Mystic Stealer is an information-stealing malware that first emerged on hacking forums on April 2023. The stealer gets more and more popular among cybercriminals as its features evolve. Details About Mystic Stealer The malware is rented for $150/month, or $390/…
Category: Heimdal Security Blog
The Importance of Securing Remote Access: Insights from CISA’s Latest Guide
Several cybersecurity agencies have collaborated to release a comprehensive guide to address the increasing threat posed by the malicious use of remote access software. US Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI),…
LockBit Ransomware Extorted $91 Million Dollars in 1,700 U.S. Attacks
In a joint LockBit ransomware advisory, U.S. and international cybersecurity officials reported that the group has successfully extorted over $91 million after committing almost 1,700 operations against American businesses since 2020. Details from the U.S. And International Cybersecurity Officials Joint…
Close Quarters Encounters with Third Generation Malware Compels UK and Danish Municipalities to Remodel Vulnerability Management Safeguards
In analyzing the threatscape, regardless of the chosen timeframe, the unequivocal conclusion we face is that the reactionary dynamic between defender and threat actor compels each other to transform, evolve, and, ultimately, face one another on a different type of…
More 3CX Data Exposed! Third-Party Vendor to Blame for the Leak
Sensitive 3CX data was exposed when a third-party vendor of the well-known Voice over Internet Protocol (VoIP) communications service 3CX left an open server. Even though the corporation had lately been the target of North Korean hackers, the problem slipped…
MDR vs. MSSP: Decoding the Differences Between Cybersecurity Solutions
In the constantly changing cybersecurity world, organizations confront a variety of obstacles when trying to protect their digital assets. Businesses must rely on comprehensive security solutions to safeguard their sensitive data as attacks become more complex and breaches more frequent. …
New Russian APT Group Responsible for Wiper Attacks in Ukraine Exposed
Security researchers have made a public disclosure about the identification of a new Advanced Persistent Threat (APT) group associated with Russia’s General Staff Main Intelligence Directorate (GRU). The experts have issued a warning, revealing that this threat actor has been…
Private Data Compromised in Healthcare Breach
In a recent announcement, the Commonwealth Health System revealed that threat actors have successfully breached the computer network of a Scranton cardiology group, potentially compromising the private data of 181,764 patients. This incident marks the latest in a series of…
Patch Tuesday June 2023 – 78 Flaws and 38 RCE Bugs Fixed
As per usual, Microsoft rolled out its monthly updates on the second Tuesday of the month. 78 flaws, including 38 remote code execution vulnerabilities were fixed as part of this edition of Patch Tuesday. Microsoft only rated six problems as…
Fake Security Researchers Deliver Malicious Zero-Day Exploits
Cybercriminals use fake accounts on Twitter and GitHub to spread fake proof-of-concept (PoC) exploits for zero-day vulnerabilities. They impersonate cybersecurity researchers to push Windows and Linux with malware. How the Scam Works These impersonators pretend to work at a fake…
Agencies Are Compelled to Secure All Internet-exposed Equipment by CISA Orders
The American Cybersecurity & Infrastructure Security Agency (CISA) issued on June 13, 2023, a binding operational directive (BOD) requiring federal civilian agencies to safeguard networking equipment that is faulty or exposed to the Internet. Federal civilian executive branch (FCEB) agencies…
Threat Actors Target the University of Manchester in Cyberattack
The University of Manchester network was reportedly hit by a cyberattack and the security team suspects data was stolen. Researchers discovered the data breach on Tuesday, June 6th. Threat actors managed to gain unauthorized access to some of the university`s…
What Is User Access Review?
User access review is an essential component of any organization’s Identity and Access Management (IAM) strategy. Also known as access audit, entitlement review, account attestation, or account recertification, it describes the process of periodically reviewing the access rights and privileges…
Patching Required! New Critical SQL Injection Vulnerabilities Found in MOVEit
Researchers discovered new critical SQL injection vulnerabilities in the MOVEit Transfer managed file transfer (MFT) solution. The flaws could enable threat actors to exfiltrate information from customers’ databases. In addition, they impact all MOVEit Transfer versions. An attacker could submit…
Clop Ransomware Is Likely Behind the MOVEit Zero-Day Vulnerability Attacks
The notorious Clop Ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed file transfer (MFT) solution since 2021, as reported by security researchers. During the examination of recent Clop data theft attacks…
What Is the Principle of Least Privilege (POLP)?
The principle of least privilege (POLP), also named the “principle of least authority” (POLA) or “the principle of minimal privilege” (POMP), stands for a cybersecurity best practice based upon granting the minimum required access that a user needs to perform…
Kimsuky Strikes Again: New Campaign Targets Credentials and Intelligence
Kimsuky, the notorious North Korean nation-state threat actor, has been linked to a social engineering campaign targeting experts on North Korean affairs in order to steal Google credentials and deliver reconnaissance malware. Using spoofed URLs, websites imitating legitimate web platforms,…
Royal Ransomware Gang Bolsters Arsenal with BlackSuit Encryptor
The testing phase of BlackSuit, a new encryptor developed by the Royal ransomware gang, has commenced. This encryptor bears striking resemblances to the typical encryptor used by the gang in their operations. Following the shutdown of the infamous Conti operation…
Verizon 2023 DBIR Is Out: Median Cost of Ransomware Incidents Risen to $26,000
Verizon published Tuesday, June 6th, the 2023 Data Breach Investigations Report (DBIR), one of the most highly regarded reports in cybersecurity. The report reveals details about the actors, actions, and patterns and is an important starting point for any organization`s…
Heimdal and SPP Join Forces to Deliver Award-Winning Unified Security Capabilities to US Service Providers
Heimdal and Texas-based renowned MSSP for MSPs, Service Provider Partners (SPP) have announced a new alliance aimed at delivering Heimdal’s innovative unified security platform to solution providers in the US market. As the rate and sophistication of cyber threats continue…
Companies Affected by Ransomware [Updated 2023]
The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world, threat actors take advantage of security vulnerabilities and encrypt data belonging to all sorts of organizations: from private…
Vulnerability Alert! Two New Exploited Flaws Discovered on Zyxel Firewalls
CISA included CVE-2023-33009 and CVE-2023-33010 Zyxel Firewalls flaws in its Known Exploited Vulnerabilities (KEV) catalog. The new CVEs could lead to a denial-of-service (DoS) condition and remote code execution. The flaws are buffer overflow vulnerabilities and were rated 9.8 out…
New PowerDrop Malware Discovered Targeting U.S. Aerospace Industry
Researchers announced finding a sample of the new PowerDrop malware in the network of a defense contractor in the U.S. The discovery indicates that threat actors use PowerShell-based malware to attack the U.S. aerospace defense industry. The new PowerDrop malware…
SpinOk Malware, Discovered in 193 Apps with Over 451M Installs
The SpinOk malware was discovered in a new batch of Android apps on Google Play, where it was reportedly installed 30 million more times. The discovery was made by CloudSEK’s security team, who discovered a total of 193 apps containing…
The MOVEit Hack Affected BBC, British Airways, and Boots
British Airways, Boots, and the British Broadcasting Corporation (BBC) all confirmed that tens of thousands of employees’ personal data was exposed due to a widespread breach that affected a popular file transfer tool. It seems Zellis, a payroll provider company…
5 Cloud Computing Security Risks and Recommended Prevention Measures
Cloud computing security risks are a shared responsibility of both the cloud service provider (CSP) and the organization using the services. It is crucial to assess this from the very beginning to understand the complex topic of cloud security we`re…
What Is SCIM Provisioning?
In the digital age, where enterprises thrive on collaboration and smooth connectivity, user identities and access privileges management has become critical. It’s no secret that manually adding and managing users (also known as user provisioning) can prove a challenging, time-consuming,…
New QBot Malware Campaign Exploits WordPad for Infection
A recent QBot malware campaign has been observed leveraging a DLL hijacking vulnerability in the WordPad utility application to evade detection by security measures. Exploiting Windows programs for malicious purposes is an increasingly prevalent trend observed among threat actors. According…
Ransomware Attack on Harvard Pilgrim Health Care Exposes 2.5M Patients Data
HPHC has revealed that in April 2023, a ransomware attack impacted 2,550,922 people and stole their sensitive data. This information was shared by the Massachusetts-based non-profit health services provider with the US Department of Health and Human Services breach portal.…
Warning! WordPress Plugin ”Gravity Forms” Vulnerable to PHP Object Injection
Researchers revealed that the largely used WordPress plugin ”Gravity Forms” is vulnerable to unauthenticated PHP Object Injection. The flaw was tracked as CVE-2023-28782 and affects all plugin versions from 2.73 and below. The vendor fixed the vulnerability with the release…
MacOS Vulnerability Enables Hackers to Bypass SIP Root Restrictions
Researchers discovered an Apple vulnerability that threat actors can use to deploy undeletable malware. In order to exploit CVE-2023-32369, hackers need to previously gain root privileges over the device. The Apple bug enables them to bypass System Integrity Protection (SIP)…
Warning: Lazarus Targets Windows IIS Web Servers For Initial Access
The notorious Lazarus Group of North Korean state-sponsored threat actors is currently targeting vulnerable Windows Internet Information Services (IIS) web servers to obtain first access to business networks. Lazarus’ primary motivation is financial, and many observers think that the hackers’…
RaidForums Members Data Leaked on New Hacking Forum
Threat actors and security researchers now have access to a database for the notorious RaidForums hacking forums, giving them insight into the forum’s regulars. RaidForums was a very popular hacking and data leak forum known for hosting, leaking, and selling…
New Phishing Kit: File Archivers in the Browser
A new phishing kit, “File Archivers in the Browser” abuses ZIP domains. The kit displays bogus WinRAR or Windows File Explorer windows in the browser. The goal is to convince users to launch malicious processes. Google just enabled this month…
What Is ZTNA? Zero Trust Network Access Explained.
In today’s fast-changing digital landscape, ensuring strong network security has become a top priority for companies of all sizes. Given the rise of remote work, cloud computing, and increasingly complex cyber threats, conventional network architectures and perimeter-based security measures are…
CosmicEnergy: The New Russian-Linked Malware Targets Industrial System
A new malware has been discovered in the wild by security researchers. Called CosmicEnergy, the malware is designed to disrupt industrial systems. Sources say that the Russian cybersecurity group Rostelecom-Solar (fka Solar Security) is behind the malware. IEC-104-compliant remote terminal…
Buhti Ransomware: Blacktail’s Newest Operation Affects Multiple Countries
A new ransomware operation emerges. Named “Buhti”, the operation uses the leaked code of the LockBit and Babuk ransomware families to target machines running Windows and Linux. The group was first spotted in the wild by Palo Alto Networks’ Unit…
Heimdal®’s Threat Prevention Endpoint Wins ‘Cloud-Based Solution of the Year’ at the Network Computing Awards 2023
In an era where cyber threats continue to evolve and grow in complexity, Heimdal has once again risen to the occasion and emerged as a leading force in the industry. Therefore, it is with great honor and gratitude that we…
Apria Loses Financial Data of Nearly Two Million Customers Due to Cyberattack
Threat actors breached Apria`s Healthcare LLC system and stole the credit card data of 1,869,598 patients and employees. Apria is one of the top US home medical equipment delivery and clinical support provider companies. Although the company discovered the attack…
Breach Alert! Rheinmetall AG Confirms Being Hit by BlackBasta Ransomware Attack
Rheinmetall AG announced they suffered a data breach after being a target of a BlackBasta ransomware attack. On May 20th, 2023, the threat group leaked samples of the stolen data on its extortion site. According to the German automotive and…
Almost 300k People Affected by Ransomware Attack on Dish Network
Dish Network reported a data breach subsequent to the ransomware attack in February and started the process of notifying the affected parties. The broadcast company went offline on February 24, 2023, affecting Dish.com, Dish Anywhere, and many other Dish Network…
Over 300k People Affected by Ransomware Attack on Dish Network
Dish Network reported a data breach subsequent to the ransomware attack in February and started the process of notifying the affected parties. The broadcast company went offline on February 24, 2023, affecting Dish.com, Dish Anywhere, and many other Dish Network…
The Royal Gang Is Developing Its Own Malware Loader
It has been reported that the Royal ransomware group is enhancing its arsenal with new malware. This group is said to have surfaced following the dismantling of the notorious Conti group. Several other Conti-related groups have been observed using commercial…
Privileged Access Management (PAM) Best Practices
Privileged access management, PAM in short, is a crucial set of tools and technologies allowing organizations to maintain steadfast control and monitorization over the access to critical information and resources, as well as users, accounts and processes. Precisely because it is…
IAM-Driven Biometrics: The Security Issues with Biometric Identity and Access Management
The increase of cybersecurity incidents brings along a higher demand for enhanced security protections. Thus, in the attempt of preventing unauthorized third parties from accessing their accounts and sensitive data, companies are increasingly turning to biometric authentication. Contemporary Identity and…
Cyber Threat Hunting vs Incident Response: What’s the Difference?
In today’s cyber world, threats are constantly lurking around every corner. As a result, businesses need to adapt and find the best approach to protect their networks and data from potential attacks. That’s where threat hunting and incident response come…
New Type of Attack: BrutePrint Can Breach Your Smartphone’s Fingerprint Security
Chinese researchers discovered a new type of attack targeting smartphones. BrutePrint is a brute-force attack that can bypass fingerprint authentication. They managed to breach security measures enabled for brute-force attacks like attempt limits and liveness detection. Brute-force attacks use numerous…
Three New Zero-Day Vulnerabilities Fixed By Apple
Apple resolves three new zero-day vulnerabilities used to compromise iPhones and Macs. The flaws were all found in the multi-platform WebKit browser engine, as the company revealed in security advisories released to inform its clients about the active exploitation of…
Lemon Gang Pre-Infects 9 Million Android Devices With Malware
Nearly 9 million Android-based smartphones, watches, TVs, and TV boxes have been infected with the “Guerrilla” malware, pre-installed on the devices by Lemon Group. The threat actors use the malware to load additional payloads, intercept one-time passwords from SMS, set…
Application Control 101: Definition, Features, Benefits, and Best Practices
Application control is part and parcel of the larger cybersecurity landscape of access control, as outlined by the National Institute of Standards and Technology (NIST). But what does the term mean? And, more importantly, why should companies be interested in…
State-Sponsored Cybercrime Group`s Infrastructure Revealed
Researchers have uncovered previously unknown attack infrastructure used by Pakistani and Chinese entities operated by the state-sponsored group SideWinder. In a joint report, cybersecurity companies Group-IB and Bridewell say the threat actor uses 55 domains and IP addresses. At least since…
Ransomware in the Name of Charity: MalasLocker Targets Zimbra
A new ransomware operation has been observed hacking Zimbra servers to steal emails and encrypt files. Instead of demanding a ransom payment, the threat actors claim to require a donation to charity. In March 2023, a ransomware operation dubbed MalasLocker began encrypting…
U.S. Transportation Department Breach Exposes Data of 237,000 Employees
The US Department of Transportation (USDOT) recently revealed threat actors breached its system in a cyberattack. The data breach compromised the personal information of roughly 237,000 current and former agency employees. While it remains unclear when the attack happened or…
UNC3944 Uses Azure Serial Console for Stealthy Access to Virtual Machines
Researchers revealed that the UNC3944 threat actors use phishing and SIM-swapping attacks to get control over Microsoft Azure admin accounts. Hackers maliciously used the Azure Serial Console on Azure Virtual Machines (VM) to deploy remote management software within client environments.…
Capita Recommends Its Customers to Assume Their Data Was Stolen
At the end of March, a cyberattack affected Capita’s systems, resulting in the theft of customer data. Six weeks after the attack was revealed, Capita warned Universities Superannuation Scheme (USS), the largest private pension scheme in the UK, to assume…
PharMerica Cyber Incident Exposes 5.8 M People’s Data
PharMerica, the second largest provider of institutional pharmacy services in the United States, confirmed that it suffered a data breach that exposed the personal information of 5,815,591 people. The company started sending notices to the impacted individuals on the 12th…
Discord Announces a Data Breach Involving a Support Agent
Discord messaging platform announced a data breach. The incident involved a third-party support agent whose account has been compromised. The notification warned customers about unauthorized access to the agent’s support ticket queue. The Exposed Data & Security Measures This incident…
What Is Endpoint Privilege Management?
While this article aims to define what is endpoint privilege management, I will first begin to explain the circumstances of this process. Within any organization, privileges are usually split between two levels of hierarchy: standard users and administrators. The highest…
Toyota Disclosed a Ten-Year Long Data Breach
Toyota Motor Corporation issued a notice on the company’s Japanese newsroom disclosing a data breach of ten years. A database misconfiguration in its cloud environment leads to exposing of the car-location data of 2,150,000 customers. Details from the Data Breach…
Third-Party Patch Management: A Comprehensive Guide
In today’s digital age, software vulnerabilities are on the rise, and cyber threats are becoming more sophisticated. As a result, businesses must be proactive in their approach to cybersecurity to minimize the risk of a data breach. One way to…
What Is a Remote Code Execution Attack? Definition, Risks, and Mitigation Measures
A remote code execution (RCE) attack consists of adversaries remotely running code on an enterprise`s assets. Threat actors remotely inject and execute code in the victim`s device or system by using local (LAN), or wide area networks (WAN). The code…
Black Basta Ransomware Attacks Global Technology Company ABB
ABB, a leading provider of electrification and automation technology, has been hit by a Black Basta ransomware attack, which has reportedly affected business operations. As part of its services, ABB develops industrial control systems (ICS) and SCADA systems for manufacturers…
What Is Privileged Identity Management (PIM)?
When we talk about Privileged Access Management (PAM), Privileged Identity Management (PIM), Identity and Access Management (IAM), and other access management terms, we think of technologies for protecting a company’s critical assets. These phrases refer to maintaining the security of…
XDR vs SIEM vs SOAR: A Comparison
With the “detect early” and “respond fast” capabilities in your mind, you may wonder what to choose from the XDR vs SIEM vs SOAR options. A good Detection and Response (D&R) solution is essential for your company’s cybersecurity posture. As…
Operation MEDUSA Brings Down ‘Snake’ – Russia’s Cyberespionage Malware
The Federal Bureau of Investigation disrupted a Russian government-controlled Snake malware network that compromised hundreds of computers belonging to NATO-member governments and other Russian targets. According to the Justice Department, the disruption effort, called Operation MEDUSA, took the malware offline…
Linux Kernel Vulnerability Gives Cybercriminals Root Privileges
There is a new Linux NetFilter kernel flaw that allows unprivileged local users to escalate their privileges to root level, giving them complete control over the system. The vulnerability has been assigned the CVE-2023-32233 identifier, but its severity level has not…
Fake Windows Update Used to Push Aurora Info-Stealer
The Aurora information-stealing malware was delivered through an in-browser Windows update simulation in a recent malvertising campaign. For more than a year, Aurora has been advertised on various hacker forums as an info stealer with extensive capabilities and low antivirus…
Cactus Ransomware Infiltrates Networks by Exploiting VPN Flaws
Researchers warn Cactus Ransomware exploits VPN Flaws to compromise networks and encrypts itself to avoid detection. The new ransomware strain targets large commercial entities that use remote access services and scans after unpatched vulnerabilities for initial access. How Is Cactus…
Warning! New DDoS Botnet Malware Exploits Critical Ruckus RCE Vulnerability
AndoryuBot new malware aims to infect unpatched Wi-Fi access points to enlist them in DDoS attacks. To this end, threat actors exploit a critical Ruckus vulnerability in the Wireless Admin panel. The flaw is tracked as CVE-2023-25717 and enables hackers…
Sysco`s System Breached, Customers` and Employees` Data Stolen
Sysco food distributor announced recently that its network was breached, and business, customer, and employee data was compromised. According to an internal memo the company sent to its employees on May 3rd, data belonging to customers and suppliers in the…
Alert: NextGen Data Breach Puts 1 Million User Identities at Risk
NextGen Healthcare, a U.S.-based provider of electronic health record software, notified its clients that threat actors breached its systems and stole the personal data of more than 1 million patients. The company reported a data breach to the Maine attorney…
Patch Tuesday May 2023 – Microsoft Slates for Release 11 Security Fixes for Edge Browser Vulnerabilities
Heimdal® returns with yet another rendition of its monthly Patch Tuesday updates. Our May edition includes security releases for vulnerabilities that impact Microsoft’s Chromium-based Edge browser. In total, 11 fixes have launched, each tackling a different operational area. Enjoy and…
Heimdal® Takes Home Top Honors at Security Excellence Awards for Risk Management
We are thrilled to announce that Heimdal® has been awarded the Risk Management Award at the Security Excellence Awards 2023 for our innovative Patch and Asset Management solution! This award recognizes our commitment to providing cutting-edge cybersecurity solutions that help…
Iranian Threat Groups Mango Sandstorm and Mint Sandstorm Join the PaperCut Attack Spree
As reported by Microsoft, Iranian state-backed threat groups have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. The groups in question are tracked as Mango Sandstorm (aka Mercury or Muddywater) and Mint Sandstorm (also known as Phosphorus…
Twitter Confirms a “Security Incident” that Led to Exposing Private Circle Tweets
Twitter recognized a security error regarding Twitter Circles in a statement sent to affected users on 5 May 2023. The company mentioned a “security incident” some weeks after the users noticed the initial problem. The Circle Tweets Twitter users reported…
A New Ransomware Operation Threatens Your Business: Akira
Researchers spotted a new ransomware operation in March 2023. It is called Akira and targets businesses worldwide, breaching corporate networks, stealing and encrypting data. Threat actors claim to already have sixteen companies in their portfolio of victims from areas like…
Royal Ransomware Targets the City of Dallas in Ransomware Attack
Officials from Dallas, Texas declared that Royal Ransomware gang is responsible for a cyberattack that shut down most of the city’s services and knocked the Dallas Police and Fire Rescue departments offline this week. Since the ransomware group’s Wednesday morning…
What Is Patch Management? Definition, Importance, Key Steps, and Best Practices
What Is Patch Management? Patch management is the process of identifying and deploying software updates. It is an important process that involves the acquisition, review, and deployment of ‘patches’ to IT infrastructure. The ‘patches’ are pieces of software code that…
Identity and Access Management Best Practices
Identity and Access Management is a critical component of modern-day cybersecurity. Often abbreviated as IAM, it refers to a collection of technologies, policies, and procedures that assist organizations in managing and verifying the identities of individuals and devices, granting access…
ReconShark – Kimsuky’s Newest Recon Tool
Kimsuky, a North Korean hacking group, has been observed employing a new version of its reconnaissance malware called “ReconShark” in a cyberespionage campaign with global reach. According to security analysts, the threat actor has broadened the range of targets it…
What Is IPAM in Networking and Cybersecurity?
Managing thousands of IP-connected devices can become a great challenge for many organizations. But imagine trying to keep track of which IP Address is assigned to each device, which DHCP lease is up, or when the IP has changed? In this…
SECURITY ALERT: Danish Customers Targeted by Active PostNord DK Phishing Campaign
Heimdal® has recently discovered what can very well be the debut of a massive phishing campaign unfolding in the Nordics. According to a tip sent to us by an anonymous reader, the APT’s choice in phishing is an email in…
New Decoy Dog Malware Toolkit Targets Enterprise Networks
A new, sophisticated malware toolkit called Decoy Dog was discovered after cybersecurity researchers analyzed more than 70 billion DNS records belonging to enterprise networks. To avoid detection, Decoy Dog uses stealthy methods like strategic domain aging and DNS query dribbling,…
CISA Issues Warning About Serious Flaws in Illumina DNA Sequencing Systems
A critical flaw affecting Illumina medical devices has been announced in an Industrial Control Systems (ICS) medical advisory issued by the United States Cybersecurity and Infrastructure Security Agency (CISA). The flaws affect the Universal Copy Service (UCS) software in the…
What Is Privilege Escalation?
Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to find out more about what is privilege escalation, how many…
SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users
On the 28th of April, acting on a tip received from an anonymous source, Heimdal®’s SOC team has come across an active phishing campaign that appears to specifically target Romanian telecom customers. The preliminary analysis of all of the evidence…
RTM Locker Ransomware Gang Targets VMware ESXi Servers
RTM Locker is now the most recent enterprise-targeting ransomware operation found to be using a Linux encryptor to target virtual machines on VMware ESXi systems. The RTM (Read The Manual) cybercrime group, which is well-known for disseminating a unique banking…
Managed Threat Hunting: The Next Step from Traditional Cybersecurity
As the world becomes increasingly digital, cybersecurity threats continue to evolve and become more sophisticated. Traditional cybersecurity measures are no longer enough to protect organizations from malicious attacks. That’s where managed threat hunting comes in – a proactive approach that…
What Is a Ping Flood and How to Prevent It?
Imagine sitting at your computer, ready to work or browse the internet, only to find that your connection is suddenly sluggish or completely non-existent. You may have fallen victim to a ping flood attack – one of the most common…
What Is Cyber Threat Hunting? Process, Types and Solutions
Cyber threat hunting is a proactive search for malicious actors and contents in your system. Threat hunting is a must-have part of the defense strategy which focuses to detect and respond rapidly to unknown, undetected, and unresolved threats. This means…
TP-Link High-Severity Flaw Added to Mirai Botnet Arsenal
A TP-Link Archer A21 (AX1800) consumer-grade WiFi router vulnerability has been used by Mirai botnet to launch DDoS attacks against IoT devices. The flaw in the TP-Link Archer AX21 firmware was discovered back in December 2022, and the company released a patch in…
New LOBSHOT Malware Deployed Via Google Ads
Google advertisements have been exploited to distribute various types of malware over the past few months. To trick unsuspecting users into downloading malware onto their systems, threat actors often used the platform to promote fake websites on legit software and…
Chinese APT Alloy Taurus Is Back – Linux Variant of PingPull Malware Is Active
Across Southeast Asia, Europe and Africa, a new Linux variant of the PingPull malware used by Chinese APT group Alloy Taurus (Gallium) has been reported as an active threat to telecommunications, finance and government organizations. Alloy Taurus is a Chinese…
What Is SOC-as-a-Service (SOCaaS) and How Could Your Company Benefit?
When building an organization’s cybersecurity posture, there are many decisions that will ultimately lead you to the best result for your specific company. One of these decisions is having an in-house SOC team or choosing a managed SOC solution like…
IMA Financial Group Targeted in Cyberattack. Confidential Consumer Data Spilled
IMA Financial Group (IMA) announced on April 19th it had experienced a data breach resulting in confidential consumer data leakage. The insurance and wealth management solutions company filed a notice of the data security incident with the Attorney General of…
7,413 People Were Impacted by Alaska Railroad Data Breach
Alaska Railroad Corporation reported a data breach incident that occurred in December 2022 and they discovered it on March 18th, 2023. According to ARCC, a third party gained unauthorized access to the internal network system. Further on, threat actors accessed…
New Type of Side-Channel Attack Impacts Intel CPUs and Allows Data Leakage
Researchers discovered a new kind of side-channel attack that affects several versions of Intel CPUs and enables data exfiltration. Attackers could leak the data through the EFLAGS register. The discovery was made by researchers at Tsinghua University, the University of…
Yellow Pages Canada Suffered a Cyberattack
Yellow Pages Group, a Canadian entity that specializes in directory publishing, has officially confirmed that it has fallen victim to a cyberattack. Black Basta, a group known for spreading ransomware and engaging in extortion, has taken credit for the attack…
PaperCut Flaw Exploited to Hijack Servers, Fix Released
Attackers are taking advantage of critical flaws in the widely used PaperCut MF/NG print management software to install Atera remote management software and take control of servers. The software is used by more than 100 million people from over 70,000…
What Is Privileged Account and Session Management (PASM)?
Privileged Account and Session Management (PASM) is a new PAM (Privileged Access Management) that focuses on privileged account monitoring and management for compliance, security, and data integrity purposes. Whereas PAM covers user account, on rights escalation demands, PASM and PEDM…