Daily Threat Intelligence – June 15 – 2023
Researchers have identified two critical cross-site scripting (XSS) vulnerabilities within Microsoft Azure services that pose a significant security risk and...
Researchers have identified two critical cross-site scripting (XSS) vulnerabilities within Microsoft Azure services that pose a significant security risk and...
A new case of an impersonation attack emerged in the last 24 hours. Cybercriminals were found mimicking cybersecurity researchers on...
A widespread brand impersonation campaign targeting over 100 popular brands has been found to be underway since January 2022. Scammers...
Cyber Security Weekly Tip: Data Encryption As we become increasingly reliant on technology, protecting sensitive data has become more important...
The latest Microsoft Patch Tuesday took the wraps off of a critical privilege escalation vulnerability in Win32k, which has already...
VMware has addressed multiple critical and high-severity security issues in VMware Aria Operations for Networks. These could have allowed an...
The aerospace industry faces a new threat in the form of a Powershell script that launches a malware attack. Its...
Cyclops ransomware group is making strides in the cyber landscape for more than one reason. It has leveled up its...
The maker of MOVEit Transfer is alerting customers about the active exploitation of a critical security vulnerability in its software....
Lately, researchers uncovered about a dozen security holes in an educational software program known as Faronics Insight. It includes three...
Looking at its wide user base, WordPress is a hotbed of attacks. Thanks to security experts for securing a bug...
QBot has once again transitioned to an alternative infection method. In the new phishing campaign, attackers are reportedly targeting a...
There have been multiple attacks on routers globally, featuring the likes of the Horse Shell backdoor by Chinese actors. Now,...
A pair of sensitive security holes in one of D-Link’s network management suites has been fixed by the vendor. Uncovered...
Threat actors are preparing the arsenal to abuse misconfigured web applications. An effort by the developers of the Legion malware...
APT groups often use custom tools for reconnaissance and information exfiltration. Along the same lines, North Korean APT Kimsuky was...
Security experts are warning against an easy-to-weaponize security vulnerability affecting a variety of Zyxel firewalls. There are approximately 42,000 instances...
Fake sites, fake app, real malware! A threat actor group has been found infecting potential users of a popular video...
Open-source software supply chains face immense threats from malicious npm packages making it to the repository. Of late, a couple...
Initial Instructions Nmap GoBuster Check the results of the Nmap scan and Gobuster. In this case, the results show a...
A new ransomware group appeared in the cyber landscape. Named MalasLocker, the threat group is breaching Zimbra servers, albeit the...
Ransomware attacks are increasing at an alarming rate. Law enforcement agencies have released a joint advisory underlining threats on critical...
A Go implementation of Cobalt Strike called Geacon is being used by cybercriminals in attacks against macOS devices. Cyber experts...
Are you still operating on vulnerable Microsoft SQL (MS SQL) servers? Security researchers have taken the wraps off of a...