Technology

Digital Signature Spoofing Flaws Uncovered in OpenOffice and LibreOffice

The maintainers of LibreOffice and OpenOffice have shipped security updates to their productivity software to remediate multiple vulnerabilities that could be weaponized by malicious actors to alter documents to make them appear as if they are digitally signed by a trusted source. The list of the three flaws is as follows — CVE-2021-41830 / CVE-2021-25633 – Content and […]

Digital Signature Spoofing Flaws Uncovered in OpenOffice and LibreOffice Read More »

Indian-Made Mobile Spyware Targeted Human Rights Activist in Togo

A prominent Togolese human rights defender has been targeted with spyware by a threat actor known for striking victims in South Asia, marking the hacking group’s first foray into digital surveillance in Africa. Amnesty International tied the covert attack campaign to a collective tracked as “Donot Team” (aka APT-C-35), which has been linked to cyber

Indian-Made Mobile Spyware Targeted Human Rights Activist in Togo Read More »

Verify End-Users at the Helpdesk to Prevent Social Engineering Cyber Attack

Although organizations commonly go to great lengths to address security vulnerabilities that may exist within their IT infrastructure, an organization’s helpdesk might pose a bigger threat due to social engineering attacks. Social engineering is “the art of manipulating people so they give up confidential information,” according to Webroot. There are many different types of social engineering

Verify End-Users at the Helpdesk to Prevent Social Engineering Cyber Attack Read More »

Apple Releases Urgent iPhone and iPad Updates to Patch New Zero-Day Vulnerability

Apple on Monday released a security update for iOS and iPad to address a critical vulnerability that it says is being exploited in the wild, making it the 17th zero-day flaw the company has addressed in its products since the start of the year.’ The weakness, assigned the identifier CVE-2021-30883, concerns a memory corruption issue in

Apple Releases Urgent iPhone and iPad Updates to Patch New Zero-Day Vulnerability Read More »

Ukraine Arrests Operator of DDoS Botnet with 100,000 Compromised Devices

Ukrainian law enforcement authorities on Monday disclosed the arrest of a hacker responsible for the creation and management of a “powerful botnet” consisting of over 100,000 enslaved devices that was used to carry out distributed denial-of-service (DDoS) and spam attacks on behalf of paid customers. The unnamed individual, from the Ivano-Frankivsk region of the country,

Ukraine Arrests Operator of DDoS Botnet with 100,000 Compromised Devices Read More »

Researchers Warn of FontOnLake Rootkit Malware Targeting Linux Systems

Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously unrecognized Linux malware that’s engineered to enable remote access to its operators, in addition to amassing credentials and function as a proxy server. The malware family, dubbed “FontOnLake” by Slovak cybersecurity firm ESET, is said to feature “well-designed

Researchers Warn of FontOnLake Rootkit Malware Targeting Linux Systems Read More »

Ransomware Group FIN12 Aggressively Going After Healthcare Targets

An “aggressive” financially motivated threat actor has been identified as linked to a string of RYUK ransomware attacks since October 2018, while maintaining close partnerships with TrickBot-affiliated threat actors and using a publicly available arsenal of tools such as Cobalt Strike Beacon payloads to interact with victim networks. Cybersecurity firm Mandiant attributed the intrusions to

Ransomware Group FIN12 Aggressively Going After Healthcare Targets Read More »

New Patch Released for Actively Exploited 0-Day Apache Path Traversal to RCE Attacks

The Apache Software Foundation on Thursday released additional security updates for its HTTP Server product to remediate what it says is an “incomplete fix” for an actively exploited path traversal and remote code execution flaw that it patched earlier this week. CVE-2021-42013, as the new vulnerability is identified as, builds upon CVE-2021-41773, a flaw that impacted Apache web

New Patch Released for Actively Exploited 0-Day Apache Path Traversal to RCE Attacks Read More »

Penetration Testing Your AWS Environment – A CTO’s Guide

So, you’ve been thinking about getting a Penetration Test done on your Amazon Web Services (AWS) environment. Great! What should that involve exactly?  There are many options available, and knowing what you need will help you make your often limited security budget go as far as possible. Broadly, the key focus areas for most penetration

Penetration Testing Your AWS Environment – A CTO’s Guide Read More »

Code Execution Bug Affects Yamale Python Package — Used by Over 200 Projects

A high-severity code injection vulnerability has been disclosed in 23andMe’s Yamale, a schema and validator for YAML, that could be trivially exploited by adversaries to execute arbitrary Python code. The flaw, tracked as CVE-2021-38305 (CVSS score: 7.8), involves manipulating the schema file provided as input to the tool to circumvent protections and achieve code execution. Particularly, the 

Code Execution Bug Affects Yamale Python Package — Used by Over 200 Projects Read More »