Tag CrowdStrike

Researchers Identify New Infrastructure Deployed by SolarWinds Hackers

The SolarWinds cyberattack, which unfolded last December, has been recognized for its intricate methods of penetrating and maintaining a presence within targeted systems. Microsoft has characterized the involved threat actors as “skillful and methodic operators” committed to employing operational security best practices to evade detection. Recent research has uncovered evidence…

Read MoreResearchers Identify New Infrastructure Deployed by SolarWinds Hackers

Apple Issues Essential iOS and iPadOS Updates to Address VoiceOver Password Security Flaw

Apple Releases Critical Security Updates Addressing Password Vulnerabilities and Audio Privacy Issues Apple has recently issued important updates for iOS and iPadOS targeting two significant security vulnerabilities. One of these flaws has the potential to expose users’ saved passwords via the VoiceOver assistive technology, raising alarm among cybersecurity experts. The…

Read MoreApple Issues Essential iOS and iPadOS Updates to Address VoiceOver Password Security Flaw

SolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

In a recent development reflecting the persistent threat posed by Russian cyber actors, Microsoft has disclosed that the hackers behind the SolarWinds breach have resumed operations utilizing password spraying and brute-force methods to compromise customer accounts. This resurgence serves as a stark reminder that the attackers remain active and adept…

Read MoreSolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

NSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

A persistent brute-force attack campaign, believed to be orchestrated by Russian military intelligence, has targeted enterprise cloud environments since mid-2019. This information is detailed in a joint advisory released by intelligence agencies in both the United States and the United Kingdom. The National Security Agency (NSA), Cybersecurity and Infrastructure Security…

Read MoreNSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

Musk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

In a significant cybersecurity incident, the University of Pennsylvania has fallen victim to a data breach that has raised alarms within its community. Following the breach, a hacker disseminated an email to numerous recipients, claiming responsibility while disparaging the institution. The email’s provocative subject line, “We got hacked (Action Required),”…

Read MoreMusk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

LightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Telecom Sector Under Siege by LightBasin Recent investigations into cyber threats have revealed that an advanced adversary known as LightBasin is behind a series of attacks targeting the telecommunications industry. This sophisticated group is primarily focused on extracting highly specific data, such as subscriber information and call metadata, which aligns…

Read MoreLightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Oracle Alerts Users to Active Exploitation of Agile PLM Vulnerability

Oracle has issued a warning regarding a critical security vulnerability in its Agile Product Lifecycle Management (PLM) Framework, which has been actively exploited in real-world scenarios. The flaw, designated as CVE-2024-21287, boasts a CVSS score of 7.5, indicating its severity and potential impact. This vulnerability is particularly concerning because it…

Read MoreOracle Alerts Users to Active Exploitation of Agile PLM Vulnerability

Chinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Recent analysis has revealed that the China-linked hacking group, known as Earth Estries, is employing a previously unidentified backdoor named GHOSTSPIDER in its cyber operations directed at telecommunications firms in Southeast Asia. This development highlights an evolving threat landscape, where traditional boundaries of cybersecurity are increasingly tested. Trend Micro, which…

Read MoreChinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Microsoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Microsoft Wraps Up 2024 Patch Tuesday with Critical Security Fixes Microsoft concluded its Patch Tuesday updates for December 2024, addressing a total of 72 security vulnerabilities across its software ecosystem, including a specific flaw reported as actively exploited in the wild. Of these vulnerabilities, 17 have been classified as Critical,…

Read MoreMicrosoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue