Researchers discovered a new attack campaign attributed to the Chinese-sponsored advanced persistent threat group known as Winnti. Based on reports, the recently discovered campaign remained undetected for several years. The researchers called the campaign ‘Operation CuckooBees’, which leveraged a past undocumented malware and stole confidential trade data from several organisations worldwide. An incident response team...Continue Reading
Critical flaws are found in Java’s Spring Framework and WordPress CMS, allowing the Sysrv botnet to exploit them and deploy malware on compromised Windows and Linux servers. The botnet was found with a new upgraded variant, Sysrv-K, capable of scanning unpatched Spring and WordPress deployments. According to researchers, the new variant of the Sysrv botnet...Continue Reading
According to researchers, the F5 BIG-IP currently has a remote code execution (RCE) vulnerability that can enable threat actors to conduct numerous exploits. The F5 BIG-IP device users are warned to apply the latest security patch to avoid being a target. F5 has disclosed a critical remote code execution flaw tracked by researchers as CVE-2022-1388...Continue Reading
A new infostealer campaign that targets NFT artists has been discovered circulating in the non-fungible token landscape. In Japan, the users of creator-oriented online platforms such as Pixiv and DeviantArt are getting phoney job offers that contain messages from individuals that impersonate Cyberpunk APE executives’ NFTs. Researchers indicated that these new baits spread across the...Continue Reading
A pre-authenticated remote code execution (RCE) flaw was discovered inside the dotCMS, a source content management system. The system is coded in Java and has several users that reach about 10,000 individuals across over 70 countries globally. Fortune 500 brands and average-sized businesses comprise these. The vulnerability in the dotCMS could allow RCE if...Continue Reading
A newly discovered malware loader, called Bumblebee, has been identified by cybersecurity researchers as being utilised by roughly three separate threat groups connected with ransomware operations. Experts assumed that the Bumblebee was created by its operators to become a substitute for the BazarLoader backdoor. They also claimed that there is a high possibility that the...Continue Reading
A ransomware strain first found in August 2021 called the Quantum ransomware was observed launching attacks that experts described as speedy as its progress seems to escalate quickly in a targeted network before installed security defenders could detect and conduct measures. According to the research analysis, the described ransomware attack only needs over three hours...Continue Reading
A detailed report regarding the behaviour of the Night Sky ransomware was revealed recently, emphasising its new tactic of executing double extortion to its victims. The ransomware samples were first found at the beginning of 2022 during a short cyberattack that targeted two victims from Japan and Bangladesh. The researchers found developed executables in the...Continue Reading
Record-high zero-day exploits had been recorded for 2021 after security analysts in Google disclosed their findings regarding the threat. The researchers also added that last year’s record of zero-day exploits is the most ever detected for a year — with 58 cases found — since they began hunting in 2014. Furthermore, analysts were alarmed with...Continue Reading
As convenient as the QR codes for its users worldwide, the tool is also currently being exploited for cybercrimes. Many threat actors abuse QR codes to deploy Qshing attacks or QR code phishing to steal sensitive info and money from victims or spread malware by tampering with it. The QR code technology was initially intended for quickly...Continue Reading