Tag: technews

  • Experts uncover supply chain attacks in PowerShell Gallery

    by

    in

    Experts uncover supply chain attacks in PowerShell Gallery Active flaws in the PowerShell Gallery could be weaponized by threat actors to pull off supply chain attacks against the registry’s users. The PowerShell Gallery is a central repository for sharing and acquiring PowerShell code. It has an easy way of determining the actual author of a…

  • Patch now to fix remote attacks against devices running Juniper Junos OS #technews #tech #hackers

    by

    in

    Patch now to fix remote attacks against devices running Juniper Junos OS #technews #tech #hackers Juniper Networks updates its Junos OS with fixes for several security flaws, including two PHP vulnerabilities and two PHP external variable modification vulnerabilities. The company warns that an attacker could use these vulnerabilities to gain remote code execution on compatible…

  • What are the latest trends in credential theft in 2023? #tech #technews #techshorts

    by

    in

    What are the latest trends in credential theft in 2023? #tech #technews #techshorts No matter how strong a company’s security, a password stolen from another less-protected organization is difficult to prevent from reuse. And how can you tell if your users have compromised passwords out there too?Finding stolen secrets in black markets Like evolved black…

  • CISA Adds Citrix ShareFile Flaw to KEV Catalog #techshorts #technews

    by

    in

    CISA Adds Citrix ShareFile Flaw to KEV Catalog #techshorts #technews The U.S. government’s Cybersecurity and Infrastructure Security Agency has added a flaw in Citrix’s ShareFile storage controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active in-the-wild exploitation. This vulnerability affects all currently supported versions of customer-managed Share File storage zones controller…

  • Hackers Use Chat App to Covertly Control Computers in Diplomatic Phishing #tech #technews

    by

    in

    Hackers Use Chat App to Covertly Control Computers in Diplomatic Phishing #tech #technews An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The threat actor used Zulip for command-and-control, a chat application for command and control, and a TOR hidden service to access the device…

  • Android Malware Evades Detection by Using Stealthy APK Compression

    by

    in

    Android Malware Evades Detection by Using Stealthy APK Compression Threat actors are using Android APKs with unknown or unsupported compression methods to elude malware analysis. In order to do that, the APK . This includes zip files that don’t have a strong enough decompression method. The company has found that APK’s packed in ZIP form…

  • How Continuous Network Monitoring Can Benefit Your Business

    by

    in

    How Continuous Network Monitoring Can Benefit Your Business You need continuous network monitoring. Intruder gives you a real view of your attack surface. With its free 14-day trial, you can learn how to live with complete visibility across your entire IT environment and take your network security to another level. Continuous network monitoring supported by…

  • GitLab Flaw Used in New LABRAT Cryptojacking and Proxy

    by

    in

    GitLab Flaw Used in New LABRAT Cryptojacking and Proxy A new financial motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw in GitLab as part of a cryptojacking and proxyjacking campaign. Proxyjacking allows an attacker to rent out a compromised host out to a proxy network, making it possible to monetize the…

  • “Apple iOS 16 exploit enables stealthy cellular access”

    by

    in

    “Apple iOS 16 exploit enables stealthy cellular access” When the user turns on Airplane Mode, the network interface pdp_ip0 (cellular data will no longer display ipv4/ipv6 ip addresses, the researchers explained. Using this database of installed application bundle IDs we can now selectively block or allow an app to access Wi-Fi or cellular data. The…

  • China-Linked Bronze Starlight Group Targets Gambling Sector with Cobalt Strike

    by

    in

    China-Linked Bronze Starlight Group Targets Gambling Sector with Cobalt Strike An an ongoing cyber attack campaign originating from China is targeting the Southeast Asian gambling sector to deploy Cobalt Strike beacons on compromised systems. The threat actors abuse Adobe Creative Cloud, Microsoft Edge, and McAfee VirusScan executables vulnerable to DLL hijacking to deploy these beacons,…