Third Party Risk Assessment

Third Party Risk Assessment Page 1

Adobe Acrobat queries antivirus programs that can inspect PDF files

Adobe Acrobat users might be at risk after security researchers found that the software may block antivirus programs from checking into PDF files, which also denies these AV tools from monitoring if a PDF file is infected with malicious trojans. Most security tools require visibility into a computer system’s software and processes. To be able...
Continue Reading
Browsers Scroll to Text Fragment Feature Abused Cyberattacks

Browsers’ Scroll to Text Fragment feature could get abused in attacks

Research says threat actors could exploit the Scroll to Text Fragment or STTF feature in web browsers to steal users’ sensitive data. This feature allows users to create links from the URL onto a specific webpage portion using the ‘#:~:text’ identifier. From the studies about the STTF flaw, its operators use CSS selectors to collect...
Continue Reading
Users Online Fingerprints Tracked Chrome Extensions Extension Fingerprint

Users’ online fingerprints could be tracked from Chrome extensions

Studies claim that anyone could find ways to track a person’s online activities and behaviour after a security researcher had created a site that could generate a user’s device fingerprints through their installed Google Chrome extensions. The researcher has dubbed the new fingerprinting site “Extension Fingerprints,” allowing its user to generate a tracking hash based...
Continue Reading
CPS Chicago Public Schools Third-Party Risk Vendor Supplier Data Breach Cyberattack Incident Battle for Kids US

The CPS blame a third-party supplier for a data breach incident

Chicago Public Schools (CPS) have published an advisory regarding a data breach of nearly half a million students from the educational institution, blaming the misactions of a third-party supplier which resulted in a ransomware attack. The ransomware campaign has impacted the Ohio-based non-profit organisation called Battle for Kids. This single school system experienced a data...
Continue Reading

The Blue Mockingbird group exploits the previously known Telerik flaw

A malicious threat group called Blue Mockingbird has targeted the Telerik UI flaws to infect its servers, mine Monero by hacking system resources, and install Cobalt Strike beacons. The CVE-2019-18935 is the deserialisation critical flaw leveraged by the threat actors, which leads to an RCE in the Telerik UI library. To exploit the critical vulnerability,...
Continue Reading
Golang P2P Panchan Botnet Linux Servers Cryptojacking Miner

A new Golang-based P2P Panchan botnet targets Linux servers

A new Go language-based peer-to-peer botnet dubbed Panchan has been observed by researchers targeting the Linux servers in the academic sector since it started appearing last March. The researchers stated that the malware utilises a built-in concurrency functionality to maximise its propagation and run malware modules. Additionally, they noticed that the Panchan botnet could harvest...
Continue Reading
Syslogk Linux Rootkit Curated Packets Backdoor Trojan

The Syslogk Linux rootkit utilises curated packets to activate a backdoor

Syslogk, a new Linux rootkit, is used by hackers in their latest attacks to obfuscate malicious processes via specially designed packets to trigger a dormant backdoor in the device. The malware is believed to be in its development phase, and its developers seem to base its project on an old open-source rootkit called Adore-Ng. Additionally,...
Continue Reading
Intel AMD Processors Digital Risk Hertzbleed Cyberattack Side Channel

Intel and AMD processors are at risk against the new Hertzbleed attack

Remote threat operators can now execute a new side-channel attack tracked as Hertzbleed. They use the new attack vector to exfiltrate full cryptographic keys in affected CPUs through observing their frequency variations enabled by DVFS or dynamic voltage and frequency scaling. According to the security analysts, the new side-channel attack is highly effective on modern...
Continue Reading
Linux Systems Symbiote Malware Cybersecurity

Linux systems were targeted by the new Symbiote malware

The Symbiote is a new malware that has been spotted compromising running processes on Linux operating systems. According to reports, the malware has been developing since last year. The newly discovered malware has been analysed by cybersecurity researchers who have observed its possessed multiple technical aspects. It steals account credentials and provides backdoor access to...
Continue Reading

Roblox gaming platform leveraged by threat actors to sell decryptors

A new ransomware operation has been found with a unique method of selling its decryptors through Roblox, a gaming platform that uses its in-game currency, Robux. Roblox is a game designed for kids, and one of its features is that it allows its members to develop their games and monetise them by selling ‘Game Passes.’...
Continue Reading
1 2 3 10