Technology

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers

FireEye and Microsoft on Thursday said they discovered three more malware strains in connection with the SolarWinds supply-chain attack, including a “sophisticated second-stage backdoor,” as the investigation into the sprawling espionage campaign continues to yield fresh clues about the threat actor’s tactics and techniques.  Dubbed GoldMax (aka SUNSHUTTLE), GoldFinder, and Sibot, the new set of

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers Read More »

Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit

Enterprise cloud security firm Qualys has become the latest victim to join a long list of entities to have suffered a data breach after zero-day vulnerabilities in its Accellion File Transfer Appliance (FTA) server were exploited to steal sensitive business documents. As proof of access to the data, the cybercriminals behind the recent hacks targeting

Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit Read More »

Google Will Use ‘FLoC’ for Ad Targeting Once 3rd-Party Cookies Are Dead

Signaling a major shift to its ads-driven business model, Google on Wednesday unequivocally stated it would not build alternate identifiers or tools to track users across multiple websites once it begins phasing out third-party tracking cookies from its Chrome browser by early 2022. “Instead, our web products will be powered by privacy-preserving APIs which prevent

Google Will Use ‘FLoC’ for Ad Targeting Once 3rd-Party Cookies Are Dead Read More »

CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws

Following Microsoft’s release of out-of-band patches to address multiple zero-day flaws in on-premises versions of Microsoft Exchange Server, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive warning of “active exploitation” of the vulnerabilities. <!–adsense–> The alert comes on the heels of Microsoft’s disclosure that China-based hackers were

CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws Read More »

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed publicly. New research released by Cisco Talos reveals a new malware campaign targeting organizations in South Asia that utilize

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection Read More »

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account

Microsoft has awarded an independent security researcher $50,000 as part of its bug bounty program for reporting a flaw that could have allowed a malicious actor to hijack users’ accounts without their knowledge. Reported by Laxman Muthiyah, the vulnerability aims to brute-force the seven-digit security code that’s sent to a user’s email address or mobile

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account Read More »

Replacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams

The attack surface is virtually expanding before our eyes. Protecting assets across multiple locations, with multiple solutions from different vendors, has become a daily concern for CISOs globally.  In a new e-book recently published (download here), CISOs with small security teams talk about the drivers for replacing their EDR/NGAV solutions with an Autonomous XDR solution

Replacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams Read More »

URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange

Microsoft has released emergency patches to address four previously undisclosed security flaws in Exchange Server that it says are being actively exploited by a new Chinese state-sponsored threat actor with the goal of perpetrating data theft. Describing the attacks as “limited and targeted,” Microsoft Threat Intelligence Center (MSTIC) said the adversary used these vulnerabilities to access

URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange Read More »

New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!

Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google today rolled out fixes for yet another zero-day vulnerability in the world’s most popular web browser that it says is being abused in the wild. Chrome 89.0.4389.72, released by the search giant for Windows, Mac, and Linux on Tuesday, comes with a total of

New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP! Read More »