'

Hackers Exploiting Docusign With Phishing Attack To Steal Credentials

Hackers Exploiting Docusign With Phishing Attack To Steal Credentials

Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost attack method.  Phishing attacks can be easily scaled to target a large number of individuals, increasing the likelihood of success. Recently, cybersecurity analysts at Abnormal Security discovered that hackers are actively exploiting DocuSign with customizable … Read more

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS) based VPN solutions, like SSLVPN and WebVPN, should be replaced with safer options. Bad people are still taking advantage of flaws in these VPN services, which is why this suggestion was made. ANYRUN malware sandbox’s … Read more

New Linux Backdoor Attacking Linux Users Via Installation Packages

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target for gaining unauthorized access or spreading malware.  Besides this, its open-source nature allows threat actors to study the code and identify new vulnerabilities in it closely. Cybersecurity researchers at Symantec recently identified a new Linux … Read more

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts text from images, and the malware scans these extracted strings for phrases related to passwords or cryptocurrency wallets.  If a match is found, the malware exfiltrates the corresponding image by building upon existing functionalities like … Read more

Santander Data Breach: Hackers Accessed Company Database

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and Chile. Concerns have been made about data security and privacy following the breach, which was found to have started with someone breaking into a database hosted by a third-party provider. Immediate Response and Containment Measures … Read more

Russian APT Hackers Attacking Critical Infrastructure

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals, as APT groups conduct espionage to gather valuable political and economic information.  The Russian government may recruit financially motivated groups, despite their apparent independence, for malicious operations, resulting in a complex threat landscape where the … Read more

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor Storm-1811 misusing the client management tool Quick Assist to target users in social engineering attacks. Storm-1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware. The observed activity begins with impersonation through voice phishing (vishing), followed by delivery of malicious tools, … Read more

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices. Notably, ThroughTek Kalay’s influence emphasizes the importance of protecting homes, companies, and integrators alike with its widespread presence in security cameras and other devices. The affected cameras are the Roku Indoor Camera SE, Wyze Cam v3, and Owlet Cam … Read more

GUEST ESSAY: Turning to cloud services can help SMBs scale to meet growth needs

GUEST ESSAY: Turning to cloud services can help SMBs scale to meet growth needs

Meeting the demands of the modern-day SMB is one of the challenges facing many business leaders and IT operators today. Traditional, office-based infrastructure was fine up until the point where greater capacity was needed than those servers could deliver, vendor support became an issue, or the needs of a hybrid workforce weren’t being met. Related: … Read more

Cato Networks Partners with e& Further Expanding Global SASE Platform with New UAE PoP

Cato Networks Partners with e& Further Expanding Global SASE Platform with New UAE PoP

Today, Cato Networks announces a strategic partnership with e& (etisalat and) during International Telecoms Week (ITW) in the United States, a significant move that will see the establishment of a new Point-of-Presence (PoP) within the global technology group’s SmartHub data center in Fujairah. As one of the United Arab Emirates’ premier carrier-neutral data facilities, e&’s … Read more