Tag CrowdStrike

SolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

In a recent development reflecting the persistent threat posed by Russian cyber actors, Microsoft has disclosed that the hackers behind the SolarWinds breach have resumed operations utilizing password spraying and brute-force methods to compromise customer accounts. This resurgence serves as a stark reminder that the attackers remain active and adept…

Read MoreSolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

NSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

A persistent brute-force attack campaign, believed to be orchestrated by Russian military intelligence, has targeted enterprise cloud environments since mid-2019. This information is detailed in a joint advisory released by intelligence agencies in both the United States and the United Kingdom. The National Security Agency (NSA), Cybersecurity and Infrastructure Security…

Read MoreNSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

Musk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

In a significant cybersecurity incident, the University of Pennsylvania has fallen victim to a data breach that has raised alarms within its community. Following the breach, a hacker disseminated an email to numerous recipients, claiming responsibility while disparaging the institution. The email’s provocative subject line, “We got hacked (Action Required),”…

Read MoreMusk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

LightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Telecom Sector Under Siege by LightBasin Recent investigations into cyber threats have revealed that an advanced adversary known as LightBasin is behind a series of attacks targeting the telecommunications industry. This sophisticated group is primarily focused on extracting highly specific data, such as subscriber information and call metadata, which aligns…

Read MoreLightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Oracle Alerts Users to Active Exploitation of Agile PLM Vulnerability

Oracle has issued a warning regarding a critical security vulnerability in its Agile Product Lifecycle Management (PLM) Framework, which has been actively exploited in real-world scenarios. The flaw, designated as CVE-2024-21287, boasts a CVSS score of 7.5, indicating its severity and potential impact. This vulnerability is particularly concerning because it…

Read MoreOracle Alerts Users to Active Exploitation of Agile PLM Vulnerability

Chinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Recent analysis has revealed that the China-linked hacking group, known as Earth Estries, is employing a previously unidentified backdoor named GHOSTSPIDER in its cyber operations directed at telecommunications firms in Southeast Asia. This development highlights an evolving threat landscape, where traditional boundaries of cybersecurity are increasingly tested. Trend Micro, which…

Read MoreChinese Hackers Deploy GHOSTSPIDER Malware to Target Telecoms in Over 12 Countries

Microsoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Microsoft Wraps Up 2024 Patch Tuesday with Critical Security Fixes Microsoft concluded its Patch Tuesday updates for December 2024, addressing a total of 72 security vulnerabilities across its software ecosystem, including a specific flaw reported as actively exploited in the wild. Of these vulnerabilities, 17 have been classified as Critical,…

Read MoreMicrosoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Chinese APT Hackers Exploit Log4Shell to Attack Academic Institution

A sophisticated cyber intrusion attributed to a China-based threat group, identified as Aquatic Panda, has been detected leveraging severe vulnerabilities in the Apache Log4j logging system. This attack vector enabled the adversaries to execute various post-exploitation activities, including reconnaissance operations and credential harvesting from their targets. The cybersecurity firm CrowdStrike…

Read MoreChinese APT Hackers Exploit Log4Shell to Attack Academic Institution

Why the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks

Numerous digital infrastructures—primarily managed by the US government and major Fortune 500 companies—are currently under an “imminent threat” of breaches from nation-state hacking groups, following an alarming breach of a leading software provider, as warned by federal authorities on Wednesday. F5 Networks, a Seattle-based provider of networking solutions, publicly acknowledged…

Read MoreWhy the F5 Hack Posed an ‘Imminent Threat’ to Thousands of Networks