GuardZoo Malware: A Threat to Over 450 Middle Eastern Military Members

New Surveillanceware Targets Military Personnel in the Middle East: The Emergence of GuardZoo In a concerning development, military personnel in Middle Eastern countries have found themselves in the crosshairs of a meticulous surveillance operation. This advanced campaign employs an insidious Android data-gathering tool known as GuardZoo. Reports indicate that the malicious activity likely began back…

Read More

Cybercriminals Targeting Jenkins Script Console for Crypto Mining Assaults

Weaponizing Jenkins Script Console: A New Threat in the Wild The emergence of cyber threats continues to evolve, targeting systems and applications that are foundational to many development operations. One recent discovery has shown that attackers can exploit improperly configured Jenkins Script Console instances for nefarious activities, including cryptocurrency mining. Let’s delve into what transpired…

Read More

RADIUS Protocol Vulnerability: MitM Attacks Threaten Network Security

New Cybersecurity Flaw: BlastRADIUS Unveiled Cybersecurity researchers have recently discovered a new vulnerability in the RADIUS network authentication protocol. Aptly named BlastRADIUS, this vulnerability has the potential to enable attackers to execute Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain conditions. Understanding the RADIUS Protocol The Remote Authentication Dial-In User Service (RADIUS) protocol is…

Read More

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

Dark Web Analysis Reveals Over 3,000 Consumers of CSAM Through Malware Logs Cybersecurity firm Recorded Future has demonstrated the unexpected ways in which malware incidents can provide actionable intelligence against severe criminal activities. Recently, their analysis of information-stealing malware logs from the dark web has led to the identification of thousands of consumers of child…

Read More

New Ransomware-as-a-Service Eldorado Targets Windows and Linux Systems

Emerging Ransomware-as-a-Service: Eldorado Targets Both Windows and Linux The shadowy world of cybercrime is perpetually evolving, and the latest menace is a Ransomware-as-a-Service (RaaS) operation dubbed Eldorado. This new operation, which carries ransomware locker variants aimed at encrypting files on both Windows and Linux systems, has stirred significant concern within the cybersecurity community. Debut of…

Read More

CloudSorcerer: The Latest APT Group Taking Aim at Russian Government Entities

CloudSorcerer: The New APT Group Targeting Russian Government Entities Cybersecurity is no stranger to the emergence of sophisticated threats, and the latest one, dubbed CloudSorcerer, is setting alarm bells ringing. The newly identified advanced persistent threat (APT) group has been observed targeting Russian government entities by leveraging cloud services for command-and-control (C2) and data exfiltration….

Read More

Trendi na trgu DNS požarnih pregrad: Zaščita pred sodobnimi spletnimi napadi

DNS požarna pregrada deluje kot pomembna mrežna varnostna ukrepa, preprečuje poskuse dostopa do zlonamernih spletnih mest, ki jih zaznajo uporabniki in sistemi omrežja. DNS požarne pregrade učinkovito preprečujejo izvažanje podatkov prek območij pravil odziva na DNS (RPZ) in s pomočjo dejavnih groženj izvedejo obveščanje.     Naraščanje kibernetskih groženj: Organizacije vse bolj prepoznavajo pomen varnosti…

Read More

Nemudoma posodobite TeamViewer vsaj na 13.0.5460

Vsi tisti, ki uporabljate TeamViewer, morate nemudoma posodobiti svoj TeamViewer. Varnostni strokovnjaki so namreč v starejših različicah TeamViewer našli ranljivost, ki napadalcem omogoča prevzem nadzora nad osebnimi računalniki. Novi ranljivosti v programski opremi TeamViewer se lahko izognemo le tako, da na osebni računalnik namestimo najnovejšo različico programa. Pred novo varnostno ranljivostjo so varni vsi uporabniki, ki uporabljajo…

Read More