Headlines

Hekerji trdijo, da prodajajo enodnevno ranljivost za oddaljeno izvajanje kode (RCE) v Magento 2. Preizkusite Sami.

Grožnjo naj bi uporabil heker, ki trdi, da prodaja 1-dnevni izkoristek RCE (Oddaljena Izvedba Kode), ki cilja na Magento 2, široko uporabljano platformo za e-trgovino, kar predstavlja resno grožnjo za kibernetsko varnost. Ta izkorišček, identificiran kot CVE-2024-34102, prinaša precejšnja tveganja za spletne trgovce in njihove stranke. Napadalcem omogoča nepooblaščen dostop do občutljivih podatkov in sistemov,…

Read More
Hackers Control Kia Cars with License Plate Scanning

Hackers Control Kia Cars with License Plate Scanning

Kia Vehicle Vulnerabilities: A Closer Look Cybersecurity researchers recently disclosed a set of vulnerabilities in Kia vehicles. These vulnerabilities, now patched, could have allowed hackers to control key functions remotely. Surprisingly, they could do this using only a license plate number. The Scope of the Vulnerability Remote Control Possibilities The attacks could be executed remotely…

Read More

New Threat Alert: North Korean Hackers Unleash KLogEXE and FPSpy Malware

Understanding Kimsuky Group and New Malware Strains North Korean-linked threat actors have recently introduced two new malware strains, KLogEXE and FPSpy. The group responsible, often referred to as Kimsuky, is also known by various other names such as APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, and Velvet Chollima. This addition to Kimsuky’s arsenal…

Read More

Watering Hole Attack on Kurdish Sites: Beware of Malicious APKs and Spyware!

Understanding SilentSelfie: Watering Hole Attack on Kurdish Websites Sekoia, a French cybersecurity firm, has shed light on a campaign known as SilentSelfie. The initiative, which has targeted the Kurdish minority, involves compromising as many as 25 websites through a watering hole attack. This stealthy technique collects sensitive information by infecting websites frequently visited by the…

Read More

EPSS vs. CVSS What’s the Best Approach to Vulnerability Prioritization

Understanding Vulnerability Assessment Systems Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a vulnerability, they don’t factor in real-world threat data, such as the likelihood of exploitation. With new vulnerabilities discovered daily, teams don’t…

Read More

Iz VMware v svet inovacij: Prednosti integracije F5 in Red Hat

V današnjem hitro spreminjajočem se svetu informacijske tehnologije se podjetja srečujejo s številnimi izzivi, ki zahtevajo prilagodljive in učinkovite rešitve. Tradicionalne platforme, kot je VMware, se morda ne morejo več kosati s potrebami sodobnih podjetij, ki iščejo načine za avtomatizacijo poslovnih procesov, izboljšanje varnosti in povečanje učinkovitosti. V tem kontekstu sta F5 in Red Hat…

Read More
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Advanced Threat Actor with Indian Nexus: SloppyLemming An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2) operations. This group has gained significant attention due to its sophisticated methods and persistent threats. Cloudflare, a reputable web infrastructure and security company,…

Read More
DragonForce proti LockBit 3.0: Bitka ransomware ogroža vodilne organizacije. Kibernetske grožnje, napadi, ransomware. Ustavite jih zdaj!

DragonForce proti LockBit 3.0: Bitka ransomware ogroža vodilne organizacije. Kibernetske grožnje, napadi, ransomware. Ustavite jih zdaj!

***Ransomware napadi: Naraščajoča grožnja za varnost podjetij*** Ransomware napadi postajajo vse bolj prefinjeni in pogosti, vodje varnosti pa so zaskrbljeni glede sposobnosti svojih organizacij, da se branijo pred njimi. Trg RaaS (Ransomware as a Service), DLS (Data Leak Sites) in partnerski programi prispevajo k porastu ransomware napadov. Razvoj kibernetskih groženj Hiter razvoj ransomware različic presega…

Read More