Tag Sophos

XE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Cybersecurity Alert: Exploitation of VeraCore Vulnerabilities by XE Group Recent assessments have revealed that cybercriminals are taking advantage of several vulnerabilities within specific software applications, notably Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore. These exploits allow threat actors to deploy reverse shells and web shells, granting them persistent…

Read MoreXE Hacker Group Leverages VeraCore Zero-Day to Install Persistent Web Shells

Chinese Hackers Target South Asian Entity by Exploiting Zero-Day Flaw in Sophos Firewall

A sophisticated advanced persistent threat (APT) from China has leveraged a critical vulnerability in Sophos’ firewall software to execute a targeted attack against an undisclosed organization in South Asia. This incident highlights the ongoing risk posed by APT actors who are adept at exploiting weaknesses within cybersecurity defenses. According to…

Read MoreChinese Hackers Target South Asian Entity by Exploiting Zero-Day Flaw in Sophos Firewall

Atlassian Confluence Vulnerability Exploited for Ransomware and Crypto Mining Deployment

A critical security vulnerability in Atlassian’s Confluence Server and Data Center products has recently been exploited in active cyberattacks, leading to the deployment of cryptocurrency miners and ransomware. The flaw, identified as CVE-2022-26134 with a CVSS score of 9.8, was patched by Atlassian on June 3, 2022. This vulnerability enables…

Read MoreAtlassian Confluence Vulnerability Exploited for Ransomware and Crypto Mining Deployment

U.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls

The U.S. government has recently unsealed charges against a Chinese individual, Guan Tianfeng, linked to a significant cybersecurity breach in which thousands of Sophos firewall devices were compromised worldwide in 2020. Guan, who allegedly worked for Sichuan Silence Information Technology Company, Limited, is facing accusations of conspiracy to commit computer…

Read MoreU.S. Accuses Chinese Hacker of Exploiting Zero-Day Vulnerability in 81,000 Sophos Firewalls

Zero-Day RCE Vulnerability in Sophos Firewall Exploited by Hackers — Patch Now Available

In a significant cybersecurity development, Sophos has issued a critical patch for its firewall product following the discovery of a severe zero-day vulnerability actively being exploited by cyber attackers. This vulnerability has raised serious concerns for users, as it could lead to unauthorized remote code execution. The issue, identified as…

Read MoreZero-Day RCE Vulnerability in Sophos Firewall Exploited by Hackers — Patch Now Available

Zerobot Botnet Surges as a Rising Threat with Enhanced Exploits and Features

The Zerobot DDoS botnet has undergone significant updates, enhancing its capacity to target a broader range of internet-connected devices and expand its network. Microsoft Threat Intelligence Center (MSTIC) is closely monitoring this evolving threat, referring to it as DEV-1061, which encompasses unidentified, emerging, or developing activity clusters. First reported by…

Read MoreZerobot Botnet Surges as a Rising Threat with Enhanced Exploits and Features

Researchers Connect CACTUS Ransomware Strategies to Ex-Black Basta Members

Recent cybersecurity investigations have revealed a convergence between two notorious ransomware groups: Black Basta and CACTUS. Both factions have been exploiting a shared BackConnect (BC) module, facilitating persistent control over compromised systems. This development hints at a potential shift, suggesting that affiliates of Black Basta may now be operating under…

Read MoreResearchers Connect CACTUS Ransomware Strategies to Ex-Black Basta Members

Microsoft Addresses 125 Vulnerabilities, Including Exploited Windows CLFS Flaw

In recent developments, Microsoft has unveiled critical security patches addressing a staggering array of 125 vulnerabilities across its software platforms. Among these, one vulnerability has been identified as under active exploitation in the wild, raising significant alarms within the cybersecurity community. Of the reported vulnerabilities, 11 are designated as Critical,…

Read MoreMicrosoft Addresses 125 Vulnerabilities, Including Exploited Windows CLFS Flaw

Gootkit Malware Implements New Strategies Targeting Healthcare and Financial Institutions

Recent investigations by Cybereason have revealed that the Gootkit malware, also known as Gootloader, is primarily targeting healthcare and financial entities across the United States, United Kingdom, and Australia. These findings shed light on the evolving threat landscape, emphasizing the need for heightened vigilance in these sectors. In a December…

Read MoreGootkit Malware Implements New Strategies Targeting Healthcare and Financial Institutions