Author: nlqip
Oct 16, 2024Ravie LakshmananZero-Day / Windows Security The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE-2024-38178 (CVSS score: 7.5), a memory corruption bug in the Scripting Engine that…
Read MoreIn today’s digital landscape, businesses face an ever-increasing number of cybersecurity threats. To combat these challenges, many organizations are turning to SOC as a Service provider. But what exactly is SOC as a Service, and what key features should you look for when choosing a provider? What is SOC as a Service? Before we…
Read MoreOct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs. Hype “AI will not replace humans in the near future. But humans who know how to use…
Read MoreTo defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence. Let’s consider five that can greatly improve your threat investigations. Pivoting on С2 IP…
Read MoreOct 16, 2024Ravie LakshmananCyber Attack / Banking Trojan A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. “The spear-phishing campaign’s impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most…
Read MoreOct 16, 2024Ravie LakshmananVulnerability / Data Protection The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded…
Read MoreOct 16, 2024Ravie LakshmananEnterprise Security / Vulnerability GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow unauthorized access to an instance. The vulnerability, tracked as CVE-2024-9487, carries a CVS score of 9.5 out of a maximum of 10.0 “An attacker could bypass SAML single…
Read MoreCisco CEO Chuck Robbins talks about having a leg-up over HPE-Juniper, cross-selling Splunk opportunities, Cisco’s bullish AI strategy and his thoughts on the U.S. economy in 2025 with the upcoming presidential election. Cisco CEO Chuck Robbins is confident that his company’s longtime networking leadership will continue regardless of new competition from HPE with its pending…
Read MoreOracle addresses 198 CVEs in its fourth quarterly update of 2024 with 334 patches, including 35 critical updates. Background On October 15, Oracle released its Critical Patch Update (CPU) for October 2024, the fourth and final quarterly update of the year. This CPU contains fixes for 198 CVEs in 334 security updates across 28 Oracle…
Read MoreAmazon has seen massive adoption of passkeys since the company quietly rolled them out a year ago, announcing today that over 175 million customers use the security feature. “Today, we’re excited to share that more than 175 million customers have enabled passkeys on their Amazon accounts, allowing them to sign in six-times faster than they…
Read MoreRecent Posts
- Microsoft blocks Windows 11 24H2 on some PCs with USB scanners
- Bangkok busts SMS Blaster sending 1 million scam texts from a van
- Foreign Threat Actor Conducting Large-Scale Spearphishing Campaign with RDP Attachments | CISA
- Meta removes over 2 million accounts pushing pig butchering scams
- CISA Adds One Known Exploited Vulnerability to Catalog | CISA