Tag Microsoft

Microsoft Alerts on Rise of Hackers Exploiting Publicly Disclosed Zero-Day Vulnerabilities

Recent disclosures from Microsoft highlight a worrying trend: nation-state and criminal actors are increasingly capitalizing on publicly-identified zero-day vulnerabilities to infiltrate targeted environments. In its detailed Digital Defense Report, which spans 114 pages, Microsoft observes that the time lag between the announcement of a vulnerability and its exploitation has decreased…

Read MoreMicrosoft Alerts on Rise of Hackers Exploiting Publicly Disclosed Zero-Day Vulnerabilities

⚡ Weekly Highlights: Fortinet Vulnerabilities, RedLine Clipjack, NTLM Cracking, Copilot Attack & More

Emerging Cyber Threats: A Week in Review In the swiftly evolving landscape of cybersecurity, the distinctions between routine updates and significant breaches are increasingly blurred. Systems that once appeared secure are now subject to relentless challenges posed by new artificial intelligence tools, interconnected devices, and intricate automated systems. These innovations…

Read More⚡ Weekly Highlights: Fortinet Vulnerabilities, RedLine Clipjack, NTLM Cracking, Copilot Attack & More

First-Ever Malware Discovered Utilizing Intel AMT Tool to Evade Firewalls and Steal Data

On the cybersecurity landscape, exploiting visible networks often falls to the realm of well-resourced, state-sponsored hacking groups. While infiltrating corporate systems may not be particularly challenging for these actors, ensuring the longevity of their access and maintaining undetectable communication channels poses a significant hurdle. A cyber-espionage group known as **Platinum**…

Read MoreFirst-Ever Malware Discovered Utilizing Intel AMT Tool to Evade Firewalls and Steal Data

New Fileless Ransomware with Code Injection Capabilities Discovered in the Wild

Emerging Threat: Fileless Ransomware “Sorebrect” Targets Enterprises Cybercriminals are evolving, leveraging increasingly sophisticated tactics to execute attacks. A recent report highlights the emergence of a fileless ransomware strain known as “Sorebrect.” Unlike traditional ransomware, which often relies on files to infect systems, Sorebrect injects malicious code directly into legitimate processes,…

Read MoreNew Fileless Ransomware with Code Injection Capabilities Discovered in the Wild

Iranian Hackers Breach U.S. Federal Agency Network via Log4Shell Exploit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported a security breach involving a federal agency, attributed to threat actors affiliated with the Iranian government. The attackers exploited the Log4Shell vulnerability found in an unpatched VMware Horizon server, demonstrating a sophisticated exploitation technique. The breach, which occurred between mid-June…

Read MoreIranian Hackers Breach U.S. Federal Agency Network via Log4Shell Exploit

WikiLeaks Unveils CIA Malware Designed to Track Targets’ Geo-Location

WikiLeaks Reveals CIA’s ELSA Malware for Geo-Location Tracking In a recent disclosure, WikiLeaks has unveiled a new segment of its ongoing Vault 7 leak, showcasing a sophisticated malware tool named ELSA. This spyware is designed specifically for tracking the geo-location of Microsoft Windows-based PCs and laptops. The malware operates by…

Read MoreWikiLeaks Unveils CIA Malware Designed to Track Targets’ Geo-Location