significant security vulnerability affecting the OSGeo GeoServer GeoTools software. This flaw has been classified under CISA’s Known Exploited Vulnerabilities (KEV) catalog due to…

Read More

GitHub Token Leak Exposes Python’s Core Repositories to Potential Attacks

Cybersecurity Breach: Accidental GitHub Token Leak In a startling discovery, cybersecurity researchers recently identified an inadvertently leaked GitHub token that potentially exposed crucial repositories in the realm of Python programming. The compromised token had the capacity to enable unauthorized access to the repositories of the Python language, Python Package Index (PyPI), and the Python Software…

Read More

ASUS Resolves Critical Authentication Bypass Vulnerability in Various Router Models

ASUS Takes Swift Action to Address Critical Security Flaw in Routers ASUS, one of the leading networking equipment manufacturers, recently rolled out software updates to tackle a critical security vulnerability affecting its routers. This flaw, tracked as CVE-2024-3080, has been assigned a high CVSS score of 9.8 out of 10, indicating its severity. The vulnerability…

Read More

GitLab Patches Critical Flaw: Unauthorized Pipeline Jobs Fixed

GitLab Patches Critical Vulnerability Enabling Arbitrary User Pipelines Securing your software development platform is crucial, and GitLab has taken significant steps to bolster its defenses. Recently, GitLab rolled out updates addressing multiple security vulnerabilities, including a critical one that could have dire implications. The Critical Vulnerability Tracked as **CVE-2024-6385**, this vulnerability has been given a…

Read More

PHP Vulnerability Exploited: Stay Secure Against Malware and DDoS Attacks

Alert: Widespread Exploitation of PHP Vulnerability CVE-2024-4577 In the ever-evolving landscape of cybersecurity, another formidable challenge has emerged. Multiple threat actors have been detected exploiting a newly exposed security flaw in PHP, aiming to deliver a range of malicious payloads including remote access trojans, cryptocurrency miners, and distributed denial-of-service (DDoS) botnets. CVE-2024-4577: A Critical Vulnerability…

Read More