Researchers Unmask Sandman APT’s Hidden Link to China-Based KEYPLUG Backdoor

December 12, 2023 Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that’s known to use a backdoor known as KEYPLUG. The assessment comes jointly from SentinelOne, PwC, and the Microsoft Threat Intelligence team based on the fact that the adversary’s Lua-based malware LuaDream and …

Researchers Unmask Sandman APT’s Hidden Link to China-Based KEYPLUG Backdoor Read More »

Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans

December 12, 2023 The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that involves the opportunistic exploitation of security flaws in Log4j to deploy previously undocumented remote access trojans (RATs) on compromised hosts. Cisco Talos is tracking the activity under the name Operation Blacksmith, noting the use …

Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans Read More »

Playbook: Your First 100 Days as a vCISO – 5 Steps to Success

December 12, 2023 In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of hiring a full-time, in-house CISO. This gap in cybersecurity leadership is where you, as a vCISO, come in. You are the person who will establish, develop, and solidify the organization’s cybersecurity infrastructure, …

Playbook: Your First 100 Days as a vCISO – 5 Steps to Success Read More »

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users

December 12, 2023 Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded over 12 million times. “Despite their attractive appearance, these services are in fact designed to defraud users by offering them high-interest-rate loans endorsed with deceitful descriptions, all while collecting their victims’ personal and Article …

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users Read More »

Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker

December 12, 2023 In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But why does it work so well? The answer lies in the intricate dance between the attacker’s mind and human psychology. Our upcoming webinar, “Think Like a Hacker, Defend Like a Pro,” highlights this alarming trend. We delve …

Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker Read More »

New PoolParty Process Injection Techniques Outsmart Top EDR Solutions

December 12, 2023 A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in Windows systems while evading endpoint detection and response (EDR) systems. SafeBreach researcher Alon Leviev said the methods are “capable of working across all processes without any limitations, making them more flexible than existing process Article posted …

New PoolParty Process Injection Techniques Outsmart Top EDR Solutions Read More »

Unleashing the Beast: Exploring AI-Generated Attack Vectors 

Date: December 4, 2023 Time: 9:00 AM EST | 3:00 PM CET | 7:30 PM IST Topic: Unleashing the Beast: Exploring AI-Generated Attack Vectors Watch Now Abstract: With AI showing promising outcomes for a wide range of digital processes, threat actors find it lucrative to adopt AI technologies to enhance their cyber attack operations. AI-generated…

The post Unleashing the Beast: Exploring AI-Generated Attack Vectors  appeared first on Cybersecurity Exchange.

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

December 10, 2023 Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm. The attack is an end-to-end exploit for Spectre based on a new feature in Intel CPUs called Linear Address Masking (LAM) …

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs Read More »

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

December 10, 2023 Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging. “While GuLoader’s core functionality hasn’t changed drastically over the past few years, these constant updates in their obfuscation techniques make analyzing GuLoader a time-consuming and resource-intensive process,” Elastic Security Labs Article posted …

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques Read More »

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

December 9, 2023 A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of the 14 flaws – collectively called 5Ghoul (a combination of “5G” and “Ghoul”) – …

New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.