Technology

Jan 13, 2023Ravie LakshmananCyber Threat / Malware Detection Remote access trojans such as StrRAT and Ratty are being distributed as a combination of polyglot and malicious Java archive (JAR) files, once again highlighting how threat actors are continuously finding new ways to fly under the radar. “Attackers now use the polyglot technique to confuse security
0 Comments
Honor Magic 5 has reportedly been spotted on China’s Ministry of Industry and Information Technology (MIIT) certification website. The listing suggests that the upcoming Honor Magic 5 series of smartphones could make its way to consumers soon. It also appears to suggest some key specifications of the Honor Magic 5, which is tipped to debut
0 Comments
Jan 12, 2023Ravie LakshmananActive Directory / Malware A recent IcedID malware attack enabled the threat actor to compromise the Active Directory domain of an unnamed target less than 24 hours after gaining initial access. “Throughout the attack, the attacker followed a routine of recon commands, credential theft, lateral movement by abusing Windows protocols, and executing
0 Comments
Jan 12, 2023Ravie LakshmananBrowser Security / Data Safety Details have emerged about a now-patched vulnerability in Google Chrome and Chromium-based browsers that, if successfully exploited, could have made it possible to siphon files containing confidential data. “The issue arose from the way the browser interacted with symlinks when processing files and directories,” Imperva researcher Ron
0 Comments
Amazon Great Republic Day sale 2023 dates have been announced. The online marketplace will run its special discount sale from January 15 to January 20 this year. Amazon Prime members will get early access to the sale. Amazon’s Great Republic Day sale promises discounts on smartphones, accessories, laptops, Amazon devices, and other electronics. Amazon has
0 Comments
Jan 11, 2023Ravie LakshmananCyber Threat / Malware A new analysis of Raspberry Robin’s attack infrastructure has revealed that it’s possible for other threat actors to repurpose the infections for their own malicious activities, making it an even more potent threat. Raspberry Robin (aka QNAP worm), attributed to a threat actor dubbed DEV-0856, is malware that
0 Comments
Xiaomi has reportedly begun sending out invites to media professionals for its Mobile World Congress (MWC) event scheduled to be held in Barcelona from February 27 until March 2 this year. Much has been speculated about what the Chinese electronics and smartphone manufacturer has in store for the MWC 2023 event. However, the media invites
0 Comments
Jan 11, 2023The Hacker NewsInformation Security / Jobs Are you looking to take your career in the information security industry to the next level? Look no further than the 2023 Certified Technology Professional Bundle! This unparalleled offer grants you lifetime access to nine comprehensive courses in information security, hacking, and cybersecurity at a remarkable price
0 Comments
Jan 10, 2023Ravie LakshmananAdvanced Persistent Threat The advanced persistent threat (APT) group known as StrongPity has targeted Android users with a trojanized version of the Telegram app through a fake website that impersonates a video chat service called Shagle. “A copycat website, mimicking the Shagle service, is used to distribute StrongPity’s mobile backdoor app,” ESET
0 Comments
Jan 10, 2023Ravie LakshmananSoftware Security / Supply Chain A high-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that, if successfully exploited, could lead to remote code execution on a target server. “By exploiting this vulnerability, attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted JSON
0 Comments
Jan 09, 2023Ravie LakshmananKubernetes / Cryptojacking The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain initial access to Kubernetes environments. A second initial access vector technique entails the use of vulnerable images, Sunders Bruskin, security researcher at Microsoft Defender for Cloud, said in a report
0 Comments
Jan 09, 2023The Hacker NewsSaaS Security / SSPM Solution Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over 300 Mailchimp customer accounts and exported audience data from 102 of them. The breach was preceded by a successful phishing attempt and led to malicious attacks against Mailchimp’s customers’ end
0 Comments