Blog Series
Month: October 2022
LofyGang distributes 199 trojanized NPM...
The software security company Checkmarx has uncovered the malicious activities of the threat actor LofyGang, which distributes trojanized and typosquatted packages on the NPM open source repository. Security researchers discovered...
Hackers actively exploit critical Bitbucket...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a Bitbucket Server RCE and two Microsoft Exchange zero-days to its list of exploited vulnerabilities. The Bitbucket flaw is a...
After “Dirty Pipe”, Linux is...
While many were away enjoying some well-deserved R&R, security researchers, hackers wearing hats of all different colors, and intelligence agents from all over the world congregated at the Black Hat...
Why You Need to Embrace...
Sometimes organizations must embrace evolution in the way things are done, whether it’s because a new approach has become standard practice or because of some event that serves as a...
Chaos malware targets multiple...
According to researchers from Lumen-based Black Lotus Lab, a new Chaos malware is targeting multiple architectures to spread DDoS, cryptocurrency miners, and install backdoors. The malware is written in Go...
Malware campaign exploits Microsoft vulnerability...
Cisco Talos researchers have uncovered a social engineering malware campaign that exploits a remote code execution flaw in Microsoft Office to apply a Cobalt Strike beacon on compromised victims. The...
Microsoft Exchange zero-day flaws expose...
Microsoft has announced that two critical vulnerabilities in its Exchange application are being exploited by attackers. The company also explained that more than 22,000 servers worldwide are affected. “At this...
New Metador APT takes aim...
A new malware, identified as Metador, is being used by attackers to target telecommunications, internet service providers and universities on multiple continents, according to security researchers at SentinelOne. “The operators...
Hackers compromise GitHub accounts with...
GitHub warns that cyber attackers are compromising user accounts through a sophisticated phishing campaign. The malicious messages notify users that their CircleCI session has expired and that it is imperative...
TuxCare Wins 2022 Merit Award...
TuxCare is pleased to announce it was honored in this year’s inaugural Merit Awards for Technology. Recognized with a silver win in the information security category, the company was recognized...
New ransomware tool uses unique...
Threat actors are now updating the data exfiltration tool Exmatter with a unique data corruption feature, which attackers could switch to perform ransomware attacks in the future. The new unique...
Attackers exploit Sophos’ firewall code...
Sophos has warned that attackers are exploiting a critical code injection security vulnerability in the company’s Firewall product. The attackers are exploiting the flaw in the wild. The vulnerability is...