Quantcast
Channel: ARN - Stories by Lucian Constantin RSS feed
Browsing latest articles
Browse All 15 View Live

Gigabyte firmware component can be abused as a backdoor

Attackers can abuse the UEFI firmware to inject executable malware code into the Windows kernel, compromising systems.

View Article



Attackers use Python compiled bytecode to evade detection

Newly discovered campaign takes advantage of the fact that most vulnerability scanning tools don't read compiled open-source software.

View Article

Russia points finger at US for iPhone exploit campaign that also hit...

The Russian federal security agency, the FSB, has put out a security alert claiming that US intelligence services are behind an attack campaign that exploits vulnerabilities in iOS and compromised...

View Article

Clop ransomware gang exploits the MOVEit Transfer vulnerability to steal data

At least one organization, UK payroll provider Zellis, has confirmed a breach via the MOVEit utility.

View Article

Clop extortion gang gives MOVEit exploit victims one week to reach out

At least 20 organisations have been compromised by Clop's MOVEit exploit, according to new research.

View Article


North Korean APT group targets email credentials in social engineering campaign

The Kimsuky group is adept at building relationships at target organisations to more easily deliver malware and steal credentials.

View Article

Business email compromise scams take new dimension with multi-stage attacks

A new attack group leverages trusted relationships between partner organisations to bypass multifactor authentication.

View Article

MOVEit Transfer developer patches more critical flaws after security audit

A third-party audit reveals new MOVEit vulnerabilities, for which Progress Software has issued patches.

View Article


Attackers set up rogue GitHub repos with malware posing as zero-day exploits

The threat actor created fake personas on Twitter for researchers at a non-existent security firm.

View Article


Microsoft Office 365 AitM phishing reveals signs of much larger BEC campaign

This newly discovered, global campaign indicates growing popularity for multi-stage adversary-in-the-middle tactics among threat actors.

View Article

Romanian cybercrime gang Diicot builds DDoS botnet with Mirai variant

The main focus of Diicot’s attacks appears to support cryptojacking efforts but the group is also employing botnets and brute-force tactics for other purposes.

View Article

Public exploit is now available for Cisco AnyConnect VPN client

Attackers could elevate privileges on systems with the vulnerable, unpatched Cisco clients, possibly taking full control.

View Article

Critical flaw in VMware Aria Operations for Networks sees mass exploitation

Akamai reports nearly 700,000 attacks with 27,000 of its customers being scanned for the vulnerability.

View Article


Why you should review the security of your MSSQL servers

MS SQL Server is by far the most common DBMS that attackers target, probably due to its tight integration with Windows.

View Article

Malicious campaign uses npm packages to support phishing attacks

Researchers have identified yet another malicious use for JavaScript packages hosted on the npm registry: hosting files required by automated phishing kits or slipping phishing pages into applications...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images