'

FBI Warns of APT28 Attacks on Ubiquiti Routers

FBI Warns of APT28 Attacks on Ubiquiti Routers

In a new joint advisory, law enforcement authorities from the U.S. and other countries are urging users of Ubiquiti EdgeRouters to take a number of measures to protect their devices against attacks by Russian threat actors, such as performing a hardware factory reset, upgrading to the latest firmware version and changing default credentials. The advisory … Read more

Categories duo

News alert: ThreatHunter.ai stops hundreds of ransomware attacks, nation-state threats in 48 hours

News alert: ThreatHunter.ai stops hundreds of ransomware attacks, nation-state threats in 48 hours

Brea, Calif. Feb. 27, 2024 — The current large surge in cyber threats has left many organizations grappling for security so ThreatHunter.ai is taking decisive action. Recognizing the critical juncture at which the digital world stands, ThreatHunter.ai is now offering their cutting-edge cybersecurity services free of charge to all organizations for 30 days, irrespective of … Read more

Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users

Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users

FortiGuard Labs has released a report detailing the emergence and impact of the Abyss Locker ransomware, which has been targeting Microsoft Windows and Linux platforms. Abyss Locker, believed to be based on the HelloKitty ransomware source code, has been stealing and encrypting victims’ files, demanding ransom for file decryption, and preventing the release of stolen … Read more

Cato Networks to Present on AI and SASE at Cloud Expo Europe and DevOps Live

Cato Networks to Present on AI and SASE at Cloud Expo Europe and DevOps Live

Cato Networks, provider of the world’s leading single-vendor SASE platform, today announces that Senior Director of Security Strategy, Etay Maor, and ​​Director of Product Marketing, Greg Duffy, will be speaking at the upcoming Tech Show London, within its Cloud Expo Europe and DevOps Live co-located events.  Taking place on the 6th – 7th of March at … Read more

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access point (AP) versions that are associated with Denial of Service, OS Command Injection, and Remote code execution. These vulnerabilities have been assigned with CVE-2023-6397, CVE-2023-6398, CVE-2023-6399, and CVE-2023-6764. The severity of these vulnerabilities ranges between 6.5 (Medium) and 8.1 (High). However, … Read more

Hackers Abuse Telegram API To Exfiltrate User Information

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like “remittance” and “receipts” to spread phishing scripts using Telegram to steal user data indiscriminately. In the past, phishing script files were disseminated using various strategies and techniques, like asking users to log in before they can access protected files or pretending to be the Microsoft login page. Hence, the … Read more

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security so ThreatHunter.ai is taking decisive action. Recognizing the critical juncture at which the digital world stands, ThreatHunter.ai is now offering their cutting-edge cybersecurity services free of charge to all organizations for 30 days, irrespective of their current cybersecurity measures.  James McMurry, … Read more

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress, which could potentially put over 200,000 websites at risk. The vulnerability was discovered by Christiaan Swiers and reported through the Wordfence Bug Bounty Program, earning him a bounty of $2,063.00. The flaw in question is an unauthenticated SQL Injection vulnerability that … Read more

Hackers Actively Hijacking ConnectWise ScreenConnect server

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024, revealing two significant vulnerabilities in its self-hosted ScreenConnect servers. These vulnerabilities were initially reported on February 13 through a vulnerability disclosure program and were not actively exploited until February 20. The first vulnerability, identified as CVE-2024-1708, is a path traversal issue … Read more