Category vulnerabilities

Chinese Hackers Conduct Covert Espionage Attacks Targeting 24 Cambodian Organizations

A recent cybersecurity report reveals ongoing malicious activities attributed to two significant Chinese state-sponsored hacking groups, aimed at infiltrating 24 government entities in Cambodia. This activity is indicative of a long-term espionage operation, as outlined by researchers from Palo Alto Networks’ Unit 42 last week. The researchers noted that these…

Read MoreChinese Hackers Conduct Covert Espionage Attacks Targeting 24 Cambodian Organizations

Urgent: VMware Alerts on Unpatched Critical Vulnerability in Cloud Director

VMware has issued an urgent alert regarding a critical security vulnerability in its Cloud Director platform that remains unpatched, potentially allowing malicious actors to bypass authentication measures. This flaw, designated as CVE-2023-34060 and rated with a CVSS score of 9.8, specifically affects systems that have been upgraded to version 10.5…

Read MoreUrgent: VMware Alerts on Unpatched Critical Vulnerability in Cloud Director

Reptar: New Intel CPU Flaw Affects Multi-Tenant Virtualized Systems

Intel has issued critical updates to address a high-severity vulnerability identified as Reptar, which affects a range of its desktop, mobile, and server processors. This flaw, categorized under CVE-2023-23583 and carrying a CVSS score of 8.8, poses significant risks including potential privilege escalation, information disclosure, and denial of service when…

Read MoreReptar: New Intel CPU Flaw Affects Multi-Tenant Virtualized Systems

New PoC Exploit for Apache ActiveMQ Vulnerability May Allow Stealthy Attacks

Recent developments in cybersecurity have highlighted a severe vulnerability within Apache ActiveMQ that allows malicious actors to execute arbitrary code in memory. This critical security flaw, identified as CVE-2023-46604 with a CVSS score of 10.0, is classified as a remote code execution vulnerability. It enables attackers to execute arbitrary shell…

Read MoreNew PoC Exploit for Apache ActiveMQ Vulnerability May Allow Stealthy Attacks

Russian Hackers Tied to ‘Largest Cyber Attack’ on Danish Critical Infrastructure

In a striking incident described as the largest cyber assault on Danish critical infrastructure, Russian threat actors are suspected of targeting 22 companies linked to Denmark’s energy sector in May 2023. This operation underscores escalating cyber risks to essential services and the vulnerabilities they face amid geopolitical tensions. Denmark’s SektorCERT…

Read MoreRussian Hackers Tied to ‘Largest Cyber Attack’ on Danish Critical Infrastructure

Four Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

Zero-Day Vulnerability in Zimbra Email Software Exploited by Multiple Threat Actors A recently identified zero-day vulnerability in the Zimbra Collaboration email software has been exploited by four distinct groups to compromise sensitive email data, user credentials, and authentication tokens. This flaw, designated as CVE-2023-37580, has garnered attention due to its…

Read MoreFour Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

CISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog, adding three identified security flaws currently under active exploitation. This action underscores the ongoing priority for organizations to remain vigilant and address vulnerabilities promptly to protect their systems. The newly cataloged vulnerabilities include…

Read MoreCISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

Explore 2023 Cloud Security Strategies in Our Upcoming Webinar – Reserve Your Seat Now!

In 2023, the cloud has transformed into a critical battleground in the sphere of cybersecurity, marked by emerging threats such as Zenbleed, targeted Kubernetes attacks, and sophisticated advanced persistent threats (APTs). This evolving landscape underscores the pressing need for organizations to bolster their cloud security strategies. To navigate these challenges,…

Read MoreExplore 2023 Cloud Security Strategies in Our Upcoming Webinar – Reserve Your Seat Now!

Why Defenders Should Adopt a Hacker Mentality

As the digital landscape continues to evolve, security leaders find themselves facing an increasingly complex attack environment characterized by interconnected devices, cloud services, IoT technologies, and hybrid work arrangements. Cyber adversaries are perpetually refining their strategies, employing new techniques to exploit vulnerabilities. Notably, many organizations, regardless of size, may lack…

Read MoreWhy Defenders Should Adopt a Hacker Mentality