In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to...
Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor
Aug 20, 2024Ravie LakshmananVulnerability / Threat Intelligence
A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an...
CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks
Aug 20, 2024Ravie LakshmananVulnerability / Ransomware
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its...
Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America
Aug 20, 2024Ravie LakshmananMalware / Cyber Espionage
Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted...
Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information
Aug 20, 2024Ravie LakshmananEnterprise Security / Data Breach
Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that...
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime
Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat.
"These...
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia
Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency
A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads...
How to Automate the Hardest Parts of Employee Offboarding
According to recent research on employee offboarding, 70% of IT professionals say they've experienced the negative effects of incomplete IT offboarding, whether in...
Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks
Aug 19, 2024Ravie LakshmananCloud Security / Threat Intelligence
Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and...