LockBit’s New Regulations Sets Minimum For Ransom Demands
LockBit’s New Regulations Sets Minimum For Ransom Demands Recently, the notorious LockBit ransomware group has initiated a significant discussion among its affiliates regarding potential cha...
Why are Threat Actors Targeting Indonesia?
Why are Threat Actors Targeting Indonesia? On September 3, Indonesia hiked fuel prices by 30%, stating that petrol and diesel prices are still low by world standards, but subsidies are unsustainable. ...
MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’
MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’ A cybercriminal gang employing a combination of impersonation and malware is the prime suspect behind the cyberattack that crippled the ope...
LockBit Attack Fails, 3AM Ransomware Steps In as Plan B
LockBit Attack Fails, 3AM Ransomware Steps In as Plan B Researchers have recently identified a new strain of ransomware called 3AM. Their investigation revealed that the first known usage of this rans...
September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zer...
September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zero-Day Vulnerabilities [Update] September 15, 2023: See the subheading: “Proof-of-Concept (PoC) Exploit Available for CVE-2023-3814...
Mother of the Threats: Threat as a Service
Mother of the Threats: Threat as a Service Anonymous Russia’s botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, whic...
Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-...
Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-20269) Cisco recently issued an advisory regarding a zero-day vulnerability, CVE-2023-20269, in its Adaptive Security Appliance (A...
Telegram Hit by a DDoS Attack: What Is the Cause Behind It?
Telegram Hit by a DDoS Attack: What Is the Cause Behind It? In a recent update, a well-known and notorious threat actor declared their targeting of Telegram. This group initiated the attack after Tele...
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole ...
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor ...
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found...
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240) Security researchers have recently unearthed three security vulnerabilities affe...
Threat Actors Accessed UK Military Data From Weakest Link
Threat Actors Accessed UK Military Data From Weakest Link On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed...
MalDoc in PDF: A Novel Method to Distribute Malicious Macros
MalDoc in PDF: A Novel Method to Distribute Malicious Macros Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various ...
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-...
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-2023-41106 In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. H...
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Oth...
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Other E-Commerce Sites Telekopye is a Telegram bot, named by combining the words Telegram and “kopye,” which means “spear...
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Re...
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Remote Code Execution in Juniper OS (CVE-2023-36844 through CVE-2023-36847) Published on August 17, 2023, a significant security bul...
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-20...
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-2023-38035) [Update] August 25, 2023: See the subheadings: “Proof-of-Concept (PoC) Exploit Available for the Ivanti Sentry Zer...
What You Need to Know About Cisco Unified Communications Manager SQL I...
What You Need to Know About Cisco Unified Communications Manager SQL Injection Vulnerability (CVE-2023-20211) In today’s connected world, efficient tools like the Cisco Unified Communications Manager ...
AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization
AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization [Update] August 18, 2023: The effects of the AnonFiles service’s closure have started coming into view. See the subheading: “C...
The Rising Anxiety Over LinkedIn Account Takeover Claims
The Rising Anxiety Over LinkedIn Account Takeover Claims In an age dominated by the digital, online platforms like LinkedIn have become vital components of our professional identities. But as we incre...
Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32...
Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560 Two critical vulnerabilities, collectively identified as CVE-2023-32560, have been discovered within Ivanti Avalanche, an ente...