• Android phones vulnerable to remote hacking via phone numbers

    Google has released a warning that certain Android phones may be remotely hacked without the need for the victim to interact with anything. The attack can allow a remote user access to call information and text messages being transmitted via… read more »
  • Chaos Engineering: breaking systems to make them stronger

    Chaos Engineering is a practice that aims to identify potential issues and vulnerabilities in a system by deliberately introducing controlled failures. The goal is to expose weaknesses before they cause significant damage in a real-world scenario. Advances in large-scale, distributed… read more »
  • Vulnerability allows restoration of sensitive information on Google Pixel screenshots

    Security researchers David Buchanan and Simon Aarons have discovered a serious vulnerability in Google Markup, the screenshot editing tool available on Pixel devices. The bug, dubbed “aCropalypse”, allows certain parts of the image to be restored, potentially exposing sensitive information.… read more »
  • Dero cryptocurrency mining campaign discovered by CrowdStrike

    CrowdStrike has discovered a cryptojacking campaign targeting Kubernetes infrastructure, believed to be the first Dero cryptojacking operation. Dero is a private, decentralised application platform that offers enhanced privacy and anonymity compared to other cryptocurrencies. The attack targets Kubernetes clusters exposed… read more »
  • March 2023 Patch Tuesday: Two actively exploited zero days disclosed

    Microsoft has released 80 security patches for its March 2023 Patch Tuesday rollout. The patches include 9 Critical, 70 Important, and 1 Moderate vulnerabilities. Additionally, there are two actively exploited zero-day vulnerabilities: a Critical elevation of privilege within Microsoft Outlook… read more »
  • GoBruteforcer: new malware targets web servers

    Researchers at Palo Alto Networks Unit 42 have discovered a new malware called GoBruteforcer, written in Golang and targeting web servers running phpMyAdmin, MySQL, FTP and Postgres. The malware scans Classless Inter-Domain Routing (CIDR) blocks and brute-force passwords using a… read more »
  • Essential Tools for Gathering and Analyzing IOCs

    In Cyber Threat Intelligence, the collection and analysis of Indicators of Compromise (IOCs) is critical because they provide valuable information that can help organisations detect and respond to cyber threats more effectively. IOCs are pieces of evidence or artefacts that… read more »
  • Plaso 20230226 has been released

    Plaso is a Python-based engine that can automatically create timelines from various files found on typical computer systems. It can extract timestamps from file system metadata, log files, registry files, browser history, email archives, and many other sources, and can… read more »