Category: EN

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which exploit known vulnerabilities in D-Link routers, including those with outdated firmware like DIR-645, DIR-806, GO-RT-AC750, and DIR-845L.  Attackers leverage the…

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-3393 Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose…

Catching “EC2 Grouper”- no indicators required!

Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Catching “EC2 Grouper”- no indicators required!

Italy faces DDOS attacks from Russia

On Saturday, a series of sophisticated cyberattacks hit nine Italian government websites, causing disruptions across several key digital platforms. Among the affected sites were those of Italy’s Foreign Ministry, as well as the official websites of Milan’s two major airports,…

State Legislatures Are The Frontline for Tech Policy: 2024 in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> State lawmakers are increasingly shaping the conversation on technology and innovation policy in the United States. As Congress continues to deliberate key issues such as data privacy,…

Fighting Automated Oppression: 2024 in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF has been sounding the alarm on algorithmic decision making (ADM) technologies for years. ADMs use data and predefined rules or models to make or support decisions,…

Vulnerability Summary for the Week of December 23, 2024

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Attendance Tracking Management System  A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been rated as critical. This issue affects some unknown processing…

How MXDR Services Solve Cyber Talent Shortages

The cybersecurity industry faces an unprecedented talent shortage. In this article, we’ll explore the implications of this shortage and how MXDR services can bridge the gap.  The shortage in cybersecurity expertise presents a significant challenge, affecting various sectors, from businesses…

Critical Infrastructure Faces Rising Ransomware Risks

  In October 2024, Interlock claimed to have attacked several organizations, including Wayne County, Michigan, which is known for its cyberattacks. Ransomware is characterized by the fact that the encrypted data is encrypted by an encryptor specifically designed for the…