Category vulnerabilities

Russian Hackers Tied to ‘Largest Cyber Attack’ on Danish Critical Infrastructure

In a striking incident described as the largest cyber assault on Danish critical infrastructure, Russian threat actors are suspected of targeting 22 companies linked to Denmark’s energy sector in May 2023. This operation underscores escalating cyber risks to essential services and the vulnerabilities they face amid geopolitical tensions. Denmark’s SektorCERT…

Read MoreRussian Hackers Tied to ‘Largest Cyber Attack’ on Danish Critical Infrastructure

Four Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

Zero-Day Vulnerability in Zimbra Email Software Exploited by Multiple Threat Actors A recently identified zero-day vulnerability in the Zimbra Collaboration email software has been exploited by four distinct groups to compromise sensitive email data, user credentials, and authentication tokens. This flaw, designated as CVE-2023-37580, has garnered attention due to its…

Read MoreFour Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

CISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog, adding three identified security flaws currently under active exploitation. This action underscores the ongoing priority for organizations to remain vigilant and address vulnerabilities promptly to protect their systems. The newly cataloged vulnerabilities include…

Read MoreCISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

Explore 2023 Cloud Security Strategies in Our Upcoming Webinar – Reserve Your Seat Now!

In 2023, the cloud has transformed into a critical battleground in the sphere of cybersecurity, marked by emerging threats such as Zenbleed, targeted Kubernetes attacks, and sophisticated advanced persistent threats (APTs). This evolving landscape underscores the pressing need for organizations to bolster their cloud security strategies. To navigate these challenges,…

Read MoreExplore 2023 Cloud Security Strategies in Our Upcoming Webinar – Reserve Your Seat Now!

Why Defenders Should Adopt a Hacker Mentality

As the digital landscape continues to evolve, security leaders find themselves facing an increasingly complex attack environment characterized by interconnected devices, cloud services, IoT technologies, and hybrid work arrangements. Cyber adversaries are perpetually refining their strategies, employing new techniques to exploit vulnerabilities. Notably, many organizations, regardless of size, may lack…

Read MoreWhy Defenders Should Adopt a Hacker Mentality

Kinsing Hackers Use Apache ActiveMQ Flaw to Deploy Linux Rootkits

A significant cybersecurity threat has emerged as the Kinsing group exploits a severe vulnerability in Apache ActiveMQ servers, leading to infections of Linux systems with cryptocurrency miners and rootkits. This critical flaw is identified as CVE-2023-46604, categorized as having a maximum CVSS score of 10.0, which allows remote code execution.…

Read MoreKinsing Hackers Use Apache ActiveMQ Flaw to Deploy Linux Rootkits

LockBit Ransomware Takes Advantage of Critical Citrix Bleed Vulnerability for Infiltration

Recent cybersecurity alerts highlight the exploitation of a critical vulnerability in Citrix NetScaler application delivery control (ADC) and Gateway appliances by numerous threat actors, including affiliates of the notorious LockBit ransomware group. This new wave of attacks takes advantage of CVE-2023-4966, a severe flaw that has allowed adversaries to infiltrate…

Read MoreLockBit Ransomware Takes Advantage of Critical Citrix Bleed Vulnerability for Infiltration

North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

A recent cybersecurity incident involving a North Korean state-sponsored group known as Diamond Sleet has emerged as a significant threat to businesses. This group has been distributing a compromised version of a legitimate application developed by the Taiwanese company CyberLink, leveraging a supply chain attack to target downstream customers. According…

Read MoreNorth Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

Mirai Botnet Leverages Zero-Day Vulnerabilities in Routers and NVRs for Large-Scale DDoS Attacks

A recent malware campaign has emerged, exploiting two zero-day vulnerabilities that enable remote code execution (RCE) to integrate routers and video recording devices into a Mirai-based distributed denial-of-service (DDoS) botnet. According to an advisory from Akamai, “The payload specifically targets routers and network video recorders (NVRs) with default admin credentials,…

Read MoreMirai Botnet Leverages Zero-Day Vulnerabilities in Routers and NVRs for Large-Scale DDoS Attacks