-
Mar 29, 2023
Since September 2022, trojanised installers for the TOR browser have been used to distribute Clipper malware, which steals cryptocurrency from users in Russia and Eastern Europe. The malware scans clipboard contents for cryptocurrency wallet addresses and replaces them with addresses… read more »
-
Mar 29, 2023
A new report from cybersecurity firm Mandiant sheds light on a previously unknown threat actor operating on behalf of the North Korean regime and using cybercrime to fund its espionage operations. The group, dubbed APT43, is a prolific and aggressive… read more »
-
Mar 27, 2023
According to a recent research from cybersecurity firm Uptycs, a new malware named MacStealer is targeting Apple’s macOS operating system to steal sensitive information, including documents, cookies, and login credentials. The malware primarily affects devices running macOS versions Catalina and… read more »
-
Mar 26, 2023
A new ransomware operation called Dark Power has surfaced, targeting organisations around the world and demanding relatively small ransom payments of $10,000. According to a recent report from cybersecurity firm Trellix, the ransomware uses the Nim programming language, making it… read more »
-
Mar 24, 2023
The US Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments. Known as the “Untitled Goose Tool”, this Python-based utility can download telemetry information… read more »
-
Mar 22, 2023
Google has released a warning that certain Android phones may be remotely hacked without the need for the victim to interact with anything. The attack can allow a remote user access to call information and text messages being transmitted via… read more »
-
Mar 21, 2023
Chaos Engineering is a practice that aims to identify potential issues and vulnerabilities in a system by deliberately introducing controlled failures. The goal is to expose weaknesses before they cause significant damage in a real-world scenario. Advances in large-scale, distributed… read more »
-
Mar 20, 2023
Security researchers David Buchanan and Simon Aarons have discovered a serious vulnerability in Google Markup, the screenshot editing tool available on Pixel devices. The bug, dubbed “aCropalypse”, allows certain parts of the image to be restored, potentially exposing sensitive information.… read more »
-
Mar 15, 2023
CrowdStrike has discovered a cryptojacking campaign targeting Kubernetes infrastructure, believed to be the first Dero cryptojacking operation. Dero is a private, decentralised application platform that offers enhanced privacy and anonymity compared to other cryptocurrencies. The attack targets Kubernetes clusters exposed… read more »
-
Mar 15, 2023
Microsoft has released 80 security patches for its March 2023 Patch Tuesday rollout. The patches include 9 Critical, 70 Important, and 1 Moderate vulnerabilities. Additionally, there are two actively exploited zero-day vulnerabilities: a Critical elevation of privilege within Microsoft Outlook… read more »
-
Mar 14, 2023
Researchers at Palo Alto Networks Unit 42 have discovered a new malware called GoBruteforcer, written in Golang and targeting web servers running phpMyAdmin, MySQL, FTP and Postgres. The malware scans Classless Inter-Domain Routing (CIDR) blocks and brute-force passwords using a… read more »
-
Mar 13, 2023
In Cyber Threat Intelligence, the collection and analysis of Indicators of Compromise (IOCs) is critical because they provide valuable information that can help organisations detect and respond to cyber threats more effectively. IOCs are pieces of evidence or artefacts that… read more »
-
Mar 11, 2023
Plaso is a Python-based engine that can automatically create timelines from various files found on typical computer systems. It can extract timestamps from file system metadata, log files, registry files, browser history, email archives, and many other sources, and can… read more »
-
Mar 10, 2023
According to a recent report from cybersecurity firm Mandiant, Chinese cybercriminals are targeting unpatched SonicWall gateways with credential-stealing malware that persists through firmware upgrades. The spyware is targeting the SonicWall Secure Mobile Access 100 Series, which provides VPN access to… read more »
-
Mar 9, 2023
When it comes to responding to cybersecurity incidents, organisations have several options, including using a Computer Emergency Response Team (CERT), a Computer Security Incident Response Team (CSIRT) or a Security Operations Center (SOC). While these teams may seem interchangeable, there… read more »
-
Mar 9, 2023
The popular open-source password management service, Bitwarden, offers an auto-fill feature that can automatically fill in users’ saved credentials when they visit a website. However, this feature has a potentially dangerous behavior that could allow malicious iframes embedded in trusted… read more »
-
Mar 8, 2023
Chinese threat actor Sharp Panda has targeted high-profile government agencies in Southeast Asia with a cyber espionage campaign using a new version of the Soul modular framework. Cybersecurity firm Check Point has described the activity as “long-running” and has previously… read more »
-
Mar 6, 2023
A new report from cybersecurity firm MITIGA has revealed that malicious actors can exploit a lack of forensic visibility in Google Cloud Platform (GCP) to exfiltrate sensitive data. The research found that GCP does not provide sufficient visibility into its… read more »
-
Mar 5, 2023
CrowdStrike has released its 9th Annual Global Threat Report, which provides a comprehensive overview of threat actor behaviour, tactics and trends over the past year. The report is based on the activities of more than 200 cyber adversaries and covers… read more »
-
Mar 3, 2023
The Cybersecurity and Infrastructure Security Agency (CISA) recently launched a free tool called Decider to help the cybersecurity community map threat actor behaviour to the MITRE ATT&CK Framework. Decider uses a combination of guided questions, efficient search and filtering, and… read more »