Daily Threat Intelligence – June 22 – 2023
Apple on Wednesday resolved three zero-day vulnerabilities that were being actively exploited in attacks aimed at installing the TriangleDB spyware...
Apple on Wednesday resolved three zero-day vulnerabilities that were being actively exploited in attacks aimed at installing the TriangleDB spyware...
Researchers have issued warnings about an ongoing Tsunami DDoS botnet campaign that specifically targets unprotected Linux SSH servers. This botnet...
ASUS has addressed both ‘Critical’ and ‘High’ rated security vulnerabilities in the latest round of updates for multiple router models....
U.S. power and electronics company Eaton patched a sensitive security flaw that enabled an unauthenticated user to remotely access a...
No ifs no buts! Disable HTTP and HTTPS traffic to MOVEit Transfer, said the maker of the file-sharing software after...
Researchers have identified two critical cross-site scripting (XSS) vulnerabilities within Microsoft Azure services that pose a significant security risk and...
A new case of an impersonation attack emerged in the last 24 hours. Cybercriminals were found mimicking cybersecurity researchers on...
A widespread brand impersonation campaign targeting over 100 popular brands has been found to be underway since January 2022. Scammers...
Cyber Security Weekly Tip: Data Encryption As we become increasingly reliant on technology, protecting sensitive data has become more important...
The latest Microsoft Patch Tuesday took the wraps off of a critical privilege escalation vulnerability in Win32k, which has already...
VMware has addressed multiple critical and high-severity security issues in VMware Aria Operations for Networks. These could have allowed an...
The aerospace industry faces a new threat in the form of a Powershell script that launches a malware attack. Its...
Cyclops ransomware group is making strides in the cyber landscape for more than one reason. It has leveled up its...
The maker of MOVEit Transfer is alerting customers about the active exploitation of a critical security vulnerability in its software....
Lately, researchers uncovered about a dozen security holes in an educational software program known as Faronics Insight. It includes three...
Looking at its wide user base, WordPress is a hotbed of attacks. Thanks to security experts for securing a bug...
QBot has once again transitioned to an alternative infection method. In the new phishing campaign, attackers are reportedly targeting a...
There have been multiple attacks on routers globally, featuring the likes of the Horse Shell backdoor by Chinese actors. Now,...
A pair of sensitive security holes in one of D-Link’s network management suites has been fixed by the vendor. Uncovered...
Threat actors are preparing the arsenal to abuse misconfigured web applications. An effort by the developers of the Legion malware...
APT groups often use custom tools for reconnaissance and information exfiltration. Along the same lines, North Korean APT Kimsuky was...
Security experts are warning against an easy-to-weaponize security vulnerability affecting a variety of Zyxel firewalls. There are approximately 42,000 instances...
Fake sites, fake app, real malware! A threat actor group has been found infecting potential users of a popular video...
Open-source software supply chains face immense threats from malicious npm packages making it to the repository. Of late, a couple...