Technology Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks Aug 17, 2023 bleepingcomputer.com Lax policies for package naming on Microsoft's PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular…
Technology Triple Extortion Ransomware and the Cybercrime Supply Chain Aug 17, 2023 bleepingcomputer.com Ransomware attacks continue to grow both in sophistication and quantity. Learn more from Flare about ransomware operation's increasing shift to…
Technology CISA warns of critical Citrix ShareFile flaw exploited in the wild Aug 16, 2023 bleepingcomputer.com CISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown…
Cyber Security Phishing Operators Make Ready Use of Abandoned Websites for Bait Aug 14, 2023 darkreading.com Abandoned sites — like Wordpress — are easy to break into, offer a legitimate looking cover, and can remain active…
Cyber Security XWorm, Remcos RAT Evade EDRs to Infect Critical Infrastructure Aug 11, 2023 darkreading.com Disguised as harmless PDF documents, LNK files trigger a PowerShell script, initiating a Rust-based injector called Freeze[.]rs and a host…
Cyber Security Rhysida Ransomware Trains Its Sights on Healthcare Operations Aug 10, 2023 darkreading.com The new group has already made an impact in multiple countries and industries, including a multistate hospital chain in the…
Technology Gafgyt malware exploits five-years-old flaw in EoL Zyxel router Aug 10, 2023 bleepingcomputer.com Fortinet has issued an alert warning that the Gafgyt botnet malware is actively trying to exploit a vulnerability in the…
Technology Safeguarding Against Silent Cyber Threats: Exploring the Stealer Log Lifecycle Aug 10, 2023 bleepingcomputer.com Infostealer malware has risen to prominence as one of the most significant vectors of cybercrime over the past three years.…
Technology New BitForge cryptocurrency wallet flaws lets hackers steal crypto Aug 9, 2023 bleepingcomputer.com Multiple zero-day vulnerabilities named 'BitForge' in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell 17 affected…
Technology Google to fight hackers with weekly Chrome security updates Aug 9, 2023 bleepingcomputer.com Google has changed the Google Chrome security updates schedule from bi-weekly to weekly to address the growing patch gap problem…
Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks
Lax policies for package naming on Microsoft's PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular…
Triple Extortion Ransomware and the Cybercrime Supply Chain
Ransomware attacks continue to grow both in sophistication and quantity. Learn more from Flare about ransomware operation's increasing shift to…
CISA warns of critical Citrix ShareFile flaw exploited in the wild
CISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown…
Phishing Operators Make Ready Use of Abandoned Websites for Bait
Abandoned sites — like Wordpress — are easy to break into, offer a legitimate looking cover, and can remain active…
XWorm, Remcos RAT Evade EDRs to Infect Critical Infrastructure
Disguised as harmless PDF documents, LNK files trigger a PowerShell script, initiating a Rust-based injector called Freeze[.]rs and a host…
Rhysida Ransomware Trains Its Sights on Healthcare Operations
The new group has already made an impact in multiple countries and industries, including a multistate hospital chain in the…
Gafgyt malware exploits five-years-old flaw in EoL Zyxel router
Fortinet has issued an alert warning that the Gafgyt botnet malware is actively trying to exploit a vulnerability in the…
Safeguarding Against Silent Cyber Threats: Exploring the Stealer Log Lifecycle
Infostealer malware has risen to prominence as one of the most significant vectors of cybercrime over the past three years.…
New BitForge cryptocurrency wallet flaws lets hackers steal crypto
Multiple zero-day vulnerabilities named 'BitForge' in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell 17 affected…
Google to fight hackers with weekly Chrome security updates
Google has changed the Google Chrome security updates schedule from bi-weekly to weekly to address the growing patch gap problem…