admin

New Ransomware Group Hits Veeam Backup Software: What You Need to Know

Beware: EstateRansomware Exploits Veeam Backup & Replication Flaw A now-patched security flaw in Veeam Backup & Replication software is being actively leveraged by an emergent ransomware group self-identified as EstateRansomware. The harrowing revelation emanates from Group-IB, a Singapore-based cybersecurity firm that detected the nefarious activities of this nascent threat actor in early April 2024. According…

Read More

Trojanized jQuery Packages Discovered on npm, GitHub, and jsDelivr

Supply Chain Sabotage: Trojanized jQuery on npm, GitHub, and jsDelivr In a chilling wake-up call for developers and security experts alike, unknown threat actors have launched a “complex and persistent” supply chain attack by distributing trojanized versions of jQuery across well-known platforms such as npm, GitHub, and jsDelivr. This methodical and stealthy attack could have…

Read More

Cybersecurity Agencies Sound the Alarm on APT40’s Swift Exploit Evolution

Global Cybersecurity Agencies Warn of China-linked APT40 Threat In a collaborative move, cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the United Kingdom, and the United States have issued an alarming joint advisory, highlighting the increasing threat posed by the China-linked cyber espionage group, APT40. This sinister player in the digital arena…

Read More

GuardZoo Malware: A Threat to Over 450 Middle Eastern Military Members

New Surveillanceware Targets Military Personnel in the Middle East: The Emergence of GuardZoo In a concerning development, military personnel in Middle Eastern countries have found themselves in the crosshairs of a meticulous surveillance operation. This advanced campaign employs an insidious Android data-gathering tool known as GuardZoo. Reports indicate that the malicious activity likely began back…

Read More

Cybercriminals Targeting Jenkins Script Console for Crypto Mining Assaults

Weaponizing Jenkins Script Console: A New Threat in the Wild The emergence of cyber threats continues to evolve, targeting systems and applications that are foundational to many development operations. One recent discovery has shown that attackers can exploit improperly configured Jenkins Script Console instances for nefarious activities, including cryptocurrency mining. Let’s delve into what transpired…

Read More

RADIUS Protocol Vulnerability: MitM Attacks Threaten Network Security

New Cybersecurity Flaw: BlastRADIUS Unveiled Cybersecurity researchers have recently discovered a new vulnerability in the RADIUS network authentication protocol. Aptly named BlastRADIUS, this vulnerability has the potential to enable attackers to execute Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain conditions. Understanding the RADIUS Protocol The Remote Authentication Dial-In User Service (RADIUS) protocol is…

Read More

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

Dark Web Analysis Reveals Over 3,000 Consumers of CSAM Through Malware Logs Cybersecurity firm Recorded Future has demonstrated the unexpected ways in which malware incidents can provide actionable intelligence against severe criminal activities. Recently, their analysis of information-stealing malware logs from the dark web has led to the identification of thousands of consumers of child…

Read More