Technology

The Added Dangers Privileged Accounts Pose to Your Active Directory

In any organization, there are certain accounts that are designated as being privileged. These privileged accounts differ from standard user accounts in that they have permission to perform actions that go beyond what standard users can do. The actions vary based on the nature of the account but can include anything from setting up new […]

The Added Dangers Privileged Accounts Pose to Your Active Directory Read More »

Hackers Increasingly Using Browser Automation Frameworks for Malicious Activities

Cybersecurity researchers are calling attention to a free-to-use browser automation framework that’s being increasingly used by threat actors as part of their attack campaigns. “The framework contains numerous features which we assess may be utilized in the enablement of malicious activities,” researchers from Team Cymru said in a new report published Wednesday. “The technical entry bar for

Hackers Increasingly Using Browser Automation Frameworks for Malicious Activities Read More »

Experts Warn of Rise in ChromeLoader Malware Hijacking Users’ Browsers

A malvertising threat is witnessing a new surge in activity since its emergence earlier this year. Dubbed ChromeLoader, the malware is a “pervasive and persistent browser hijacker that modifies its victims’ browser settings and redirects user traffic to advertisement websites,” Aedan Russell of Red Canary said in a new report. ChromeLoader is a rogue Chrome browser extension

Experts Warn of Rise in ChromeLoader Malware Hijacking Users’ Browsers Read More »

Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers

Quanta Cloud Technology (QCT) servers have been identified as vulnerable to the severe “Pantsdown” Baseboard Management Controller (BMC) flaw, according to new research published today. “An attacker running code on a vulnerable QCT server would be able to ‘hop’ from the server host to the BMC and move their attacks to the server management network,

Critical ‘Pantsdown’ BMC Vulnerability Affects QCT Servers Used in Data Centers Read More »

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched

The maintainers of the Tails project have issued a warning that the Tor Browser that’s bundled with the operating system is unsafe to use for accessing or entering sensitive information. “We recommend that you stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages,

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched Read More »

Researchers Find New Malware Attacks Targeting Russian Government Entities

An unknown advanced persistent threat (APT) group has been linked to a series of spear-phishing attacks targeting Russian government entities since the onset of the Russo-Ukrainian war in late February 2022. “The campaigns […] are designed to implant a Remote Access Trojan (RAT) that can be used to surveil the computers it infects, and run

Researchers Find New Malware Attacks Targeting Russian Government Entities Read More »

Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them

Malicious actors can gain unauthorized access to users’ online accounts via a new technique called “account pre-hijacking,” new research has found. The attack takes aim at the account creation process that’s ubiquitous in websites and other online platforms, enabling an adversary to perform a set of actions before an unsuspecting victim creates an account in

Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them Read More »

How Secrets Lurking in Source Code Lead to Major Breaches

If one word could sum up the 2021 infosecurity year (well, actually three), it would be these: “supply chain attack”.  A software supply chain attack happens when hackers manipulate the code in third-party software components to compromise the ‘downstream’ applications that use them. In 2021, we have seen a dramatic rise in such attacks: high

How Secrets Lurking in Source Code Lead to Major Breaches Read More »

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room

A group of academics has devised a system that can be used on a phone or a laptop to identify and locate Wi-Fi-connected hidden IoT devices in unfamiliar physical spaces. With hidden cameras being increasingly used to snoop on individuals in hotel rooms and Airbnbs, the goal is to be able to pinpoint such rogue devices without much of a hassle. The

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room Read More »

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks

A year-long international investigation has resulted in the arrest of the suspected head of the SilverTerrier cybercrime group by the Nigeria Police Force. “The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims,” Interpol said in a statement. <!–adsense–>

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks Read More »