Andrea Fortuna
AboutRss
  • Apr 11, 2023

    QuaDream's Spyware exploits iPhones with Zero-Click ENDOFDAYS attack

    Microsoft and Citizen Lab reported that an Israeli-based company, QuaDream, had used a zero-click exploit named ENDOFDAYS to compromise the iPhones of high-risk individuals. The attackers targeted a zero-day vulnerability affecting iPhones running iOS 1.4 up to 14.4.2 between January… read more »
  • Apr 10, 2023

    Malicious JavaScript injection campaign affects over 51,000 websites since 2022

    According to a recent research by security firm Sucuri, a malware campaign called Balada Injector has infected over one million WordPress websites since 2017 by exploiting known vulnerabilities in themes and plugins. The attackers use various methods, including String.fromCharCode obfuscation,… read more »
  • Apr 9, 2023

    AlienFox: Unraveling the Multi-Functional Cloud Spammer's Swiss Army Knife

    In a comprehensive analysis published by SentinelOne Labs, researchers dissect the inner workings of AlienFox, a highly versatile and multi-functional malware highlighting its features and the risks it poses. What is AlienFox? AlienFox is a highly adaptable and multi-purpose cyber… read more »
  • Apr 9, 2023

    GOPURAM Backdoor: A Deep Dive into the 3CX Supply Chain Attack

    In a recent article published by Securelist, researchers detailed the supply chain attack targeting the 3CX Phone System: the attackers managed to compromise the 3CX update infrastructure and deployed a malicious backdoor, dubbed GOPURAM, to unsuspecting users. The GOPURAM backdoor… read more »
  • Apr 8, 2023

    Discovered a new Cylance variant with advanced features

    Security researchers at Cyble recently discovered a new ransomware variant with some concerning capabilities. Called “Cylance”, this ransomware has a number of advanced features that allow attackers to customize attacks. The ransomware has many command-line options that allow attackers to specify things like file… read more »
  • Apr 8, 2023

    Bitdefender's Cybersecurity Assessment Report 2023: Companies Hiding Data Breaches

    Bitdefender’s Cybersecurity Assessment Report 2023 reveals that almost a third of surveyed companies do not disclose data breaches. The report, which summarizes the results of a survey conducted between December 2022 and January 2023, also shows that 52% of IT… read more »
  • Apr 7, 2023

    Telegram becoming a Hub for Phishing Kits and campaigns

    Researchers have discovered that cybercriminals are using Telegram to sell phishing kits and set up phishing campaigns. Phishers create Telegram channels to promote their wares and educate their audience about phishing techniques. Links to these channels are distributed via YouTube,… read more »
  • Apr 5, 2023

    Typhon Reborn malware returns with improved capabilities

    According to a report by Cisco Talos, the Typhon Reborn information-stealing malware has returned with an updated version that includes improved capabilities to evade detection and analysis. The new version, which is being offered for sale on the criminal underground,… read more »
  • Apr 4, 2023

    Rorschach raises the bar for ransomware attacks

    Check Point researchers have discovered a new strain of ransomware called Rorschach, with unique characteristics that make it one of the fastest ransomware threats today. The malware was deployed using the DLL side-loading technique via a signed component in Cortex… read more »
  • Apr 4, 2023

    Cybercriminals use SFX archives to install backdoors

    CrowdStrike researchers have discovered that SFX archives used to share compressed files with those who do not have WinRAR on their computers are being exploited to hide infected files capable of installing backdoors that bypass operating system security measures. Cybercriminals… read more »
  • Apr 1, 2023

    3CX Desktop App targeted in supply chain attack

    Researchers at cybersecurity firm Cyble have conducted a comprehensive analysis of the supply chain attack targeting customers of 3CX, a VoIP IPBX software development company. The attack has been attributed to North Korean Threat Actors and involves a Trojanized version… read more »
  • Apr 1, 2023

    Unauthenticated RCE vulnerability found in Azure Service Fabric Explorer

    Orca Security researchers discovered a new vulnerability called Super FabriXss (CVE-2023-23383 – CVSS score: 8.2) in Azure Service Fabric Explorer that allows unauthenticated remote code execution. Azure Service Fabric Explorer is a web-based management tool that allows users to visualize… read more »
  • Mar 29, 2023

    Zero-Day exploits used by commercial spyware vendors to target dissidents and journalists

    Google’s Threat Analysis Group (TAG) has released a report stating that commercial spyware vendors have been exploiting zero-day vulnerabilities that were addressed last year in order to target Android and iOS devices. These campaigns were highly targeted and limited, taking… read more »
  • Mar 29, 2023

    TOR Browser installers used to spread cryptocurrency theft malware

    Since September 2022, trojanised installers for the TOR browser have been used to distribute Clipper malware, which steals cryptocurrency from users in Russia and Eastern Europe. The malware scans clipboard contents for cryptocurrency wallet addresses and replaces them with addresses… read more »
  • Mar 29, 2023

    APT43: a new North Korean espionage group

    A new report from cybersecurity firm Mandiant sheds light on a previously unknown threat actor operating on behalf of the North Korean regime and using cybercrime to fund its espionage operations. The group, dubbed APT43, is a prolific and aggressive… read more »
  • Mar 27, 2023

    MacStealer malware targets Apple's macOS devices to steal sensitive information

    According to a recent research from cybersecurity firm Uptycs, a new malware named MacStealer is targeting Apple’s macOS operating system to steal sensitive information, including documents, cookies, and login credentials. The malware primarily affects devices running macOS versions Catalina and… read more »
  • Mar 26, 2023

    Nim programming language used to create Dark Power ransomware

    A new ransomware operation called Dark Power has surfaced, targeting organisations around the world and demanding relatively small ransom payments of $10,000. According to a recent report from cybersecurity firm Trellix, the ransomware uses the Nim programming language, making it… read more »
  • Mar 24, 2023

    Untitled Goose Tool: CISA's query and analysis tool for Azure and M365

    The US Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments. Known as the “Untitled Goose Tool”, this Python-based utility can download telemetry information… read more »
  • Mar 22, 2023

    Android phones vulnerable to remote hacking via phone numbers

    Google has released a warning that certain Android phones may be remotely hacked without the need for the victim to interact with anything. The attack can allow a remote user access to call information and text messages being transmitted via… read more »
  • Mar 21, 2023

    Chaos Engineering: breaking systems to make them stronger

    Chaos Engineering is a practice that aims to identify potential issues and vulnerabilities in a system by deliberately introducing controlled failures. The goal is to expose weaknesses before they cause significant damage in a real-world scenario. Advances in large-scale, distributed… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician