Indian Made Spyware That Linked With Notorious Hacker Group Attacking Activist
Researchers from Amnesty International have uncovered a new wave of spyware that is believed to be developed from an India-based cybersecurity company and utilized by the notorious hacker group to target human rights activists...
Microsoft Build a New Threat & Vulnerability Management Features to Prevent Advanced Cyber Attacks
Microsoft Defender ATP is an add-on with Windows Defender Antivirus aimed to combat cyber attacks and to secure your environment. The threat & Vulnerability Management (TVM) is the latest inclusion in Microsoft Defender ATP.
At...
SSL Stats: Why is an SSL Certificate So Important for Your Website?
SSL certificates are no longer considered a necessity only for large companies. Every website, big or small across industries, needs SSL protection today. SSL stats will tell you how SSL adoption has become almost...
Vice Society Ransomware Uses PowerShell Script to Automate Steal Data
Researchers from Palo Alto Networks Unit42 uncovered the ransomware gang "Vice Society" that has stolen data from the victim network with the help of a custom-built Microsoft Powershell script.
Ransomware groups use an excessive number...
New Proxyjacking Campaign Attack SSH Servers to Build Docker Services
It has been observed that a new Proxyjacking campaign attack SSH servers and subsequently builds Docker services that share the victim's bandwidth for money.
This is an active campaign that Akamai Security Intelligence Response Team (SIRT)...
Critical Vulnerability in Cisco Systems allows a Remote Attacker to Bypass Authentication
A critical vulnerability in Cisco Systems’ intersite policy manager software could allow a remote attacker to bypass authentication. Three critical flaws fixed by Cisco this week.
The vulnerabilities exist in Cisco’s ACI Multi-Site Orchestrator (ACI...
New AD CTS Attack Vector Enables Lateral Movement Between Microsoft tenant
According to reports, the threat group known as “Nobelium” who were responsible for the SolarWinds attacks is now discovered to be targeting Microsoft tenants through the new Cross-Tenant Synchronisation (CTS) feature introduced by Microsoft.
CTS...
80,000+ Exploitable Hikvision Cameras Exposed Online
A critical command injection flaw that is present in over 80,000 Hikvision camera models has been discovered by security researchers at CYFIRMA recently. Using specially crafted messages, it is relatively easy to exploit this...
10 Best ZTNA Solutions (Zero Trust Network Access) in 2023
ZTNA Solutions fundamental function is to grant users authorized access to resources and apps based on their identification and device rather than their physical location or network.
Granular access controls, rigorous authentication, and continuous monitoring...
WordPress Plug-in Vulnerability Let Hackers Access Sensitive information Over 1 Million Websites
The Threat Intelligence team of Wordfence security firm disclosed two vulnerabilities in the Gutenberg Template Library & Redux Framework plugin on August 3, 2021, and it's installed on over 1 million WordPress sites.
However, after...