SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities

November 8, 2023 The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting Indian government entities to deliver various remote access trojans such as AllaKore RAT, Ares RAT, and DRat. Enterprise security firm SEQRITE described the campaign as multi-platform, with the attacks also designed to infiltrate Linux …

SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities Read More »

Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws

November 8, 2023 Multiple ransomware groups have begun to actively exploit recently disclosed flaws in Atlassian Confluence and Apache ActiveMQ. Cybersecurity firm Rapid7 said it observed the exploitation of CVE-2023-22518 and CVE-2023-22515 in multiple customer environments, some of which have been leveraged for the deployment of Cerber (aka C3RB3R) ransomware. Both vulnerabilities are critical, allowing threat Article posted by: https://thehackernews.com/2023/11/experts-warn-of-ransomware-hackers.html ——————————————————————————————————————– Infocerts, 5B 306 …

Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws Read More »

Critical Flaws Discovered in Veeam ONE IT Monitoring Software – Patch Now

November 8, 2023 Veeam has released security updates to address four flaws in its ONE IT monitoring and analytics platform, two of which are rated critical in severity. The list of vulnerabilities is as follows – CVE-2023-38547 (CVSS score: 9.9) – An unspecified flaw that can be leveraged by an unauthenticated user to gain information about the SQL …

Critical Flaws Discovered in Veeam ONE IT Monitoring Software – Patch Now Read More »

What Is Cyber Crime? What Are the Different Types of Cyber Crime?

Cyber crime, as the name suggests, is the use of digital technologies such as computers and the internet to commit criminal activities. Malicious actors (often called “cyber criminals”) exploit computer hardware, software, and network vulnerabilities for various purposes, from stealing valuable data to disrupting the target’s business operations. The different types of cyber crime include:…

The post What Is Cyber Crime? What Are the Different Types of Cyber Crime? appeared first on Cybersecurity Exchange.

Diamond Model of Intrusion Analysis: What, Why, and How to Learn 

What Is the Diamond Model of Intrusion Analysis? The Diamond Model of Intrusion Analysis is a cybersecurity framework that helps organizations analyze cyber intrusions. The model was first proposed by Sergio Caltagirone, Andrew Pendergast, and Christopher Betz in a 2013 U.S. Department of Defense technical report titled “The Diamond Model of Intrusion Analysis” (Caltagirone et…

The post Diamond Model of Intrusion Analysis: What, Why, and How to Learn  appeared first on Cybersecurity Exchange.

Unveiling Grey Hat Hacking: Exploring Ethical Dilemmas, Practices, and Implications 

The role of hackers in the field of cyber security stands on a wide and varied spectrum: from white hat hackers with noble goals to malicious and dangerous black hat hackers. “Grey hat hacking” stands somewhere in the middle, blurring the lines between both sides. But what is grey hat hacking, exactly, and what are…

The post Unveiling Grey Hat Hacking: Exploring Ethical Dilemmas, Practices, and Implications  appeared first on Cybersecurity Exchange.

A Guide to Understanding LDAP: Exploring the What, How, and Why 

Curious about computer networks? You might have searched for information with phrases like “What is LDAP?” or “LDAP meaning.” In short, LDAP (Lightweight Access Directory Protocol) is an open, vendor-neutral networking protocol for accessing, interacting with, and managing distributed directory information services on an IP network. As the name suggests, LDAP is a lightweight protocol…

The post A Guide to Understanding LDAP: Exploring the What, How, and Why  appeared first on Cybersecurity Exchange.

New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics

November 7, 2023 An updated version of an information stealer malware known as Jupyter has resurfaced with “simple yet impactful changes” that aim to stealthily establish a persistent foothold on compromised systems. “The team has discovered new waves of Jupyter Infostealer attacks which leverage PowerShell command modifications and signatures of private keys in attempts to pass off …

New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics Read More »

QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices

November 7, 2023 QNAP has released security updates to address two critical security flaws impacting its operating system that could result in arbitrary code execution. Tracked as CVE-2023-23368 (CVSS score: 9.8), the vulnerability is described as a command injection bug affecting QTS, QuTS hero, and QuTScloud. “If exploited, the vulnerability could allow remote attackers to execute commands …

QNAP Releases Patch for 2 Critical Flaws Threatening Your NAS Devices Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.