admin

Microsoft Fixes 90 New Flaws: Actively Exploited NTLM and Task Scheduler Vulnerabilities Patched

Microsoft Fixes 90 New Flaws: Actively Exploited NTLM and Task Scheduler Vulnerabilities Patched

Microsoft recently revealed two critical security flaws concerning NT LAN Manager (NTLM) and Task Scheduler that are currently being actively exploited. These vulnerabilities are part of a broader release where Microsoft addressed a total of 90 security bugs during its November 2024 Patch Tuesday update. Among these, four vulnerabilities are labeled as Critical, while the…

Read More
Opozorilo pred lažnim sporočilom o brisanju Facebook računa, ki krade prijave - Cyber varnost: Facebook Phishing.

Opozorilo pred lažnim sporočilom o brisanju Facebook računa, ki krade prijave – Cyber varnost: Facebook Phishing.

Nova prevara z ribarjenjem se širi po Facebooku, kjer tarča uporabnikom grozi z izbrisom računa zaradi domnevno “neprimerne vsebine”. To ponarejeno obvestilo je zasnovano, da izkorišča strah uporabnikov pred izgubo dostopa do njihovih Facebook računov. Phishing napadi, kot je ta, predstavljajo resno grožnjo za varnost uporabnikov, še posebej v svetu, kjer je spletna zaščita vsak…

Read More
Boost Your IT Security: New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

Boost Your IT Security: New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

Cybersecurity Researchers Warn About GoIssue: A New Phishing Tool Targeting GitHub Users Cybersecurity researchers are raising alarms about a new tool known as GoIssue. This sophisticated program enables cybercriminals to send phishing messages at scale, specifically targeting GitHub users. Launched by a threat actor named cyberdluffy (also known as Cyber D' Luffy) on the Runion…

Read More
Trditve groženj hekerskih akterjev o vdoru podatkovne baze Finastre

Trditve groženj hekerskih akterjev o vdoru podatkovne baze Finastre

Nedavna objava na hekerskem forumu je dvignila alarm zaradi potencialne kršitve podatkov pri Finastri, enem vodilnih fintech podjetij na svetu, kar dodatno izpostavlja vprašanje kibernetske varnosti. Storilec, ki uporablja vzdevek “abyss0,” je prevzel odgovornost za kršitev in navedel, da je bilo iz sistemov Finastre odtujenih kar 400 GB stisnjenih podatkov novembra 2024. Podatki naj bi…

Read More
New Citrix Virtual Apps Vulnerabilities: RCE Attacks via MSMQ Misconfiguration

New Citrix Virtual Apps Vulnerabilities: RCE Attacks via MSMQ Misconfiguration

Cybersecurity researchers have revealed concerning security flaws in Citrix Virtual Apps and Desktop. These vulnerabilities could allow attackers to achieve unauthenticated remote code execution (RCE). According to recent findings from watchTowr, the issues mainly stem from the Session Recording component, which captures user activity, including keyboard and mouse inputs and video streams. Understanding these vulnerabilities…

Read More
5 Ways Behavioral Analytics is Revolutionizing Incident Response

5 Ways Behavioral Analytics is Revolutionizing Incident Response

The Evolution of Behavioral Analytics in Security Operations Behavioral analytics, long associated with threat detection—such as User and Entity Behavior Analytics (UEBA) or User Behavior Analytics (UBA)—is experiencing a renaissance. Once primarily used to identify suspicious activity, it is now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral…

Read More
New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Understanding Ymir Ransomware Cybersecurity researchers have recently identified a new ransomware family called Ymir. This ransomware was deployed just two days after systems were initially compromised by a stealer malware known as RustyStealer. According to the Russian cybersecurity vendor Kaspersky, Ymir ransomware features a unique combination of tactics and technical elements that significantly enhance its…

Read More
THN Recap: Top Cybersecurity Threats, Tools, and Practices for Nov 04 - Nov 10

THN Recap: Top Cybersecurity Threats, Tools, and Practices for Nov 04 – Nov 10

Imagine this: the tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—are now silent allies for hackers. Sounds like a scene from a thriller, right? Yet in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become increasingly sophisticated, using our trusted tools as…

Read More