Tag Sophos

Microsoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

Microsoft has announced the release of security updates addressing 118 vulnerabilities in its software suite, two of which have been identified as actively exploited vulnerabilities in the wild. Among these vulnerabilities, three have been classified as Critical, while 113 are rated Important, and two are deemed Moderate. Notably, this Patch…

Read MoreMicrosoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

Exploitation of Critical Veeam Vulnerability Fuels Spread of Akira and Fog Ransomware

Recent cybersecurity reports indicate that threat actors are actively exploiting a critical security vulnerability in Veeam Backup & Replication software to deploy ransomware variants such as Akira and Fog. Sophos, a recognized cybersecurity vendor, has noted ongoing attacks that utilize compromised VPN credentials alongside the CVE-2024-40711 vulnerability to gain unauthorized…

Read MoreExploitation of Critical Veeam Vulnerability Fuels Spread of Akira and Fog Ransomware

Alert: Active Exploitation of Vulnerabilities in VMware vCenter and Kemp LoadMaster

Recently patched security vulnerabilities affecting Progress Kemp LoadMaster and VMware vCenter Server have been reported as actively exploited in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlighted the severity of these issues on Monday, adding CVE-2024-1212—which has received a maximum severity score of 10.0—to its Known Exploited…

Read MoreAlert: Active Exploitation of Vulnerabilities in VMware vCenter and Kemp LoadMaster

Sophos Releases Urgent Hotfixes for Critical Firewall Vulnerabilities: Essential Update to Prevent Exploitation

Sophos Issues Critical Security Hotfixes for Firewall Vulnerabilities Sophos has recently released crucial security hotfixes addressing three vulnerabilities within its Firewall products. These flaws could potentially be exploited to facilitate remote code execution, granting unauthorized privileged access to attackers under specific conditions, posing significant risks to organizations reliant on these…

Read MoreSophos Releases Urgent Hotfixes for Critical Firewall Vulnerabilities: Essential Update to Prevent Exploitation

Remote Encryption Attacks on the Rise: The Risks of a Single Vulnerable Device

Recent reports indicate a worrying trend among ransomware groups that are increasingly employing remote encryption methods in their cyberattacks. This evolution signifies a notable escalation in the strategies utilized by financially motivated actors seeking to amplify the efficacy of their operations. Mark Loman, the Vice President of Threat Research at…

Read MoreRemote Encryption Attacks on the Rise: The Risks of a Single Vulnerable Device

XE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Cybersecurity Alert: Exploitation of VeraCore Vulnerabilities by XE Group Recent assessments have revealed that cybercriminals are taking advantage of several vulnerabilities within specific software applications, notably Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore. These exploits allow threat actors to deploy reverse shells and web shells, granting them persistent…

Read MoreXE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Chinese Hackers Target South Asian Entity by Exploiting Zero-Day Flaw in Sophos Firewall

A sophisticated advanced persistent threat (APT) from China has leveraged a critical vulnerability in Sophos’ firewall software to execute a targeted attack against an undisclosed organization in South Asia. This incident highlights the ongoing risk posed by APT actors who are adept at exploiting weaknesses within cybersecurity defenses. According to…

Read MoreChinese Hackers Target South Asian Entity by Exploiting Zero-Day Flaw in Sophos Firewall

Atlassian Confluence Vulnerability Exploited for Ransomware and Crypto Mining Deployment

A critical security vulnerability in Atlassian’s Confluence Server and Data Center products has recently been exploited in active cyberattacks, leading to the deployment of cryptocurrency miners and ransomware. The flaw, identified as CVE-2022-26134 with a CVSS score of 9.8, was patched by Atlassian on June 3, 2022. This vulnerability enables…

Read MoreAtlassian Confluence Vulnerability Exploited for Ransomware and Crypto Mining Deployment

U.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls

The U.S. government has recently unsealed charges against a Chinese individual, Guan Tianfeng, linked to a significant cybersecurity breach in which thousands of Sophos firewall devices were compromised worldwide in 2020. Guan, who allegedly worked for Sichuan Silence Information Technology Company, Limited, is facing accusations of conspiracy to commit computer…

Read MoreU.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls