Daily Threat Intelligence – May 31 – 2023
Looking at its wide user base, WordPress is a hotbed of attacks. Thanks to security experts for securing a bug...
Looking at its wide user base, WordPress is a hotbed of attacks. Thanks to security experts for securing a bug...
QBot has once again transitioned to an alternative infection method. In the new phishing campaign, attackers are reportedly targeting a...
There have been multiple attacks on routers globally, featuring the likes of the Horse Shell backdoor by Chinese actors. Now,...
A pair of sensitive security holes in one of D-Link’s network management suites has been fixed by the vendor. Uncovered...
Threat actors are preparing the arsenal to abuse misconfigured web applications. An effort by the developers of the Legion malware...
APT groups often use custom tools for reconnaissance and information exfiltration. Along the same lines, North Korean APT Kimsuky was...
Security experts are warning against an easy-to-weaponize security vulnerability affecting a variety of Zyxel firewalls. There are approximately 42,000 instances...
Fake sites, fake app, real malware! A threat actor group has been found infecting potential users of a popular video...
Open-source software supply chains face immense threats from malicious npm packages making it to the repository. Of late, a couple...
Initial Instructions Nmap GoBuster Check the results of the Nmap scan and Gobuster. In this case, the results show a...
A new ransomware group appeared in the cyber landscape. Named MalasLocker, the threat group is breaching Zimbra servers, albeit the...
Ransomware attacks are increasing at an alarming rate. Law enforcement agencies have released a joint advisory underlining threats on critical...
A Go implementation of Cobalt Strike called Geacon is being used by cybercriminals in attacks against macOS devices. Cyber experts...
Are you still operating on vulnerable Microsoft SQL (MS SQL) servers? Security researchers have taken the wraps off of a...
Cryptomining attacks have become a prominent threat as they offer anonymity to illicit revenue earners in many ways. Security researchers...
Another covert activity aimed at intelligence gathering and data theft has been reported in Central Asia. A state-sponsored group is...
It’s that time of the month when software vendors and critical infrastructure industries issue security patches in bulk to address...
Unpatched security issues continue to be one of the top reasons enterprises suffer unauthorized intrusions. Lately, cybercriminals behind AndoryuBot botnet...
The stealth with which ransomware operations run today is highly intimidating to businesses. Researchers have stumbled across a couple of...
OpenAI is in the headlines again, however, this time it’s sensitive. A research group has detected a security hole in...
Operating with products that have reached End-of-Life (EoL) is an open invitation to malicious actors. Cisco is warning users of...
TikTok as a popular app is lucrative to cybercriminals. After all, it has an ocean of data with billions of...
In the wake of cybercriminals increasingly attempting to break into iOS, iPadOS, and macOS devices, and with a few exploits...
Cybercriminals are constantly devising new ways to evade detection by security software. In one such observation, researchers detected a change...