Blog Series
security
VMWare Urges Users to Uninstall...
VMware has issued a no-patch advisory urging users to take swift action by removing the deprecated Enhanced Authentication Plug-in (EAP). EAP was deprecated nearly three years ago, in March 2021,...
Optimizing IoT Device Management in...
In the vast world of the Internet of Things (IoT), Linux-based operating systems have carved out a significant space due to their robustness, flexibility, and wide range of supported hardware....
Linux malware infects 70,000...
A stealthy Linux malware called AVrecon has been used to infect over 70,000 Linux-based small office/home office (SOHO) routers, according to a report by Lumen’s Black Lotus Labs threat research...
Uptycs warns of fake proof-of-concept...
A fake proof-of-concept (PoC) repository has been discovered by Uptycs on GitHub to be masquerading as a legitimate PoC for CVE-2023-35829, a recently disclosed high-severity flaw in the Linux kernel....
AI voice cloning scams on...
According to IDIQ’s IdentityIQ 2022 Scam Report, there has been a surge in AI voice scams enabled by AI voice technology. Scammers are now able to create astonishingly realistic voices,...
BlackByte 2.0 ransomware attacks on...
A new report by Microsoft’s Incident Response team has found that there has been a surge in BlackByte 2.0 ransomware attacks. These attacks are characterized by their speed and destructiveness,...
Inky uncovers malicious QR codes...
According to Inky Technology Corp., image-based emails with integrated Quick Response (QR) codes are being used in phishing attacks. To fool receivers more readily and collect critical information, the attackers...
Ensuring secure and responsible AI...
The increased use of AI tools/SaaS-based solutions is changing the way businesses function. These AI tools/SaaS-based solutions, which allow users to use AI tools without installing any software on their...
Abandoned S3 buckets used to...
Cybersecurity researchers at Checkmarx have warned that abandoned Amazon Simple Storage Service (S3) buckets can be used to spread malware. It all started with an NPM package named “bignum” that...
Over 101,100 ChatGPT account credentials...
Over 101,100 ChatGPT account credentials have been hijacked and are available for sale on criminal dark web marketplaces, according to Group-IB. The hacked ChatGPT account credentials were identified among information...
ChamelGang exploits undocumented implant for...
Cybersecurity researchers at Stairwell have identified a threat actor known as ChamelGang employing a previously undisclosed implant to establish backdoors in Linux systems. This new malware, named ChamelDoH by Stairwell,...