admin

RedLine Stealer izkorišča več kot 1.000 IP-jev za hekanje Windows komunikacije

RedLine Stealer izkorišča več kot 1.000 IP-jev za hekanje Windows komunikacije

**Raziskovanje RedLine Stealer: Analiza Malwara in Njegovih Funkcionalnosti** Raziskovalci so v sodelovanju s pravosodnimi organi analizirali prej nedokumentirane module platforme za malware-as-a-service, znane kot RedLine Stealer. Ta malware prevzema nadzor nad računalniki, kar pomeni resno grožnjo za kibernetsko varnost. V tej objavi bomo raziskali pomembne značilnosti in arhitekturo RedLine Stealer ter se poglobili v njegov…

Read More
Critical Wordpress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Two Critical Security Flaws Impacting WordPress Plugins Two serious security vulnerabilities have been identified in the Spam protection, Anti-Spam, and FireWall plugin for WordPress. These flaws could allow an unauthenticated attacker to install and enable malicious plugins on vulnerable sites, potentially leading to remote code execution. The critical vulnerabilities, registered as CVE-2024-10542 and CVE-2024-10781, carry…

Read More
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

Understanding Vulnerability Management with Intruder’s Intel When CVEs (Common Vulnerabilities and Exposures) go viral, it becomes crucial for organizations to differentiate critical vulnerabilities from the noise. Protecting your organization requires swift action and informed decisions. That's why Intruder, a leader in attack surface management, developed Intel—a free vulnerability intelligence platform aimed at helping you prioritize…

Read More
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

Earth Estries and the GHOSTSPIDER Backdoor Threat The threat actor known as Earth Estries, linked to China, has recently been seen using a new and previously undocumented backdoor called GHOSTSPIDER. This particular backdoor has been part of their attacks targeting telecommunications companies in Southeast Asia. According to Trend Micro, a cybersecurity firm, Earth Estries is…

Read More
RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

RomCom Threat Actor Exploits Zero-Day Flaws in Firefox and Windows The Russia-aligned threat actor known as RomCom has recently exploited two significant security flaws: one in Mozilla Firefox and another in Microsoft Windows. These vulnerabilities are part of a broader set of attacks aimed at delivering the RomCom backdoor onto victim systems. Understanding these exploits…

Read More
CISA Urges Agencies to Patch Critical Array Networks Flaw Amid Active Attacks

CISA Urges Agencies to Patch Critical Array Networks Flaw Amid Active Attacks

Critical Security Flaw in Array Networks AG and vxAG Secure Access Gateways On Monday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog to include a critical security flaw affecting Array Networks AG and vxAG secure access gateways. This flaw, identified as CVE-2023-28461, has a CVSS score of 9.8,…

Read More
Podatkovna baza HRMS naj bi bila izdana, več kot 1 milijon podatkov izpostavljenih. #kibernetska varnost #vdor podatkov #zaščita podatkov.

Podatkovna baza HRMS naj bi bila izdana, več kot 1 milijon podatkov izpostavljenih. #kibernetska varnost #vdor podatkov #zaščita podatkov.

## Hčerinsko podjetje Zappian Media LLC utrpelo velik vdor v varnost podatkov Oktobra 2024 je prišlo do resnega vdor v hčerinsko podjetje Zappian Media LLC, ki je naravnost pretresel celotno industrijo kibernetske varnosti. Po poročilih je bilo razkritih več kot 1 milijon občutljivih zapisov iz njihove baze podatkov sistema za upravljanje človeških virov (HRMS). Ta…

Read More
Protecting Your Crypto Assets: How to Safeguard Against PyPI Python Library "aiocpa" Threats

Protecting Your Crypto Assets: How to Safeguard Against PyPI Python Library “aiocpa” Threats

PyPI Quarantines "aiocpa": A Cautionary Tale for Developers The Python Package Index (PyPI) has recently taken action against the package "aiocpa." This quarantine follows a troubling update that introduced malicious code designed to exfiltrate private keys through Telegram. This incident serves as a stark reminder of the importance of software integrity and security, particularly in…

Read More
Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

New Attack Techniques Targeting Infrastructure-as-Code and Policy-as-Code Tools Cybersecurity researchers have uncovered two significant attack techniques targeting infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Open Policy Agent (OPA). These tools utilize dedicated, domain-specific languages (DSLs) meant to enhance security when managing cloud infrastructure. However, the discovery of these vulnerabilities raises important concerns…

Read More