Tag Kaspersky

Critical OpenSSH Vulnerability Could Enable Root RCE on Linux Systems

OpenSSH Vulnerability Exposes Critical Risk to Linux Systems In a significant development for cybersecurity, the maintainers of OpenSSH have issued urgent security updates addressing a severe vulnerability that may allow unauthenticated remote code execution with root-level access on glibc-based Linux systems. This vulnerability, designated CVE-2024-6387 and dubbed "regreSSHion," resides within…

Read MoreCritical OpenSSH Vulnerability Could Enable Root RCE on Linux Systems

Two Unseen Tools from the Same Group Compromise Air-Gapped Devices

GoldenJackal’s Evolving Cyber Threat: A Deep Dive into Recent Developments Recent insights into the GoldenJackal cyber threat framework reveal a significant evolution in the sophistication of its attack methods since 2019. Initially known for its robust suite of capabilities, the group had developed tools that posed serious risks to organizations,…

Read MoreTwo Unseen Tools from the Same Group Compromise Air-Gapped Devices

Banking Trojans Exploit Google Cloud Run to Target Latin America and Europe

Cybersecurity Alert: Surge in Phishing Attacks Utilizing Google Cloud Services to Distribute Banking Trojans In a concerning trend, cybersecurity experts have detected a significant increase in email phishing campaigns employing Google Cloud Run to spread various banking trojans across Latin America and Europe. Notable trojans such as Astaroth, Mekotio, and…

Read MoreBanking Trojans Exploit Google Cloud Run to Target Latin America and Europe

QEMU Emulator Exploited as a Tunneling Tool to Compromise Company Network

Recent cybersecurity investigations revealed an alarming trend where threat actors are exploiting the QEMU open-source hardware emulator as a tunneling tool during a cyber intrusion aimed at a significant unnamed corporation. This development underscores a shift in tactics, showcasing how attackers are increasingly relying on legitimate software to implement their…

Read MoreQEMU Emulator Exploited as a Tunneling Tool to Compromise Company Network

ToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft

The Russian hacker group known as ToddyCat has drawn significant attention for employing an array of sophisticated tools to maintain access to compromised environments and extract sensitive information. Recently, Russian cybersecurity firm Kaspersky has classified this threat actor as a data harvester conducting operations primarily against governmental organizations—some associated with…

Read MoreToddyCat Hacker Group Employs Sophisticated Tools for Large-Scale Data Theft

A Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems

Newly Discovered Cyber Toolkit Reveals Evolving Threats to Data Security Recent research has unveiled a sophisticated toolkit designed for cyber espionage, characterized by its modular architecture and diverse functionalities developed in multiple programming languages. This toolkit aims to enhance flexibility and resilience against detection by targets, particularly when individual components…

Read MoreA Shadowy Hacking Collective Unveils Two New Techniques for Extracting Data from Air-Gapped Systems

Microsoft Addresses 61 Vulnerabilities, Including Two Actively Exploited Zero-Day Threats

Microsoft Addresses 61 Security Vulnerabilities in May Patch Update In its latest Patch Tuesday update for May 2024, Microsoft has resolved 61 newly identified security vulnerabilities across its software products, amongst them two zero-day flaws that have been actively exploited in the wild. These updates follow a proactive security strategy…

Read MoreMicrosoft Addresses 61 Vulnerabilities, Including Two Actively Exploited Zero-Day Threats

Chinese Cyber Espionage Targets Asian Telecom Operators Since 2021

Cyber Espionage Campaign Targets Telecom Operators in Asia Cyber espionage groups linked to China have been identified as responsible for an extensive intrusion campaign that has affected several telecommunications operators within an unnamed Asian country, with activity dating back to at least 2021. According to a report from the Symantec…

Read MoreChinese Cyber Espionage Targets Asian Telecom Operators Since 2021

Polish Businesses Under Threat: Cybercriminals Leverage Agent Tesla and Formbook Malware

Widespread Phishing Campaigns Targeting SMBs in Poland Unleash Multiple Malware Strains In May 2024, cybersecurity researchers identified a pervasive series of phishing attacks directed at small and medium-sized businesses (SMBs) in Poland. During these campaigns, threat actors utilized a variety of malware families, including Agent Tesla, Formbook, and Remcos RAT,…

Read MorePolish Businesses Under Threat: Cybercriminals Leverage Agent Tesla and Formbook Malware