admin

OPERACIJAKONECIGRE - Zasežen C&C strežnik SMOKELOADERja

OPERACIJAKONECIGRE – Zasežen C&C strežnik SMOKELOADERja

Oblasti so uspešno zaplenile poveljniški in kontrolni (C&C) strežnik, ki ga je uporabljala zloglasna zlonamerna programska oprema SMOKELOADER. Ta operacija, imenovana “OPERATIONENDGAME”, predstavlja ključni korak pri motenju aktivnosti kibernetskih kriminalcev, ki so strežnik uporabljali za izvajanje zlonamernih aktivnosti po vsem svetu. Podrobnosti o Zaplembi Po poročilih cyberundergroundfeed je bila domena potunulit.org, identificirana kot C&C strežnik…

Read More
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

Recent Cyber Threats: CloudScout Toolset and Evasive Panda Introduction to the Threats In recent months, a government entity and a religious organization in Taiwan fell victim to a China-linked threat actor known as Evasive Panda. This group used a previously undocumented post-compromise toolset called CloudScout. The breach highlights ongoing concerns about cyber threats targeting organizations…

Read More
BeaverTail Malware Strikes Again: Beware of Malicious npm Packages Targeting Developers

BeaverTail Malware Strikes Again: Beware of Malicious npm Packages Targeting Developers

In October 2024, three malicious packages were discovered on the npm registry, containing a known malware called BeaverTail. This JavaScript downloader and information stealer has been linked to an ongoing North Korean cyber campaign known as Contagious Interview. It is important to understand the implications of this malware and how the Datadog Security Research team…

Read More
Russian Espionage Group Targets Ukrainian Military with Malware via Telegram

Russian Espionage Group Targets Ukrainian Military with Malware via Telegram

Overview of Russian Espionage Operations in Ukraine A suspected Russian hybrid espionage and influence operation has been identified targeting the Ukrainian military. This operation is delivering a mix of Windows and Android malware through a Telegram persona called Civil Defense. Google's Threat Analysis Group (TAG) and Mandiant are tracking this activity under the name UNC5812….

Read More

Cisco Cyber Vision vs. Nozomi Networks: Katera rešitev bo zaščitila vaša industrijska omrežja?

V svetu kibernetske varnosti za operativno tehnologijo (OT) in Internet stvari (IoT) se Cisco Cyber Vision in Nozomi Networks izpostavljata kot pomembni rešitvi. Obe platformi imata cilj izboljšati vidnost, varnost in skladnost z zakonodajo v industrijskih omrežjih, vendar se znatno razlikujeta v arhitekturi, implementaciji, funkcionalnostih in uporabniški izkušnji. V tej analizi bomo podrobneje raziskali vsako rešitev, njene značilnosti, prednosti…

Read More
Sailing the Seven Seas Securely: OT Access Security for Ships and Cranes

Sailing the Seven Seas Securely: OT Access Security for Ships and Cranes

The Impact of Operational Technology Security on Marine Vessel and Port Operators As operational technology (OT) security evolves, marine vessel and port operators face new challenges. The digitalization and automation of ships and industrial cranes are changing how these entities operate. This shift introduces various security vulnerabilities, making effective OT security crucial. In this blog…

Read More
Protect Your Online Identity: How to Spot Phishing Scams and Avoid Falling Victim

Protect Your Online Identity: How to Spot Phishing Scams and Avoid Falling Victim

Phishing Pages on Webflow: A Growing Threat Cybersecurity researchers are sounding alarms about a rise in phishing pages created using a website builder tool called Webflow. As cybercriminals increasingly exploit legitimate services like Cloudflare and Microsoft Sway, it’s vital to stay informed. The goal of these campaigns is to gather sensitive information from various cryptocurrency…

Read More
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

New Attack Technique Bypasses Microsoft's Driver Signature Enforcement A new attack technique has emerged that can bypass Microsoft's Driver Signature Enforcement (DSE) on fully patched Windows systems. This vulnerability can lead to serious OS downgrade attacks, enabling malicious actors to load unsigned kernel drivers. As a result, attackers gain the ability to deploy custom rootkits,…

Read More