Expert talks
How enterprises have responded after three years of peak cyber risk
According to the latest Allianz Risk Barometer report, cyber breaches represent the number one global business risk in 2024. What’s more, this is the third consecutive year that cyber has achieved such a vaunted position.
The anxiety that business leaders are feeling is valid, and the risk is ... Read more
Attackers target .NET developers with malicious NuGet packages
Developers are being attacked by threat actors using "sophisticated typosquatting techniques".
Threat actors are targeting and infecting .NET developers with cryptocurrency stealers, according to a report in BleepingComputer.
JFrog security researchers Natan Nehorai and Brian Moussalli detai... Read more
Hackers hijack Linux devices using PRoot-isolated file systems
Hackers are using BYOF (bring your own filesystem) attacks to abuse the open-source Linux PRoot utility and develop a consistent source of harmful tools compatible with Linux devices.
A BYOF attack involves a threat actor building a malicious file system on their devices that includes a typical ... Read more
Typosquatting campaign impersonates 27 brands
27 brands from different sectors are being impersonated in a typosquatting campaign to trick unsuspecting users and install malware in their systems.
Typosquatting is as old as the internet. The technique involves a malicious actor creating a fake website with a domain name similar to a legitima... Read more
Maggie malware has gained backdoor access to hundreds of Microsoft SQL servers
Maggie is a new malware that has surfaced and is already gaining unauthorized backdoor access to several Microsoft SQL servers.
Researchers have recently discovered a malware named Maggie which has been gaining unauthorized backdoor access into several Microsoft SQL servers. John Aydinbas and Al... Read more
Hackers deliver malware through ‘mouseovers’ in PowerPoint files
Hackers suspected of working for Russia are utilizing Microsoft PowerPoint presentations (PTTs) to spread malware, using a hyperlink technique that acts as a set-off to trigger a malicious PowerShell script within the PPT.
There is no need for a malicious macro to execute or download the payload... Read more
Zscaler’s latest report raises red flags about ransomware
Despite consistent efforts to thwart it, ransomware remains a persistent problem for businesses and consumers worldwide.
Zscaler has released its latest report titled ThreatLabz 2022 Ransomware Report. The study has revealed the number and scope of ransomware attacks has grown unabated, generati... Read more
600,000 WordPress websites threatened by critical RCE vulnerability
Multiple versions of WordPress plugin 'Essential Addons for Elementor' are vulnerable to remote code execution (RCE). The plugin is used by hundreds of thousands of websites. The vulnerability is present in every version prior to 5.0.5.
Its attack surface is huge. According to WordPress, the plu... Read more
‘SolarWinds hack group Nobelium still has huge attack potential’
Nobelium, the hack group held responsible for the infamous SolarWinds attack, still has a large arsenal of advanced hacking capabilities at its disposal. This is the conclusion of Mandiant security specialists in a recent study. The full potential of the alleged state-sponsored collective has not y... Read more
Microsoft Exchange Server under threat from ProxyShell vulnerabilities
ProxyShell refers to a trio of security flaws that have already been addressed by Microsoft. However, not all instances are patched yet. Attackers are scanning the internet for Microsoft Exchange Server instances without patches for the ProxyShell vulnerability.
Researchers have sounded the alar... Read more