admin

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Exploit Campaigns Target Mobile Users Cybersecurity researchers have recently uncovered several exploit campaigns aimed at compromising the security of mobile users. These campaigns specifically targeted vulnerabilities found in popular web browsers like Apple Safari and Google Chrome. By taking advantage of now-patched flaws in these browsers, cyber attackers were able to infect mobile devices with…

Read More

Vietnamese Human Rights Group Faces Persistent Cyber Threats from APT32

Non-Profit Targeted by Vietnamese Hacking Group In a recent cyber attack incident, a non-profit organization supporting Vietnamese human rights has fallen victim to a sophisticated, multi-year campaign aimed at delivering various types of malware to compromised hosts. This malicious effort has been linked to a threat cluster called APT32, also known by different aliases such…

Read More

AI-Driven Phishing Tactics: Outsmarting MFA and EDR Defenses

Understanding Adversary-in-the-Middle (AitM) Phishing Attacks The realm of IT security is evolving rapidly, and attackers are constantly innovating new ways to exploit vulnerabilities. One of the latest trends that IT professionals need to watch out for is the rise of Adversary-in-the-Middle (AitM) phishing attacks. These attacks go beyond traditional phishing techniques by enabling cybercriminals to…

Read More

Napad na protokol Diffie-Hellman: 20 let stara ranljivost omogoča hekerjem, da preobremenijo vaš procesor.

Zloraba Protokoila Diffie-Hellman: Potencial za Prepoved Delovanja Pri napadu DHE zlonamerni odjemalec začne kriptografski handshake (ročni stisk), pri čemer neresnično trdi, da podpira samo efemerno varianto protokola za dogovor o ključih Diffie-Hellman (DHE), kar spodbuja strežnik, da ustvari par ključev in izračuna skupno skrivnost, kar zahteva računsko zahtevne operacije modularne eksponentacije. Zlonamerni odjemalec se izogne…

Read More

Fortra Releases Urgent Patch for Critical FileCatalyst Workflow Security Vulnerability

Fortra Resolves Critical Security Vulnerability in FileCatalyst Workflow Fortra, a leading IT security firm, has recently mitigated a severe security vulnerability affecting FileCatalyst Workflow. This flaw could potentially be exploited by a malicious remote attacker to obtain administrative privileges within the system. The identified vulnerability has been designated as CVE-2024-6633 and has received a high…

Read More

BlackByte Ransomware Exploits VMware ESXi Vulnerability in New Cyber Attack Wave

The BlackByte ransomware group exploits VMware ESXi security flaw The BlackByte ransomware group is like a persistent mosquito buzzing around the digital space, finding its way into vulnerable systems. They have been seen taking advantage of a security flaw that recently plagued VMware ESXi hypervisors, exploiting it to wreak havoc on unsuspecting victims. Disarming security…

Read More

Beware: Latest QR Code Phishing Attack Targets Microsoft Sway for Credential Theft

The Rise of QR Code Phishing In the vast expanse of cyber threats, a new tactic has been brewing: QR code phishing, affectionately known as ‘quishing’ by cybersecurity insiders. The latest craze involves miscreants leveraging Microsoft Sway infrastructure to host fake pages, thereby exploiting legitimate cloud services for less-than-honorable endeavors. Legitimacy in the Shadows Netskope…

Read More