Serie de blogs
Noticias sobre ciberseguridad
- Sin categorías
Nearest Neighbor Attack: Russian Spies...
Recent media reports have cited a cybersecurity firm, Volexity, claiming that Russian spies have used an unprecedented attack technique. What is now being dubbed the nearest neighbor attack exploits nearby...
Alert: Vertex AI Flaws Lead...
As per recent media reports, cybersecurity researchers have identified and disclosed two Vertex AI flaws. These flaws in Google’s machine learning (ML) algorithm, if exploited, could allow threat actors to...
Lazarus Uses New RustyAttr Malware...
As per recent media reports, the Lazarus threat actor group has been observed leveraging the new RustyAttr malware to target macOS devices. It’s worth noting that the tactical and infrastructural...
North Korean Crypto Attacks: Hackers...
In the online threat landscape, hackers with ties to the Democratic People’s Republic of Korea (DPRK) were observed targeting crypto firms. Reports claim that these North Korean crypto attacks use...
VEILDrive Attack: Microsoft Services Used...
Recent media reports claim that the ongoing attack campaign being dubbed VEILDrive is leveraging various Microsoft services. Common examples of the service being used in the VEILDrive attack campaign include...
Microsoft Warning: Chinese Hackers Exploiting...
As per recent reports, a Microsoft warning has mentioned that a Chinese threat actor, being tracked as Strom-0940, was identified leveraging a botnet called CovertNetwork-1658. Experts believe that the botnet...
North Korean Attack: Hackers Use...
As per recent media reports, multiple threat actors linked to North Korea have been implicated in using a known ransomware family called Play. Reports claim that the North Korean attack...
AWS Vulnerability: Users At Risk...
As per recent reports, cybersecurity researchers have recently uncovered an AWS vulnerability in the Cloud Development Kit (CDK). This vulnerability if exploited could result in account takeover attacks under certain...
TeamTNT Ataques de Cryptojacking: Entornos Docker...
Según informes recientes de los medios de comunicación, los ataques de cryptojacking de TeamTNT están prevaleciendo y el entorno nativo de la nube es un objetivo clave. El objetivo subyacente de estos ataques es minar criptomonedas y...
Google Meet Fake Pages Used...
As per recent reports, threat actors have now started to leverage Google Meet fake pages as part of the ClickFix hacking campaign. This cybercrime initiative is designed to deliver infostealers...
Ukrainian Government Targeted With Russian...
As per recent media reports, Ukrainian government agencies have experienced a new wave of Russian RomCom attacks. The threat actor behind the attacks uses a remote access trojan (RAT) for...