Tag

Information Security

Threat Actors Exploit Binance’s Smart Chain Contracts for Malicious Code Delivery — The Next Frontier in Bulletproof Hosting
Cyber Security
Threat Actors Exploit Binance’s Smart Chain Contracts for Malicious Code Delivery — The Next Frontier in Bulletproof Hosting

In a new and concerning development, threat actors have been observed leveraging Binance’s Smart Chain (BSC) contracts to serve malicious code. This tactic, known as the “next level of bulletproof hosting,” poses significant challenges for intervention and disruption. Guardio Labs has dubbed this ongoing malware campaign as EtherHiding, shedding light on the increasing sophistication of cyber threats. Background of the

Read More
Signal Pushes Back Against Zero-Day Flaw Claims Amid Growing Spyware Threats
Cyber Security
Signal Pushes Back Against Zero-Day Flaw Claims Amid Growing Spyware Threats

The encrypted messaging app Signal has strongly denied viral reports of an alleged zero-day flaw in its software, following an extensive investigation into the matter. The claims have been dismissed by Signal, who found no evidence to support the alleged vulnerability. Furthermore, Signal confirmed that it consulted with the U.S. government, which also stated that there was no information to

Read More
Pro-Russian Hacking Groups Exploit WinRAR Vulnerability in Phishing Campaign
Cyber Security
Pro-Russian Hacking Groups Exploit WinRAR Vulnerability in Phishing Campaign

Pro-Russian hacking groups have recently been identified as exploiting a security vulnerability in the popular WinRAR archiving utility in a sophisticated phishing campaign. The primary objective of this campaign is to harvest credentials from compromised systems, posing a significant threat to the cybersecurity landscape. Description of the Attack The attack revolves around the utilization of malicious archive files that leverage

Read More
Threat Actors Exploit Israeli Rocket Alert Applications to Spread Fear and Steal User Data
Cyber Security
Threat Actors Exploit Israeli Rocket Alert Applications to Spread Fear and Steal User Data

The recent Israel-Gaza conflict has not only resulted in physical damage and casualties but has also given rise to cybersecurity threats. Threat actors have been observed targeting Israeli rocket alerting applications, using them as a means to spread fear and deploy mobile spyware. One such instance involved the exploitation of a vulnerability in the popular ‘Red Alert: Israel’ application, allowing

Read More
Vulnerability in Milesight Industrial Routers Exposes Critical Infrastructure to Unauthorized Access
Cyber Security
Vulnerability in Milesight Industrial Routers Exposes Critical Infrastructure to Unauthorized Access

A vulnerability in industrial routers manufactured by Milesight, a Chinese IoT and video surveillance product maker, has recently come to light. Exploit and vulnerability intelligence firm, VulnCheck, has reported the possibility of the vulnerability being exploited in attacks. This raises concerns about the security of critical infrastructure systems that rely on these routers. Overview of the vulnerability The vulnerability, known

Read More
Microsoft Pushes for More Secure Windows Authentication, Plans to Eliminate NTLM Protocol
Cyber Security
Microsoft Pushes for More Secure Windows Authentication, Plans to Eliminate NTLM Protocol

Microsoft is taking significant steps to enhance the security of Windows authentication by introducing new features for the Kerberos protocol, with the ultimate aim of eliminating the use of the vulnerable NTLM protocol. This proactive approach from Microsoft comes as NTLM is increasingly being targeted by relay attacks, and its weak password protection can easily be compromised with modern hardware.

Read More
VPNs: The Underpinning of Secure Digital Transformation for Global Businesses
IT Digital Transformation
VPNs: The Underpinning of Secure Digital Transformation for Global Businesses

In today’s digital age, where remote work and global connectivity are the norm, virtual private networks (VPNs) have become increasingly relevant to the success of digital transformation for teams and employees. This article examines the benefits and importance of VPNs in enhancing productivity, safeguarding online activities, and protecting businesses from cyber threats. Benefits of VPNs for organizations By enabling secure

Read More
Facing the Future: Navigating the Interplay of Cybersecurity Requirements, Rising Cyber Threats, and the Role of DevSecOps
DevOps
Facing the Future: Navigating the Interplay of Cybersecurity Requirements, Rising Cyber Threats, and the Role of DevSecOps

As the threat landscape continues to evolve and cybercriminals wreak havoc on businesses, companies seeking cyber insurance policies are facing increasingly stringent cybersecurity requirements. Insurance providers are keen to protect themselves from the ever-increasing damage caused by cyberattacks. In recent years, insurance companies have started incorporating Privileged Access Management (PAM) into their cybersecurity standards as a necessary component for cyber

Read More
Flagright partners with Banked to enhance AML compliance and fraud prevention in digital payments
Digital Lending / Digital Payments
Flagright partners with Banked to enhance AML compliance and fraud prevention in digital payments

In a strategic partnership, Flagright, a leading provider in anti-money laundering (AML) compliance and fraud prevention, has welcomed Banked as its latest customer. This alliance is projected to significantly transform the landscape of digital payment security, offering enhanced protection to merchants and consumers alike. Banked’s Unique Approach to Payment Methods Banked has been making waves in the payment industry by

Read More
Progress Software Faces Mounting Legal Challenges and Investigations Following May Mass Attack on MOVEit Software
Cyber Security
Progress Software Faces Mounting Legal Challenges and Investigations Following May Mass Attack on MOVEit Software

The zero-day campaign targeting Progress Software’s MOVEit file transfer software in May has unleashed a wave of litigation and governmental investigations, as disclosed in the company’s regulatory filing. This article delves into the details of the incident, highlighting the involvement of the U.S. Securities and Exchange Commission (SEC) and the extensive reach of the attack. Additionally, it explores the legal

Read More
Persistent Vulnerabilities in Squid Proxy: A Critical Security Concern
Cyber Security
Persistent Vulnerabilities in Squid Proxy: A Critical Security Concern

Dozens of vulnerabilities affecting the popular Squid caching and forwarding web proxy have remained unpatched, despite being responsibly disclosed to developers two years ago. This poses a significant security risk for the numerous organizations relying on Squid as their open-source proxy solution. Background Squid is widely recognized as one of the most widely used open-source proxies, relied upon by millions

Read More
Juniper Networks Addresses Over 30 Vulnerabilities in Junos OS and Junos OS Evolved
Cyber Security
Juniper Networks Addresses Over 30 Vulnerabilities in Junos OS and Junos OS Evolved

Juniper Networks, a leading provider of networking solutions, has recently released software updates to patch a total of more than 30 vulnerabilities found in its Junos OS and Junos OS Evolved operating systems. Among these vulnerabilities are nine high-severity flaws, highlighting the critical need for users to promptly apply the available patches. In this article, we will provide an overview

Read More