Category: EN

PolarEdge: Unveiling an uncovered IOT Botnet

This blog post analyzes the PolarEdge backdoor and its associated botnet, offering insights into the adversary’s infrastructure. La publication suivante PolarEdge: Unveiling an uncovered IOT Botnet est un article de Sekoia.io Blog. This article has been indexed from Sekoia.io Blog…

US Lawmaker Demands Answers On EU Antitrust Law

US lawmaker demands clarifications on enforcement of Digital Markets Act, arguing it amounts to ‘tax’ on American companies This article has been indexed from Silicon UK Read the original article: US Lawmaker Demands Answers On EU Antitrust Law

Top Mobile Security Courses for App Developers

As the demand for mobile applications continues to soar, so does the importance of ensuring their security. With cyber threats becoming increasingly sophisticated, app developers must stay ahead of potential vulnerabilities and protect user data from malicious attacks. For developers…

CISA Alerts: Oracle Agile Vulnerability Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active exploitation of a severe deserialization vulnerability (CVE-2024-20953) in Oracle Agile Product Lifecycle Management (PLM) software. Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on February…

KernelSnitch: Uncovering a New Side-Channel Attack on Data Structures

Researchers at Graz University of Technology have uncovered a groundbreaking software-based side-channel attack, KernelSnitch, which exploits timing variances in Linux kernel data structures. Unlike hardware-dependent attacks, KernelSnitch targets hash tables, radix trees, and red-black trees, enabling unprivileged attackers to leak sensitive…

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files

A newly discovered technique allows threat actors to circumvent Microsoft Outlook’s spam filters to deliver malicious ISO files, exposing organizations to sophisticated phishing campaigns. The bypass leverages hyperlink obfuscation to disguise malicious links as benign URLs, enabling attackers to distribute…

100+ Malicious IPs Actively Exploiting Vulnerabilities in Cisco Devices

A malicious campaign targeting Cisco networking equipment through two critical vulnerabilities, with state-backed actors and other actors exploiting unpatched systems. GreyNoise Intelligence has identified 110 malicious IPs actively exploiting CVE-2023-20198, a privilege escalation flaw in Cisco IOS XE devices. There…

CISA, FBI, and MS-ISAC Warn of Ghost Ransomware Threat

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has issued a joint Cybersecurity Advisory on Ghost (Cring) ransomware.   The advisory, titled #StopRansomware: Ghost…

Massive Botnet Targets MS 365 Accounts with Password Spraying Attacks

A botnet made up of more than 130,000 compromised devices is conducting large-scale password-spraying attacks against M365 accounts, exploiting non-interactive sign-ins with Basic Authentication.   This method lets malicious actors bypass modern login protections, evade multi-factor authentication (MFA) enforcement, and remain…