Threat actors scrape 600 million LinkedIn profiles and are selling the data online –...
For the third time in the past four months, LinkedIn seems to have experienced another massive data scrape conducted by a malicious actor. Once again, an archive of data...
Kaseya Releases Patches for Flaws Exploited in Widespread Ransomware Attack
By: Ravie Lakshmanan
Florida-based software vendor Kaseya on Sunday rolled out urgent updates to address critical security vulnerabilities in its Virtual System Administrator (VSA) solution that was used as a...
Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign
A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.
A sophisticated campaign targeting large international companies in the...
Lazarus Targets Job-Seeking Engineers with Malicious Documents
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.
The notorious Lazarus advanced persistent threat (APT) group has been identified as the...
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Threat Research Blog
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
June 16, 2021 |
by Tyler McLellan, Robert Dean, Justin Moore, Nick Harbour, Mike Hunhoff, Jared Wilson, Jordan Nuce
...
CISA Analysis Reveals Successful Attack Techniques of FY 2020
The analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.The Department of Homeland Cybersecurity and Infrastructure Security Agency...
How Dangerous Is Malware? New Report Finds It’s Tough to Tell
Determining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.Malware continues to challenge security teams, but those challenges...
Cisco BPA, WSA Bugs Allow Remote Cyberattacks
The high-severity security vulnerabilities allow elevation of privileges, leading to data theft and more.
A set of high-severity privilege-escalation vulnerabilities affecting Business Process Automation (BPA) application and Cisco’s Web Security...